Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 23:30

General

  • Target

    7be73725bb27497f4e920572565283d42b9d20a2bf3bee907a9d4bda02ae1914.exe

  • Size

    452KB

  • MD5

    6b2e05f5caa933b3baeb6c086fc1f91f

  • SHA1

    450ef99d4fe7939583488f2a970eba59d6f936d3

  • SHA256

    7be73725bb27497f4e920572565283d42b9d20a2bf3bee907a9d4bda02ae1914

  • SHA512

    640b5e2efe7c68e4f732331a840039b650a63faa5a1cc3d0414934be92f49cc9bc080792137bcb8af206c0dcf8c4d1f5d2031d82907fc523bcb93c388bb5cf94

  • SSDEEP

    3072:1+kZqVeInSk82TfatZ9mD5fvNj6kECsjZ:1jaSk8iCtPmD5Hl6ysN

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 14 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 4 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Disables taskbar notifications via registry modification
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 15 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Control Panel 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 55 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SetWindowsHookEx 25 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs
  • System policy modification 1 TTPs 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7be73725bb27497f4e920572565283d42b9d20a2bf3bee907a9d4bda02ae1914.exe
    "C:\Users\Admin\AppData\Local\Temp\7be73725bb27497f4e920572565283d42b9d20a2bf3bee907a9d4bda02ae1914.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\system32\\svchost.exe
      2⤵
        PID:1300
      • C:\Users\Admin\AppData\Local\Temp\7be73725bb27497f4e920572565283d42b9d20a2bf3bee907a9d4bda02ae1914.exe
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1312
        • C:\Users\Admin\E696D64614\winlogon.exe
          "C:\Users\Admin\E696D64614\winlogon.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:808
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\system32\\svchost.exe
            4⤵
              PID:1120
            • C:\Users\Admin\E696D64614\winlogon.exe
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:872
              • C:\Users\Admin\E696D64614\winlogon.exe
                "C:\Users\Admin\E696D64614\winlogon.exe"
                5⤵
                • Modifies firewall policy service
                • Modifies security service
                • Modifies visibility of file extensions in Explorer
                • Modifies visiblity of hidden/system files in Explorer
                • UAC bypass
                • Windows security bypass
                • Disables RegEdit via registry modification
                • Drops file in Drivers directory
                • Executes dropped EXE
                • Sets file execution options in registry
                • Drops startup file
                • Windows security modification
                • Adds Run key to start application
                • Checks whether UAC is enabled
                • Modifies Control Panel
                • Modifies Internet Explorer settings
                • Modifies Internet Explorer start page
                • Modifies registry class
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:432
      • C:\Windows\system32\wbem\unsecapp.exe
        C:\Windows\system32\wbem\unsecapp.exe -Embedding
        1⤵
          PID:1456
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
          1⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1660
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1660 CREDAT:275457 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1480
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1660 CREDAT:603142 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1968
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1660 CREDAT:603150 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1092
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1660 CREDAT:472079 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2232

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

          Filesize

          1KB

          MD5

          38af42645d29e5ed14e268600393f4ef

          SHA1

          bcd67c8ec44e6c4eb257115e4610a994fb45cae6

          SHA256

          78c949a8743fa19ae049d0dee5bb1564e12ae62a21444f9800230735042f0544

          SHA512

          49bdecb522fb1202f1ffb0057edd113cd391b8cf7d949fd7f74820658b40afd6f037af471b627a7ce0a6a44711d4a5ed5a75231c2a82865e9634655ca2423f0c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\84AFE219AEC53B0C9251F5E19EF019BD_2C9D5E6D83DF507CBE6C15521D5D3562

          Filesize

          1KB

          MD5

          a2323ba13cd25c27bd921b392230e955

          SHA1

          9039bc1cb29044c6421bcc80f3c381588fdd20e7

          SHA256

          3bab4e8177d87c85a4a6381f8da4e0981a71f7a825623f6eb6bee1c542b58053

          SHA512

          8266e01a62961d7b0060f9df66d4f146d4ea43bc233d6352925ac3a96c3671ba8ce365da73501d04f6df039e53689c06e1e7d3e44c3925299a0b86ff44b01367

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          60KB

          MD5

          d15aaa7c9be910a9898260767e2490e1

          SHA1

          2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

          SHA256

          f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

          SHA512

          7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BC2602F5489CFE3E69F81C6328A4C17C_849A9AE095E451B9FFDF6A58F3A98E26

          Filesize

          1KB

          MD5

          f0a701f10d757fef714bcafafdbc2daf

          SHA1

          c2db487c6af7b96074b826f6f69f2ea38c0f2f4b

          SHA256

          b8b0e51b81996b5c5895b9871c9884a31e24b21c170d6833cfd37078593ee383

          SHA512

          f836ca791bf20aeb8ff71277ec4314049bd55e36035f94574c04832ed05d26390ff490c99681d836d4cb79a588411dfaa697165d78d232e57819ec14b9d66697

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

          Filesize

          724B

          MD5

          5a11c6099b9e5808dfb08c5c9570c92f

          SHA1

          e5dc219641146d1839557973f348037fa589fd18

          SHA256

          91291a5edc4e10a225d3c23265d236ecc74473d9893be5bd07e202d95b3fb172

          SHA512

          c2435b6619464a14c65ab116ab83a6e0568bdf7abc5e5a5e19f3deaf56c70a46360965da8b60e1256e9c8656aef9751adb9e762731bb8dbab145f1c8224ac8f9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_871E11B76822F93FE2DBF907A5A1D9A8

          Filesize

          472B

          MD5

          b45b15bb651cc185ea82d91a51f06b5a

          SHA1

          44987727be72bb12b4e4fc4fac50145835512750

          SHA256

          f0b61426de169cf2efde87ac98d5123ea785004ad05c05932a099b644b2fdf64

          SHA512

          55a113bd3767b6a70aafbaa02ea65e8630881ad7f8adb6a5b684ddff56b8b0cec63967e7e9e9314f258261ff84307f7502bdac66df01f9c0981ff3daf4fda579

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          1KB

          MD5

          a266bb7dcc38a562631361bbf61dd11b

          SHA1

          3b1efd3a66ea28b16697394703a72ca340a05bd5

          SHA256

          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

          SHA512

          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

          Filesize

          410B

          MD5

          d8a6d4587b78cc4c62a204e8e2122e4b

          SHA1

          c800a55ed17ba3c882a84d4208461d0ff3a2af21

          SHA256

          8239f802ac7b25b1613661c2834826beccc2ce89c17391d3455e013de537e8f6

          SHA512

          ab3fcfc4d87551b5946792aa73fea9d48ec9b0d11668f9f29bc31329e1666c76cb6bc4d836fb983b313009e6d0ef58a73650826e2eb477c6e410cdb779727211

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\84AFE219AEC53B0C9251F5E19EF019BD_2C9D5E6D83DF507CBE6C15521D5D3562

          Filesize

          466B

          MD5

          18c99f71aa68f8bc98bfe857fab9ca95

          SHA1

          660772d094332e85f9c35443388da40339d3ba9b

          SHA256

          5db3b2bd3be1ddb4941f0d6ac20f38c4b672420da95e5efc4eb4efa9ef86b0a9

          SHA512

          401bf078486f58ae8a44fca434ca968ac1f7e1f9f1d2c68e445011a99aa1bcdfdfa5520b16f7825f44855e6423f10af2d1ee0753fec6b449323fbe174671ccde

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b3d97abc7b9644786f5134b605b9c595

          SHA1

          0cbc37ee92619beb04ab471a8aa67d345a79ad89

          SHA256

          890fe064254934c6ee0e4fad49c8bad9b48a543119c35ff8130c68e1962a3453

          SHA512

          340ca031ef8ffadc09a5eb51b9641c1f6abd1f76b1bc9c7f1fcad4d18133380f911cf1c69ec23726f86a45d10aaccd94fb1f04e34609e65becefe3e5dbdbd8a2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          e46c59978fc7662e2cf656289050b554

          SHA1

          68d5b8bcc0974129da967b0df32ea9fcb5d4664e

          SHA256

          76726dcd256f98aefb186b24f447fe919a8a1a785010baf7973acce950c33943

          SHA512

          4703160f9e4c7ce0701ad1dfd77f3e0ae3fded36efbd839914c1aa2f4b5c7169647ccb89ebb4c5fd9e8638623eefe6b0c8f8b05ad196e1e3ba7ee52f9e969387

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a0175affa633a50fd66e48017e89b2e2

          SHA1

          5ccccddea5d553dc974ac7673289d7c445b7da71

          SHA256

          aca591612110d0975cfac55859d5bc9a50110851c6dda629f901a4b8a3c2a192

          SHA512

          231539be80428af09adc5cad51aa16921941fbd1b8d2c7d205052d47a5be560caeac9159ca588d4d03cb5c8a010832a0656ba13d7ba859df21a91bdcb6e71415

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          399366c95da1f1394708c21baa9ef2b0

          SHA1

          f90ac5036d02d78f62d523f37df44d9ac2c4be0d

          SHA256

          8202ce7a05bae5d40312a95424ccac3a612e5c27f5242659b01f4a2fb1f038f3

          SHA512

          6112dcb5a0673b94d88dabbbf810aab968fcfabeb64c52697004a95839bbc67dd7e2c7f8a1b1e502bdd23278c36a47e06568b1b03d4dce801d6254de8b48ec15

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BC2602F5489CFE3E69F81C6328A4C17C_849A9AE095E451B9FFDF6A58F3A98E26

          Filesize

          470B

          MD5

          6b21e3de914115773f2b97f568dc1037

          SHA1

          65f7e1188282933e1b11b2db944c35b395dc685c

          SHA256

          092a82a5954987da085549cec34f449f46ad1fc26ce3f8961ca3a29ca68b9f79

          SHA512

          c072c16282df33ec4e26e22a57d7f18e3d94890aaceacfd904b929dfc39203ba6f9071663d4524092fef746c5f0c2b4d87f0311080221e7473a4236b390c3c19

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

          Filesize

          392B

          MD5

          8783720d1bd227e83c8eebe26bf205b2

          SHA1

          a96a03e59e388e8522a3d7b02e02ecebee72f8c8

          SHA256

          8891f5347ad792a33ba274bf80889f705938afa75f4e8eb7283aba32e1e87480

          SHA512

          eb2b60efe2d322b97f7e8d5ad4caca3a9be38b089d5c7bbded2660d123323d199075443a32cab1348767a14483f587f947cce6be5b178f92ea076e90664cb366

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_871E11B76822F93FE2DBF907A5A1D9A8

          Filesize

          402B

          MD5

          ac3a72aa2462757fbf17582028303c79

          SHA1

          3207ac613263c373d8fa94192e40b1ca4a182bbb

          SHA256

          98321bf61e96ef0e9c0402fe0e3c3bb4d6d4d8376537bb2c01bae1fd0a065ea6

          SHA512

          4cf8d334523e132a25015d1de8d5714f0b270a14f14e5bd55f061f8919c01fccf85e70811a4626bff3409e498b69320b9cb0657f5cd36d3cbcc663313600fcb0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          242B

          MD5

          88fe7e72ccc48b29b6809adefc6b8d3a

          SHA1

          bd413a912b60a2761b443d754af07e62fb4306d7

          SHA256

          ba1b8eff8c698f76f2082378a0ec979f449dc68a71d32b9eefce46bf6c518690

          SHA512

          43a26c9ec080ef4e888b2f2db4b83f6ce93fdfcf88bccad0f9509b85cc52ffb0d9653ea640c3a425b1d3cd8bf73a015c6a3456d23f561ecf6acb62c64021f22e

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\X2948LUQ\www6.buscaid[1].xml

          Filesize

          13B

          MD5

          c1ddea3ef6bbef3e7060a1a9ad89e4c5

          SHA1

          35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

          SHA256

          b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

          SHA512

          6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\TE7DC5T2.txt

          Filesize

          601B

          MD5

          0c7a2f9eeffe5bc4f34341cff7441b5c

          SHA1

          e93c3ff2ea35918b3750adb5c857a78a69a60a58

          SHA256

          199658620d624a533cbb408c65a2b2264adffdbf1ab9423124dfdaece1d2b9b6

          SHA512

          72fd36168596578bd25b36526bdbef7e10c8318fe7562c8689f4d49175edf59905c23ccc3906d56b17c3ecb7230cb80efb7bca6507cd6a8d2852112060cee537

        • C:\Users\Admin\E696D64614\winlogon.exe

          Filesize

          452KB

          MD5

          6b2e05f5caa933b3baeb6c086fc1f91f

          SHA1

          450ef99d4fe7939583488f2a970eba59d6f936d3

          SHA256

          7be73725bb27497f4e920572565283d42b9d20a2bf3bee907a9d4bda02ae1914

          SHA512

          640b5e2efe7c68e4f732331a840039b650a63faa5a1cc3d0414934be92f49cc9bc080792137bcb8af206c0dcf8c4d1f5d2031d82907fc523bcb93c388bb5cf94

        • C:\Users\Admin\E696D64614\winlogon.exe

          Filesize

          452KB

          MD5

          6b2e05f5caa933b3baeb6c086fc1f91f

          SHA1

          450ef99d4fe7939583488f2a970eba59d6f936d3

          SHA256

          7be73725bb27497f4e920572565283d42b9d20a2bf3bee907a9d4bda02ae1914

          SHA512

          640b5e2efe7c68e4f732331a840039b650a63faa5a1cc3d0414934be92f49cc9bc080792137bcb8af206c0dcf8c4d1f5d2031d82907fc523bcb93c388bb5cf94

        • C:\Users\Admin\E696D64614\winlogon.exe

          Filesize

          452KB

          MD5

          6b2e05f5caa933b3baeb6c086fc1f91f

          SHA1

          450ef99d4fe7939583488f2a970eba59d6f936d3

          SHA256

          7be73725bb27497f4e920572565283d42b9d20a2bf3bee907a9d4bda02ae1914

          SHA512

          640b5e2efe7c68e4f732331a840039b650a63faa5a1cc3d0414934be92f49cc9bc080792137bcb8af206c0dcf8c4d1f5d2031d82907fc523bcb93c388bb5cf94

        • C:\Users\Admin\E696D64614\winlogon.exe

          Filesize

          452KB

          MD5

          6b2e05f5caa933b3baeb6c086fc1f91f

          SHA1

          450ef99d4fe7939583488f2a970eba59d6f936d3

          SHA256

          7be73725bb27497f4e920572565283d42b9d20a2bf3bee907a9d4bda02ae1914

          SHA512

          640b5e2efe7c68e4f732331a840039b650a63faa5a1cc3d0414934be92f49cc9bc080792137bcb8af206c0dcf8c4d1f5d2031d82907fc523bcb93c388bb5cf94

        • \Users\Admin\E696D64614\winlogon.exe

          Filesize

          452KB

          MD5

          6b2e05f5caa933b3baeb6c086fc1f91f

          SHA1

          450ef99d4fe7939583488f2a970eba59d6f936d3

          SHA256

          7be73725bb27497f4e920572565283d42b9d20a2bf3bee907a9d4bda02ae1914

          SHA512

          640b5e2efe7c68e4f732331a840039b650a63faa5a1cc3d0414934be92f49cc9bc080792137bcb8af206c0dcf8c4d1f5d2031d82907fc523bcb93c388bb5cf94

        • \Users\Admin\E696D64614\winlogon.exe

          Filesize

          452KB

          MD5

          6b2e05f5caa933b3baeb6c086fc1f91f

          SHA1

          450ef99d4fe7939583488f2a970eba59d6f936d3

          SHA256

          7be73725bb27497f4e920572565283d42b9d20a2bf3bee907a9d4bda02ae1914

          SHA512

          640b5e2efe7c68e4f732331a840039b650a63faa5a1cc3d0414934be92f49cc9bc080792137bcb8af206c0dcf8c4d1f5d2031d82907fc523bcb93c388bb5cf94

        • memory/432-99-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/432-97-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/432-93-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/432-92-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/432-88-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/432-119-0x0000000003A80000-0x0000000004AE2000-memory.dmp

          Filesize

          16.4MB

        • memory/872-87-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/872-98-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/1312-71-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/1312-63-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/1312-62-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/1312-59-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/1312-58-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/1312-56-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/1312-55-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/1312-66-0x00000000765B1000-0x00000000765B3000-memory.dmp

          Filesize

          8KB