Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

01/03/2025, 18:58

250301-xmhhrayp15 10

01/03/2025, 18:55

250301-xkqrcaypx7 10

Analysis

  • max time kernel
    847s
  • max time network
    854s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    13/02/2025, 19:41

General

  • Target

    5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe

  • Size

    669KB

  • MD5

    ead18f3a909685922d7213714ea9a183

  • SHA1

    1270bd7fd62acc00447b30f066bb23f4745869bf

  • SHA256

    5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18

  • SHA512

    6e532d9c3d186e4dac38823ae9152056346e283613f0caf088b21a1b3e5f4f6cf3bad8c407168b1072895a386e3be0b8c11ad1cb326d3d3ff0eb8562052def91

  • SSDEEP

    6144:bLUHLyHlwFjxDi2nEZkQ4NXxp0XMgkBWPqdN/jGdfYY7SRA7j4YlvfYAAjJ:4uFi02nEZh4jp0XLuxGdgTm73vL

Malware Config

Extracted

Path

C:\Users\Public\Documents\_readme.txt

Ransom Note
ATTENTION! Don't worry my friend, you can return all your files! All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-T9WE5uiVT6 Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 046Sdsd3273yifhsisySD60h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1
URLs

https://we.tl/t-T9WE5uiVT6

Signatures

  • Executes dropped EXE 12 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 20 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
    "C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Windows\SysWOW64\icacls.exe
      icacls "C:\Users\Admin\AppData\Local\2946c085-4cee-4954-9e9f-e6750b3ca760" /deny *S-1-1-0:(OI)(CI)(DE,DC)
      2⤵
      • Modifies file permissions
      • System Location Discovery: System Language Discovery
      PID:2396
    • C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
      "C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --Admin IsNotAutoStart IsNotTask
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2320
      • C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
        "C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --ForNetRes "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1 IsNotAutoStart IsNotTask
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1056
        • C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          "C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --Service 1056 "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:1068
      • C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
        "C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --Service 2320 "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1780
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {4597CEE9-7770-49D6-8D6C-5B700E5B33B6} S-1-5-21-677481364-2238709445-1347953534-1000:JXXXDSWS\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Users\Admin\AppData\Local\2946c085-4cee-4954-9e9f-e6750b3ca760\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
      C:\Users\Admin\AppData\Local\2946c085-4cee-4954-9e9f-e6750b3ca760\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe --Task
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Users\Admin\AppData\Local\2946c085-4cee-4954-9e9f-e6750b3ca760\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
        "C:\Users\Admin\AppData\Local\2946c085-4cee-4954-9e9f-e6750b3ca760\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --ForNetRes "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1 IsNotAutoStart IsTask
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2312
        • C:\Users\Admin\AppData\Local\2946c085-4cee-4954-9e9f-e6750b3ca760\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          "C:\Users\Admin\AppData\Local\2946c085-4cee-4954-9e9f-e6750b3ca760\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --Service 2312 "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2592
      • C:\Users\Admin\AppData\Local\2946c085-4cee-4954-9e9f-e6750b3ca760\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
        "C:\Users\Admin\AppData\Local\2946c085-4cee-4954-9e9f-e6750b3ca760\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --Service 2000 "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1712
    • C:\Users\Admin\AppData\Local\2946c085-4cee-4954-9e9f-e6750b3ca760\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
      C:\Users\Admin\AppData\Local\2946c085-4cee-4954-9e9f-e6750b3ca760\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe --Task
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2992
      • C:\Users\Admin\AppData\Local\2946c085-4cee-4954-9e9f-e6750b3ca760\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
        "C:\Users\Admin\AppData\Local\2946c085-4cee-4954-9e9f-e6750b3ca760\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --ForNetRes "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1 IsNotAutoStart IsTask
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:952
        • C:\Users\Admin\AppData\Local\2946c085-4cee-4954-9e9f-e6750b3ca760\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          "C:\Users\Admin\AppData\Local\2946c085-4cee-4954-9e9f-e6750b3ca760\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --Service 952 "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2616
      • C:\Users\Admin\AppData\Local\2946c085-4cee-4954-9e9f-e6750b3ca760\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
        "C:\Users\Admin\AppData\Local\2946c085-4cee-4954-9e9f-e6750b3ca760\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --Service 2992 "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:912
    • C:\Users\Admin\AppData\Local\2946c085-4cee-4954-9e9f-e6750b3ca760\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
      C:\Users\Admin\AppData\Local\2946c085-4cee-4954-9e9f-e6750b3ca760\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe --Task
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2860
      • C:\Users\Admin\AppData\Local\2946c085-4cee-4954-9e9f-e6750b3ca760\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
        "C:\Users\Admin\AppData\Local\2946c085-4cee-4954-9e9f-e6750b3ca760\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --ForNetRes "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1 IsNotAutoStart IsTask
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:576
        • C:\Users\Admin\AppData\Local\2946c085-4cee-4954-9e9f-e6750b3ca760\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          "C:\Users\Admin\AppData\Local\2946c085-4cee-4954-9e9f-e6750b3ca760\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --Service 576 "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2692
      • C:\Users\Admin\AppData\Local\2946c085-4cee-4954-9e9f-e6750b3ca760\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
        "C:\Users\Admin\AppData\Local\2946c085-4cee-4954-9e9f-e6750b3ca760\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --Service 2860 "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    1KB

    MD5

    c9be626e9715952e9b70f92f912b9787

    SHA1

    aa2e946d9ad9027172d0d321917942b7562d6abe

    SHA256

    c13e8d22800c200915f87f71c31185053e4e60ca25de2e41e160e09cd2d815d4

    SHA512

    7581b7c593785380e9db3ae760af85c1a889f607a3cd2aa5a2695a0e5a0fe8ee751578e88f7d8c997faeda804e2fc2655d859bee2832eace526ed4379edaa3f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    436B

    MD5

    971c514f84bba0785f80aa1c23edfd79

    SHA1

    732acea710a87530c6b08ecdf32a110d254a54c8

    SHA256

    f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

    SHA512

    43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    174B

    MD5

    b218afc1ea38dc2605edc03c142bce5e

    SHA1

    333de9610a5a0db65ef30443459d1446308f2e9e

    SHA256

    1721098ace764fb24009af936afb3165feef942402c4b1e3bcdae14487e34d05

    SHA512

    f1ff3967c8f40f41891e8750e749673c42264f1047b7f01c9b94dc82648e24a27ff5bf2a87c2ed75db33f6de164d255033de4fb830605ad88ce03fd450c38fd5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    82c23ff9b6af5a2ec72bfaf9847e78d7

    SHA1

    2ba3926a9d4dcc56cbc9f1f87325f63c31a70030

    SHA256

    88be7c220ddeace6766f2968649fd98b6cfd8f6ad7a7c9afcf0b8d37f0f0c869

    SHA512

    5cc07c8577b8341536006d01bbdce0ca00c4617abe3d7db48b4ff1be57f12b97dc13e27d7174f12a7910c12927d538dc5c5b642b27f3a7b6049c9a56145cdeee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    170B

    MD5

    7a25a817ffb8de583076015ebd303596

    SHA1

    c3ef5b686340c5a9bdaca0e990ec5a3d8fc1b706

    SHA256

    42f7fdf27cae1dcce59be14281a5188e15ac941a7d2c9b25615fe37c7a34159f

    SHA512

    8fd28fab7fa5c2644c4efcd8009a6a2e111b02cb64aee3eafc1b2fb8aaa96ef3fa5463f68f0368fcc118799c3b08ce1ed53a2eb607cd347b29647ff1afc40bfc

  • C:\Users\Admin\AppData\Local\2946c085-4cee-4954-9e9f-e6750b3ca760\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe

    Filesize

    669KB

    MD5

    ead18f3a909685922d7213714ea9a183

    SHA1

    1270bd7fd62acc00447b30f066bb23f4745869bf

    SHA256

    5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18

    SHA512

    6e532d9c3d186e4dac38823ae9152056346e283613f0caf088b21a1b3e5f4f6cf3bad8c407168b1072895a386e3be0b8c11ad1cb326d3d3ff0eb8562052def91

  • C:\Users\Admin\AppData\Local\Temp\Cab256B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarAFC0.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Public\Documents\_readme.txt

    Filesize

    1KB

    MD5

    d75064cfaac9c92f52aadf373dc7e463

    SHA1

    36ea05181d9b037694929ec81f276f13c7d2655c

    SHA256

    163ec5b903b6baadd32d560c44c1ea4dce241579a7493eb32c632eae9085d508

    SHA512

    43387299749f31c623c5dd4a53ff4d2eff5edfeb80fd4e2edd45860b5c9367d2767ae2ee9b60824b57301999dd2bd995b7d3bd5e7187e447aed76106272559d1

  • memory/576-240-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/576-257-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/912-191-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/952-202-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/952-213-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/1056-86-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/1056-68-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/1056-83-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/1068-85-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/1712-155-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/1780-66-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/1780-84-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2000-139-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2000-134-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2000-133-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2000-125-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2312-166-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2320-28-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2320-67-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2320-43-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2320-29-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2320-46-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2320-45-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2504-2-0x0000000000590000-0x0000000000690000-memory.dmp

    Filesize

    1024KB

  • memory/2504-24-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2504-25-0x0000000000590000-0x0000000000690000-memory.dmp

    Filesize

    1024KB

  • memory/2504-26-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/2504-3-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/2504-6-0x0000000000590000-0x0000000000690000-memory.dmp

    Filesize

    1024KB

  • memory/2504-4-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2504-0-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2548-267-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2548-241-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2592-165-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2616-212-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2616-204-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2692-244-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2692-255-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2860-223-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2860-224-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2860-225-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2860-228-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2992-182-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2992-178-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2992-177-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2992-176-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB