Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    39s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/08/2023, 00:15

General

  • Target

    0379570d4a95774ec157e66fee83c4e3827ad099d553c2f84b463aacb7e337ce.exe

  • Size

    1.4MB

  • MD5

    7b0e50332a21631b20d24ec757e4f382

  • SHA1

    3592bc092346543c25446c5ba3e0a979c781754a

  • SHA256

    0379570d4a95774ec157e66fee83c4e3827ad099d553c2f84b463aacb7e337ce

  • SHA512

    06c0d008921e544597c98c25d6f73cc397b8c45304f61c894589c5e52c74e891cad414c6538da01ce07c897a25cc9937044237befc340ceb7677bf36626b67e7

  • SSDEEP

    24576:U2G/nvxW3Ww0tRp8GiXTBhq7yRDvHcUcjUvy0lr3Tl6icOB/UWoT:UbA30H4zF0UMSAicOB/UWk

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 1 TTPs 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unexpected DNS network traffic destination 3 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0379570d4a95774ec157e66fee83c4e3827ad099d553c2f84b463aacb7e337ce.exe
    "C:\Users\Admin\AppData\Local\Temp\0379570d4a95774ec157e66fee83c4e3827ad099d553c2f84b463aacb7e337ce.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ratt.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2220
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c nslookup myip.opendns.com. resolver1.opendns.com
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5096
        • C:\Windows\SysWOW64\nslookup.exe
          nslookup myip.opendns.com. resolver1.opendns.com
          4⤵
            PID:1656
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c wmic ComputerSystem get Domain
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4928
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            wmic ComputerSystem get Domain
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3904
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ratt.exe"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3720
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1324
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\ratt.exe"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1092
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "$Env:SystemDrive\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4576
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionProcess "C:\Users\Admin\AppData\Local\Temp\ratt.exe"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3804
        • C:\Users\Admin\AppData\Local\Temp\7z.exe
          7z.exe x -o"C:\Users\Admin\AppData\Local\Temp" -y ratt.7z
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:448
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -executionpolicy RemoteSigned -WindowStyle Hidden -file Add.ps1
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3928
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=SecuritySystem dir=in action=allow "program=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:5056
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=SecuritySystem dir=out action=allow "program=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:2964
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe"
            4⤵
              PID:2096
              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                wmic computersystem where name="KHQJMFWR" set AutomaticManagedPagefile=False
                5⤵
                  PID:1156
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe"
                4⤵
                  PID:4940
                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                    wmic pagefileset where name="C:\\pagefile.sys" set InitialSize=15000,MaximumSize=20000
                    5⤵
                      PID:4212
                  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe
                    "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe"
                    4⤵
                      PID:3400
                    • C:\Windows\SysWOW64\attrib.exe
                      "C:\Windows\system32\attrib.exe" +h "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe"
                      4⤵
                      • Views/modifies file attributes
                      PID:1320

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe

                Filesize

                645.6MB

                MD5

                5fc7352d50a3fe32b631f22ffffa9c10

                SHA1

                58763acfe24dc0d33c331a4fda29fe18752e87f4

                SHA256

                054a9f05f7e2f2d62fa6a40d98421f88f277a3795a86f1f3a984c964df9440cd

                SHA512

                ffa7503387be00dcacd58fa728d03e0b43e0c18e679e724762cae3cc3cbe429143b241b7c3452bd25310db872447574e3b75116ad5b54583d0b520fca273665f

              • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe

                Filesize

                97.3MB

                MD5

                0b44562a95b3b39f6c746156c1fa84fc

                SHA1

                1e5865cd30cd9274b86dcc8120a2ae89257dd99f

                SHA256

                9fbae83272d3b2f264e8665e42cfaa8555fe5c58022d0b552db669d18e8290b0

                SHA512

                ea4c3236c8223c0d2638070657593a314ebd623668a86359f93debf0fecccadd063e6244a4cc1a11b6568457b847fdfa0f175b59774646bc6c7579b7991b9e1f

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                Filesize

                1KB

                MD5

                33b19d75aa77114216dbc23f43b195e3

                SHA1

                36a6c3975e619e0c5232aa4f5b7dc1fec9525535

                SHA256

                b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2

                SHA512

                676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                11KB

                MD5

                c36ae8b63e8a09b93c2ecf1eccca3ee2

                SHA1

                0c66ae1bf5058ac447888cdb8556322cb1d55205

                SHA256

                4da8e96a17cd9bd166e4254f712dd5febc7b0ffd4e9520d8cdc3cce1028c9544

                SHA512

                a9cba9fdfefbb44935d23716118638c0b5161edb206a0cbac5b961871e45ed008908d18bfcc614b52375b423b67904f0a8dbf9c2ec4800df0ddecee37833af44

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                11KB

                MD5

                4d05b11d6b64c058604914b5c995de08

                SHA1

                d8b86c3ced1f984898438e1d0eff1f621a453158

                SHA256

                f54c853f1c5e579bdfc8b06a5243661b4d308c69737073707d0597cfaabfd58e

                SHA512

                659cc0d4c4002dc59f30c7cfed48eeeeec7005fa7e6ddefd4bed753468713bbb6730be97fdfe3a0422c4c3dde2a63bb0ab384ace048e0126c9638b835acc1c72

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                11KB

                MD5

                bb079077a440726fde229cb7ded6faec

                SHA1

                39c70baa29b443cac76f8e75120a1ffead07a9d3

                SHA256

                4060a04e9fe655ca93a143b7b8df0a7186afc06e5e3d132e4cdcd6d68f71509c

                SHA512

                bcc7910add93e941684064fc02a0ac9e67b61555040395e0233d556e97db2f8e4ef6e23c0261b14c0e60642d68cb5a8161778bc6bcf97f7a4aaaff5456214192

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                11KB

                MD5

                618532c5755c49c9b1b0b493f264daa9

                SHA1

                6afd2ab1aee4069f6c547fa0450b55524207c204

                SHA256

                1b538ee4be5e988ecae17608dbaa36d11f18b6fb29401c4538bf92fef73cdb93

                SHA512

                2f8b121e1660aef9fe10b3ffdac9fd150d21468037b2977a871514a203bb27a6f827326fcbc3159aab1a43e94e9a84407edf3798d3df82c4cf952387d3bf3d4c

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                11KB

                MD5

                5ea0576729c7aa4b05783b896a237961

                SHA1

                66ddc7528a9d49d8cb445a41336288c78bdb8ff7

                SHA256

                b4cf7e4cb2e0f08254081debb145c2d385e18bfc703da47e7a92efa9ba5956f8

                SHA512

                8a5a31434a9bf4fe3cf5708e5f083359198a354a59962964ddbc6cf592718173807a2f9b76899e42b29c5f43c589be3c2814bf79acc7390ab6dce63cd8cb3004

              • C:\Users\Admin\AppData\Local\Temp\7z.dll

                Filesize

                328KB

                MD5

                15bbbe562f9be3e5dcbb834e635cc231

                SHA1

                7c01cf5fa4db2312c5ed2f7b8c41e3e5c346a51a

                SHA256

                ed50ef8e0b6dd83fb0c3f733329d4aa6e5a3beb3491e2ba9d2ae206813508dde

                SHA512

                769287951b8c16f4b10c1b58e82612844babe7b5c10445fe848d713fb5e8321bcbbd9780e9c564cffe35ea4144e8a7e19645291c4eea372fcaa19ae395a97287

              • C:\Users\Admin\AppData\Local\Temp\7z.dll

                Filesize

                328KB

                MD5

                15bbbe562f9be3e5dcbb834e635cc231

                SHA1

                7c01cf5fa4db2312c5ed2f7b8c41e3e5c346a51a

                SHA256

                ed50ef8e0b6dd83fb0c3f733329d4aa6e5a3beb3491e2ba9d2ae206813508dde

                SHA512

                769287951b8c16f4b10c1b58e82612844babe7b5c10445fe848d713fb5e8321bcbbd9780e9c564cffe35ea4144e8a7e19645291c4eea372fcaa19ae395a97287

              • C:\Users\Admin\AppData\Local\Temp\7z.exe

                Filesize

                71KB

                MD5

                8ba2e41b330ae9356e62eb63514cf82e

                SHA1

                8dc266467a5a0d587ed0181d4344581ef4ff30b2

                SHA256

                ea2ad8d87b79c8eb3952498c7005a195986436cfd7ca7736dbbdda979142daea

                SHA512

                2fdfc2d368c70320b3dac00fef06381ef90a2a82a1f3137109b033d84e5b70185039af6ec918012dc03bc9d046cd8d8aee3247ba0f59d394e78f1f73380f7a1d

              • C:\Users\Admin\AppData\Local\Temp\7z.exe

                Filesize

                71KB

                MD5

                8ba2e41b330ae9356e62eb63514cf82e

                SHA1

                8dc266467a5a0d587ed0181d4344581ef4ff30b2

                SHA256

                ea2ad8d87b79c8eb3952498c7005a195986436cfd7ca7736dbbdda979142daea

                SHA512

                2fdfc2d368c70320b3dac00fef06381ef90a2a82a1f3137109b033d84e5b70185039af6ec918012dc03bc9d046cd8d8aee3247ba0f59d394e78f1f73380f7a1d

              • C:\Users\Admin\AppData\Local\Temp\Add.ps1

                Filesize

                1KB

                MD5

                0df43097e0f0acd04d9e17fb43d618b9

                SHA1

                69b3ade12cb228393a93624e65f41604a17c83b6

                SHA256

                c8e4a63337a25f55f75ad10ab2b420d716bad4b35a2044fd39dcd5936419d873

                SHA512

                01ae71dd2ee040baad6f4b9afcfbaeca2b9f6cc7d60ade5de637238d65c17d74292734666f4ae6b533f6bf1007c46387d8e690d97c3b7a535bcd6f216e70c4fb

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1nkoy2ru.f0v.ps1

                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • C:\Users\Admin\AppData\Local\Temp\ratt.7z

                Filesize

                693KB

                MD5

                7de6fdf3629c73bf0c29a96fa23ae055

                SHA1

                dcb37f6d43977601c6460b17387a89b9e4c0609a

                SHA256

                069979bfb2aefe3cac239fe4f2477672eb75b90c9853fb67b2ac1438f2ec44ff

                SHA512

                d1ef2299aacf429572fd6df185009960e601e49126f080fdced26ec407e5db86eaa902e474635464aac146b7de286667a398f2c5e46c4a821dad2579bfb3acf8

              • C:\Users\Admin\AppData\Local\Temp\ratt.bat

                Filesize

                1KB

                MD5

                7ea1fec84d76294d9256ae3dca7676b2

                SHA1

                1e335451d1cbb6951bc77bf75430f4d983491342

                SHA256

                9a419095c0bafc6b550f3f760c7b4f91ef3a956cfa6403d3750164ecdbe35940

                SHA512

                ab712c45081b3d1c7edd03e67a8db1518a546f3fbf00e99838dfe03a689c4867a6953e6603dcd2be458b2441f4a2b70286fd7d096549cfcf032dd2cd54d68317

              • C:\Users\Admin\AppData\Local\Temp\ratt.exe

                Filesize

                745.1MB

                MD5

                be788bb3680cf3809d9678ee6f7ba321

                SHA1

                499f01d5f654f83e172004dcc03f99abdd251734

                SHA256

                03a17a2b669f72df082569ea477977d824796da3b6b7a8d0e6f91f2629ef406b

                SHA512

                83c0b885740a57b84b2c909d0d6bb25baaa49d62499773030b59058325f37a5fcf39a1cd59ef9c229ca7289af7250034f6652e449625b67c2d260b285ddb9a8e

              • memory/448-235-0x0000000010000000-0x00000000100E2000-memory.dmp

                Filesize

                904KB

              • memory/448-231-0x0000000000400000-0x0000000000432000-memory.dmp

                Filesize

                200KB

              • memory/448-239-0x0000000000400000-0x0000000000432000-memory.dmp

                Filesize

                200KB

              • memory/1092-184-0x0000000074760000-0x0000000074F10000-memory.dmp

                Filesize

                7.7MB

              • memory/1092-185-0x0000000004D40000-0x0000000004D50000-memory.dmp

                Filesize

                64KB

              • memory/1092-197-0x0000000074760000-0x0000000074F10000-memory.dmp

                Filesize

                7.7MB

              • memory/1324-182-0x0000000003150000-0x0000000003160000-memory.dmp

                Filesize

                64KB

              • memory/1324-170-0x0000000003150000-0x0000000003160000-memory.dmp

                Filesize

                64KB

              • memory/1324-168-0x0000000074760000-0x0000000074F10000-memory.dmp

                Filesize

                7.7MB

              • memory/1324-169-0x0000000003150000-0x0000000003160000-memory.dmp

                Filesize

                64KB

              • memory/1324-183-0x0000000074760000-0x0000000074F10000-memory.dmp

                Filesize

                7.7MB

              • memory/3400-293-0x00000000058E0000-0x0000000005972000-memory.dmp

                Filesize

                584KB

              • memory/3400-290-0x0000000005840000-0x00000000058DC000-memory.dmp

                Filesize

                624KB

              • memory/3400-289-0x0000000000A30000-0x0000000000BE6000-memory.dmp

                Filesize

                1.7MB

              • memory/3400-288-0x0000000074690000-0x0000000074E40000-memory.dmp

                Filesize

                7.7MB

              • memory/3720-162-0x00000000065B0000-0x00000000065CE000-memory.dmp

                Filesize

                120KB

              • memory/3720-150-0x00000000055E0000-0x0000000005602000-memory.dmp

                Filesize

                136KB

              • memory/3720-148-0x0000000002C70000-0x0000000002C80000-memory.dmp

                Filesize

                64KB

              • memory/3720-147-0x0000000002C80000-0x0000000002CB6000-memory.dmp

                Filesize

                216KB

              • memory/3720-146-0x0000000074760000-0x0000000074F10000-memory.dmp

                Filesize

                7.7MB

              • memory/3720-166-0x0000000074760000-0x0000000074F10000-memory.dmp

                Filesize

                7.7MB

              • memory/3720-163-0x0000000002C70000-0x0000000002C80000-memory.dmp

                Filesize

                64KB

              • memory/3720-149-0x00000000059A0000-0x0000000005FC8000-memory.dmp

                Filesize

                6.2MB

              • memory/3720-152-0x0000000005920000-0x0000000005986000-memory.dmp

                Filesize

                408KB

              • memory/3720-151-0x00000000058B0000-0x0000000005916000-memory.dmp

                Filesize

                408KB

              • memory/3804-228-0x0000000074760000-0x0000000074F10000-memory.dmp

                Filesize

                7.7MB

              • memory/3804-214-0x0000000074760000-0x0000000074F10000-memory.dmp

                Filesize

                7.7MB

              • memory/3804-215-0x0000000003160000-0x0000000003170000-memory.dmp

                Filesize

                64KB

              • memory/3804-226-0x0000000003160000-0x0000000003170000-memory.dmp

                Filesize

                64KB

              • memory/3928-257-0x0000000004A30000-0x0000000004A40000-memory.dmp

                Filesize

                64KB

              • memory/3928-277-0x0000000004A30000-0x0000000004A40000-memory.dmp

                Filesize

                64KB

              • memory/3928-292-0x0000000074690000-0x0000000074E40000-memory.dmp

                Filesize

                7.7MB

              • memory/3928-258-0x000000007F990000-0x000000007F9A0000-memory.dmp

                Filesize

                64KB

              • memory/3928-259-0x0000000006580000-0x00000000065B2000-memory.dmp

                Filesize

                200KB

              • memory/3928-260-0x00000000704B0000-0x00000000704FC000-memory.dmp

                Filesize

                304KB

              • memory/3928-270-0x0000000006560000-0x000000000657E000-memory.dmp

                Filesize

                120KB

              • memory/3928-271-0x00000000078E0000-0x0000000007F5A000-memory.dmp

                Filesize

                6.5MB

              • memory/3928-272-0x00000000072C0000-0x00000000072DA000-memory.dmp

                Filesize

                104KB

              • memory/3928-273-0x0000000074690000-0x0000000074E40000-memory.dmp

                Filesize

                7.7MB

              • memory/3928-274-0x00000000072B0000-0x00000000072BA000-memory.dmp

                Filesize

                40KB

              • memory/3928-275-0x0000000004A30000-0x0000000004A40000-memory.dmp

                Filesize

                64KB

              • memory/3928-276-0x0000000007540000-0x00000000075D6000-memory.dmp

                Filesize

                600KB

              • memory/3928-245-0x0000000004A30000-0x0000000004A40000-memory.dmp

                Filesize

                64KB

              • memory/3928-278-0x00000000074C0000-0x00000000074CE000-memory.dmp

                Filesize

                56KB

              • memory/3928-279-0x00000000075E0000-0x00000000075FA000-memory.dmp

                Filesize

                104KB

              • memory/3928-280-0x0000000007510000-0x0000000007518000-memory.dmp

                Filesize

                32KB

              • memory/3928-281-0x0000000004A30000-0x0000000004A40000-memory.dmp

                Filesize

                64KB

              • memory/3928-282-0x000000007F990000-0x000000007F9A0000-memory.dmp

                Filesize

                64KB

              • memory/3928-284-0x0000000007620000-0x0000000007642000-memory.dmp

                Filesize

                136KB

              • memory/3928-285-0x0000000008510000-0x0000000008AB4000-memory.dmp

                Filesize

                5.6MB

              • memory/3928-244-0x0000000004A30000-0x0000000004A40000-memory.dmp

                Filesize

                64KB

              • memory/3928-243-0x0000000074690000-0x0000000074E40000-memory.dmp

                Filesize

                7.7MB

              • memory/4576-213-0x0000000074760000-0x0000000074F10000-memory.dmp

                Filesize

                7.7MB

              • memory/4576-211-0x0000000005290000-0x00000000052A0000-memory.dmp

                Filesize

                64KB

              • memory/4576-198-0x0000000074760000-0x0000000074F10000-memory.dmp

                Filesize

                7.7MB

              • memory/4576-199-0x0000000005290000-0x00000000052A0000-memory.dmp

                Filesize

                64KB

              • memory/4576-200-0x0000000005290000-0x00000000052A0000-memory.dmp

                Filesize

                64KB