Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

01/03/2025, 18:58

250301-xmhhrayp15 10

01/03/2025, 18:55

250301-xkqrcaypx7 10

Analysis

  • max time kernel
    896s
  • max time network
    902s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16/02/2025, 01:02

General

  • Target

    5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe

  • Size

    669KB

  • MD5

    ead18f3a909685922d7213714ea9a183

  • SHA1

    1270bd7fd62acc00447b30f066bb23f4745869bf

  • SHA256

    5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18

  • SHA512

    6e532d9c3d186e4dac38823ae9152056346e283613f0caf088b21a1b3e5f4f6cf3bad8c407168b1072895a386e3be0b8c11ad1cb326d3d3ff0eb8562052def91

  • SSDEEP

    6144:bLUHLyHlwFjxDi2nEZkQ4NXxp0XMgkBWPqdN/jGdfYY7SRA7j4YlvfYAAjJ:4uFi02nEZh4jp0XLuxGdgTm73vL

Malware Config

Extracted

Path

C:\Users\Public\Documents\_readme.txt

Ransom Note
ATTENTION! Don't worry my friend, you can return all your files! All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-T9WE5uiVT6 Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 046Sdsd3273yifhsisySD60h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1
URLs

https://we.tl/t-T9WE5uiVT6

Signatures

  • Executes dropped EXE 12 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 21 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
    "C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Windows\SysWOW64\icacls.exe
      icacls "C:\Users\Admin\AppData\Local\f6d69f65-d667-4e72-b69d-288b47d59544" /deny *S-1-1-0:(OI)(CI)(DE,DC)
      2⤵
      • Modifies file permissions
      • System Location Discovery: System Language Discovery
      PID:2588
    • C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
      "C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --Admin IsNotAutoStart IsNotTask
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2616
      • C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
        "C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --ForNetRes "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1 IsNotAutoStart IsNotTask
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2200
        • C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          "C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --Service 2200 "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:1712
      • C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
        "C:\Users\Admin\AppData\Local\Temp\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --Service 2616 "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2160
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {5DBF002E-AFF4-48D5-A882-282C0B0FC293} S-1-5-21-1846800975-3917212583-2893086201-1000:ZQABOPWE\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Users\Admin\AppData\Local\f6d69f65-d667-4e72-b69d-288b47d59544\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
      C:\Users\Admin\AppData\Local\f6d69f65-d667-4e72-b69d-288b47d59544\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe --Task
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2992
      • C:\Users\Admin\AppData\Local\f6d69f65-d667-4e72-b69d-288b47d59544\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
        "C:\Users\Admin\AppData\Local\f6d69f65-d667-4e72-b69d-288b47d59544\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --ForNetRes "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1 IsNotAutoStart IsTask
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1916
        • C:\Users\Admin\AppData\Local\f6d69f65-d667-4e72-b69d-288b47d59544\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          "C:\Users\Admin\AppData\Local\f6d69f65-d667-4e72-b69d-288b47d59544\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --Service 1916 "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2892
      • C:\Users\Admin\AppData\Local\f6d69f65-d667-4e72-b69d-288b47d59544\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
        "C:\Users\Admin\AppData\Local\f6d69f65-d667-4e72-b69d-288b47d59544\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --Service 2992 "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2464
    • C:\Users\Admin\AppData\Local\f6d69f65-d667-4e72-b69d-288b47d59544\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
      C:\Users\Admin\AppData\Local\f6d69f65-d667-4e72-b69d-288b47d59544\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe --Task
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2964
      • C:\Users\Admin\AppData\Local\f6d69f65-d667-4e72-b69d-288b47d59544\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
        "C:\Users\Admin\AppData\Local\f6d69f65-d667-4e72-b69d-288b47d59544\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --ForNetRes "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1 IsNotAutoStart IsTask
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2788
        • C:\Users\Admin\AppData\Local\f6d69f65-d667-4e72-b69d-288b47d59544\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          "C:\Users\Admin\AppData\Local\f6d69f65-d667-4e72-b69d-288b47d59544\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --Service 2788 "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:844
      • C:\Users\Admin\AppData\Local\f6d69f65-d667-4e72-b69d-288b47d59544\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
        "C:\Users\Admin\AppData\Local\f6d69f65-d667-4e72-b69d-288b47d59544\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --Service 2964 "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:184
    • C:\Users\Admin\AppData\Local\f6d69f65-d667-4e72-b69d-288b47d59544\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
      C:\Users\Admin\AppData\Local\f6d69f65-d667-4e72-b69d-288b47d59544\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe --Task
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1020
      • C:\Users\Admin\AppData\Local\f6d69f65-d667-4e72-b69d-288b47d59544\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
        "C:\Users\Admin\AppData\Local\f6d69f65-d667-4e72-b69d-288b47d59544\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --ForNetRes "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1 IsNotAutoStart IsTask
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1576
        • C:\Users\Admin\AppData\Local\f6d69f65-d667-4e72-b69d-288b47d59544\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
          "C:\Users\Admin\AppData\Local\f6d69f65-d667-4e72-b69d-288b47d59544\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --Service 1576 "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2748
      • C:\Users\Admin\AppData\Local\f6d69f65-d667-4e72-b69d-288b47d59544\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe
        "C:\Users\Admin\AppData\Local\f6d69f65-d667-4e72-b69d-288b47d59544\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe" --Service 1020 "FsnDCf1u1wJvLcqbFxxtOchBf2V2lgtk24oM5mt2" 0h7mFQcjRC3pDgsRcrWZ7K7bdAgvgDos224DmXt1
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    1KB

    MD5

    c9be626e9715952e9b70f92f912b9787

    SHA1

    aa2e946d9ad9027172d0d321917942b7562d6abe

    SHA256

    c13e8d22800c200915f87f71c31185053e4e60ca25de2e41e160e09cd2d815d4

    SHA512

    7581b7c593785380e9db3ae760af85c1a889f607a3cd2aa5a2695a0e5a0fe8ee751578e88f7d8c997faeda804e2fc2655d859bee2832eace526ed4379edaa3f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    436B

    MD5

    971c514f84bba0785f80aa1c23edfd79

    SHA1

    732acea710a87530c6b08ecdf32a110d254a54c8

    SHA256

    f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

    SHA512

    43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    174B

    MD5

    974ec7447d4d3bd6ef342fd34a655351

    SHA1

    a73385760d316ca8c327c664e1290502e93ef51f

    SHA256

    f873fd2123346af85748af51a60df0bd2b30d5c62d9c6f9c21e0b66b45b498f4

    SHA512

    33615fdd7dcc9f164eb80a97c44a47b1d8cad8ce7c8587c19511a981f8b1687ae0a733acf1049400db9c557465ec88faff2a63f8387082ef103dec8738a5f792

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dd36eaf18a2b19e427bd243247077e42

    SHA1

    f160cfee49d56e636d86d9f4431b2a1ce7744b0f

    SHA256

    bd5a34b9687cba909e0dfee32cddb9780795d973a664765228c09ca48f06f445

    SHA512

    9515c43c60dc22e4c8d75984c90ce57f6a564e9a48d6e66e6f0836ee2754ee520d914b4048e2b42791e60a03544cdf235ba61b6df949fa4832061afb5092bbf4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    170B

    MD5

    21cc17c66a825ef88f5e143b47fd9c5d

    SHA1

    50b5d8beaac375cdeb1ca498174b5655fbcd48d4

    SHA256

    6cdd51e708d0e2f8b28c06a8585a6a37badaebb1b29b3341c31b8c7ddcac04e0

    SHA512

    780d56cd021cad2309015f5b95fd8b45493302464ac8aae95d94d7dfcd73f3e503b74e4b3eca6f4aac7f5803186c86c14bf5422bc999ba2b82a56335cc6eb0b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    56f744c226ae262ce20699c5420f593a

    SHA1

    0f9270c71e7088601cdb228c14c268d6a2e7320d

    SHA256

    737b7f6de1fd213aedd73852d4ceef30180d3ac461e6a3c643dd96868f469e83

    SHA512

    5ebaf925ffc2b101807bbf0d8d48d1670324a34c94e565a70b5253f14ab267a86d547d862b621996ecc1c75fe0ff1d230a741bd532a8eab49737a97faedf1aa3

  • C:\Users\Admin\AppData\Local\Temp\Cab7CED.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1DDE.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\f6d69f65-d667-4e72-b69d-288b47d59544\5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18.exe

    Filesize

    669KB

    MD5

    ead18f3a909685922d7213714ea9a183

    SHA1

    1270bd7fd62acc00447b30f066bb23f4745869bf

    SHA256

    5da0116af495e6d8af7241da9b8281d918b9ff9a98a3deab4cca1aec1e456c18

    SHA512

    6e532d9c3d186e4dac38823ae9152056346e283613f0caf088b21a1b3e5f4f6cf3bad8c407168b1072895a386e3be0b8c11ad1cb326d3d3ff0eb8562052def91

  • C:\Users\Public\Documents\_readme.txt

    Filesize

    1KB

    MD5

    d75064cfaac9c92f52aadf373dc7e463

    SHA1

    36ea05181d9b037694929ec81f276f13c7d2655c

    SHA256

    163ec5b903b6baadd32d560c44c1ea4dce241579a7493eb32c632eae9085d508

    SHA512

    43387299749f31c623c5dd4a53ff4d2eff5edfeb80fd4e2edd45860b5c9367d2767ae2ee9b60824b57301999dd2bd995b7d3bd5e7187e447aed76106272559d1

  • memory/184-204-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/844-221-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/1020-232-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/1020-238-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/1020-234-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/1020-233-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/1576-258-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/1712-102-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/1916-179-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/1916-158-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/1928-6-0x00000000002B0000-0x00000000003B0000-memory.dmp

    Filesize

    1024KB

  • memory/1928-26-0x0000000003800000-0x00000000038A9000-memory.dmp

    Filesize

    676KB

  • memory/1928-29-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/1928-27-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/1928-28-0x00000000002B0000-0x00000000003B0000-memory.dmp

    Filesize

    1024KB

  • memory/1928-3-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/1928-0-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/1928-2-0x00000000002B0000-0x00000000003B0000-memory.dmp

    Filesize

    1024KB

  • memory/1928-4-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2160-71-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2160-55-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2200-103-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2200-53-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2292-256-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2464-157-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2616-47-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2616-31-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2616-32-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2616-46-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2616-48-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2616-49-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2616-52-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2748-261-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2788-222-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2892-178-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2964-190-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2964-194-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2964-191-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2964-189-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2992-142-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2992-143-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2992-148-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/2992-144-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB