Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    23/10/2023, 20:44

General

  • Target

    NEAS.0472c66468dd5be229a7701087e26280_JC.exe

  • Size

    402KB

  • MD5

    0472c66468dd5be229a7701087e26280

  • SHA1

    5bb0dc3f707625d5d301cff1a4335a0f7af67feb

  • SHA256

    7370c01422c9d9eafaff890f079af6e7e821b02f8b81f55c718eb195e0903639

  • SHA512

    71ff3e9d03090fa5f2c043870e09fecf0c9f301f6fb82ab8e1a03ed2f400b23c106fdc3832a475ae30c19b3b62eba44600de2ea7da44f2cb2898f27bf5088073

  • SSDEEP

    6144:hm6UslnVK8ZiOdphJ/6pMjT5/7riwtIQnpzwYuhbMuGAROSBnUQad8tUbJ6msaay:hmDslUSCaZVvS0yO8UbF1rpajW

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 10 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.0472c66468dd5be229a7701087e26280_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.0472c66468dd5be229a7701087e26280_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:772
    • \??\c:\users\admin\appdata\local\temp\wmpscfgs.exe
      c:\users\admin\appdata\local\temp\\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1936
      • \??\c:\users\admin\appdata\local\temp\wmpscfgs.exe
        c:\users\admin\appdata\local\temp\\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2556
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2556 -s 48
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2144
      • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2124
    • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2792
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2936 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe

    Filesize

    404KB

    MD5

    891b573cc46fa4d30e9403f6ee17a0f5

    SHA1

    2bf02d31e7fd44a67ccfbd08a357ac2bcbd96d19

    SHA256

    e3acb0dc2a14c007131b45c0741c30b83fb40c8ea9a7cb77b169a94fb70b5d1c

    SHA512

    feac9d000259d919f478ae78949e830d704abfa23f90211aaf8c7ee9c195e5653fd08b710b2203ba7af14de3dd60c6e9eb656cc980e767a0423ff9ee5dd9bbd9

  • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe

    Filesize

    404KB

    MD5

    891b573cc46fa4d30e9403f6ee17a0f5

    SHA1

    2bf02d31e7fd44a67ccfbd08a357ac2bcbd96d19

    SHA256

    e3acb0dc2a14c007131b45c0741c30b83fb40c8ea9a7cb77b169a94fb70b5d1c

    SHA512

    feac9d000259d919f478ae78949e830d704abfa23f90211aaf8c7ee9c195e5653fd08b710b2203ba7af14de3dd60c6e9eb656cc980e767a0423ff9ee5dd9bbd9

  • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe

    Filesize

    404KB

    MD5

    891b573cc46fa4d30e9403f6ee17a0f5

    SHA1

    2bf02d31e7fd44a67ccfbd08a357ac2bcbd96d19

    SHA256

    e3acb0dc2a14c007131b45c0741c30b83fb40c8ea9a7cb77b169a94fb70b5d1c

    SHA512

    feac9d000259d919f478ae78949e830d704abfa23f90211aaf8c7ee9c195e5653fd08b710b2203ba7af14de3dd60c6e9eb656cc980e767a0423ff9ee5dd9bbd9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    94602ab800e465793cb761d0e7583d9c

    SHA1

    12431b5f4759b7d11ce1505355c928e48ee0407a

    SHA256

    78b4a88d7debca05cef2dd6fdff15127c89c10eedaa98404df28298e7b1200c8

    SHA512

    a67101925cf27497bebbe17dd22215c525bd59a9210f75f5eb20adde39d69417aa82087048861ea8029398f04b56ace65d2c9b94c72484afd9f5cd73461e5678

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0a4428f179ca6fba3494f6ba6f08993d

    SHA1

    4cc27a734ca418fd3787556b4626fcb1ce340c5a

    SHA256

    bed7a74be0606819c56caa63a25527ec86361d482d9da147112523b24dbf33e6

    SHA512

    b6dc7f6b91d18784368c52775ab43b2af0b8fa796a4a8a13f71139c8db9612cd3b2383ed5d03de3e0f790fcf860c25449003cf32fa2d04c17d3b3da75a616c55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    90abea346523b32f6166ae5267ce606f

    SHA1

    e978ad2ba0f31c655ec5a7801f1de970bbb2d3b7

    SHA256

    f37513778fc6356f01e4932d402c0ad3815897ac9ce8e19f01db9ea402a5f89e

    SHA512

    92338a36489fa1ca4e38ea9e0ec9479b927c5bb121c1ea2904ecf7b8e4daa38752c6fdfed043c8c80e64a786c102de4539d892464fa3917d19b605e7ad8a9ca4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4f02751c149884981ce05c3b25e78497

    SHA1

    33ddacfe06284095157e1521a9c454de22508181

    SHA256

    641a68f9f6bd38a879480ad01e44389690342df2e98800e48fb69f0813c1530e

    SHA512

    4ba0a322694fdcabd479053eb362bbd017bf3998c31d8c60fa37e0757591fc87c34ab06c6f3011e94b215e2d62133e0901d303a6c4de0769ded3ae371b52abdc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    defe25d26d51616700c662f951194406

    SHA1

    f92f0659dfafa92e9bb9f0705f8f8eb58120b01d

    SHA256

    8937cd177cc426d024f9a587c58b83efe79a83b7f543492bb4ef8f2c243b2a5d

    SHA512

    a91f4714586fe59df3ce871cf5c595ee22bc0b48a344f6403a70ed92d66f03fca49535254b44317678a0ae56555b4044a97981d7d950f5b69116af3317fb53b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d04172cfdfdaad546d6878c6613fbe48

    SHA1

    97b3308ff38f24a11ddb1f671fc8cefd5fd8c16b

    SHA256

    6bce2e1a7f52e53a9b3da1571e2d1ec4b032a6120c57b0b2db63258740f63ac2

    SHA512

    f1f99bf0f3b912879cfb58f3e036d8ec3ff842615794941602f56ce764ae3f3fcad3fe345629b90dec3e3117a7bcef223300a7ea2ccd1cfec4ec105758db61e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2fc7eb58f2ea99a0af11b8a703768ac1

    SHA1

    e881f9d3938682c061a890de9ede0f448de88732

    SHA256

    57318d3d47c2aa78a8df3ef23762e44d3a75b9ea53f02048b0ed0622d37f7f13

    SHA512

    fdbb93694895d33efe66a39a980204f1461375d1b86c08cca2dd0addad6eb008f73d26c1191c9ade6264eea85a300faec738a98fb74a78e8f703cf8c5d8dce57

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9eb25ff91b12b7ee62fc9839dc5453a7

    SHA1

    ff305a65877b9cb2251cdf1b15f79868efb56af9

    SHA256

    76a626299b4366581b04e5621bf5668120fe4532c882a4f1d2016df104738ff9

    SHA512

    59172c6a27f98575478a682eb5e11c90946f7a60b68692c0028d5cdac5b709a7091a86328834aa9c67c976dcc801f843cd816dbd719fd002d1d696b21e27a8f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eb44cd0fda7fe3a00a02f2ac6c03d323

    SHA1

    96fcceeef9afa487c5a89d0faa4fe7d046e3e2f2

    SHA256

    9a07c777ffb3209968c3b8bf89baaf0985e9e8c769c7f33cc6ff28e4ed100679

    SHA512

    a48e1fe8a0c9edd99441d379c657c604b2813bbd6ad24947d5106e7eb1aaffcf189725339b7f5a15c313d4eeefdbe970feb70a0ca235937d0f5f7ecab7d3fc99

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c27382e3dd57b066a7f288e6e8577ad8

    SHA1

    372b99ea640dd7c4e38b0d400c5a742a66a7ee8f

    SHA256

    b02c0be4d04f4abd0de09c229cff1b5bbe5429c22bfec5d90c3dd834ee406c94

    SHA512

    4472f95317f62829fd8d4597783d2fad12e979c5f02aa255658916ae4192f2b032280d7a3b679faf94c3a5a78d3a23600cb787848f953f3ae6b6a6a881d6d8a2

  • C:\Users\Admin\AppData\Local\Temp\Cab27ED.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar280F.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Local\Temp\wmpscfgs.exe

    Filesize

    436KB

    MD5

    ce2413217b0a8d0cd2651602c9632c55

    SHA1

    6ca8912889b7f928f4fc75573aaa0e97ed0cc65e

    SHA256

    af4f5091a3df13a375310a73606b4b10676879f282bea2b7b5aa25d841fe5524

    SHA512

    f4683ff2d08056b93a87c9ec04665e9b7d8669df5215d50930255817359368178b7f44873cc76c218f21c8de47a92bd73269a0eb2f9ad057f74e8b69c05cfeb5

  • C:\Users\Admin\AppData\Local\Temp\wmpscfgs.exe

    Filesize

    436KB

    MD5

    ce2413217b0a8d0cd2651602c9632c55

    SHA1

    6ca8912889b7f928f4fc75573aaa0e97ed0cc65e

    SHA256

    af4f5091a3df13a375310a73606b4b10676879f282bea2b7b5aa25d841fe5524

    SHA512

    f4683ff2d08056b93a87c9ec04665e9b7d8669df5215d50930255817359368178b7f44873cc76c218f21c8de47a92bd73269a0eb2f9ad057f74e8b69c05cfeb5

  • C:\Users\Admin\AppData\Local\Temp\wmpscfgs.exe

    Filesize

    436KB

    MD5

    ce2413217b0a8d0cd2651602c9632c55

    SHA1

    6ca8912889b7f928f4fc75573aaa0e97ed0cc65e

    SHA256

    af4f5091a3df13a375310a73606b4b10676879f282bea2b7b5aa25d841fe5524

    SHA512

    f4683ff2d08056b93a87c9ec04665e9b7d8669df5215d50930255817359368178b7f44873cc76c218f21c8de47a92bd73269a0eb2f9ad057f74e8b69c05cfeb5

  • \??\c:\program files (x86)\adobe\acrotray .exe

    Filesize

    474KB

    MD5

    a114b3140ee266b9e6e45c60a3713052

    SHA1

    14b2f7599de4d069034fb3f587a40cbf143392b7

    SHA256

    6e8de7f3bb7e210c3005fe4c2e83665beec5eb3679ef4f885ef5ed9038a26efb

    SHA512

    c11d99723f03976317d9d3d7f2be225afb481679f1026b7eaf997f52856226e3d99116f2f9554c81063e5e5df8261d0ce6724cd775d41decdd5135d6cda0e09d

  • \??\c:\program files (x86)\adobe\acrotray.exe

    Filesize

    443KB

    MD5

    56b9d6d5903cd2bd5383ef66366fbbc2

    SHA1

    04953b2297595810225dc918113fae5a9c875dff

    SHA256

    598129094306f37c3f16ed112db68cb08a75aa6c3e37a42e7a7aad9c5efbe380

    SHA512

    c0c8331db8c81a9d05a1e477bbf3533cbd3c20a69832c87e33a2412c77038ca317b7604556f996b93000e105b416574fdc850e320c22ebf0995d96f1c94eb5c9

  • \??\c:\program files (x86)\microsoft office\office14\bcssync.exe

    Filesize

    439KB

    MD5

    d6176461167fbf8b74ede64a2932bfcb

    SHA1

    d6e2f4fc93a1e922fbd3a870825df94974c7bb86

    SHA256

    9e436f4f42d6a0445a08cc1c7a625aec5d33843543937d2fda1dfaa0c5040c28

    SHA512

    ebb4bd060c4c6c9b1eee9db5741f2a229954d3db4cb669fa1aef4c039ae68b82eace28addc095e66e3284110db779a01c56e0eb8c2ade6fed8a0a0b45ca5a159

  • \??\c:\users\admin\appdata\local\temp\wmpscfgs.exe

    Filesize

    436KB

    MD5

    ce2413217b0a8d0cd2651602c9632c55

    SHA1

    6ca8912889b7f928f4fc75573aaa0e97ed0cc65e

    SHA256

    af4f5091a3df13a375310a73606b4b10676879f282bea2b7b5aa25d841fe5524

    SHA512

    f4683ff2d08056b93a87c9ec04665e9b7d8669df5215d50930255817359368178b7f44873cc76c218f21c8de47a92bd73269a0eb2f9ad057f74e8b69c05cfeb5

  • \Program Files (x86)\Internet Explorer\wmpscfgs.exe

    Filesize

    404KB

    MD5

    891b573cc46fa4d30e9403f6ee17a0f5

    SHA1

    2bf02d31e7fd44a67ccfbd08a357ac2bcbd96d19

    SHA256

    e3acb0dc2a14c007131b45c0741c30b83fb40c8ea9a7cb77b169a94fb70b5d1c

    SHA512

    feac9d000259d919f478ae78949e830d704abfa23f90211aaf8c7ee9c195e5653fd08b710b2203ba7af14de3dd60c6e9eb656cc980e767a0423ff9ee5dd9bbd9

  • \Program Files (x86)\Internet Explorer\wmpscfgs.exe

    Filesize

    404KB

    MD5

    891b573cc46fa4d30e9403f6ee17a0f5

    SHA1

    2bf02d31e7fd44a67ccfbd08a357ac2bcbd96d19

    SHA256

    e3acb0dc2a14c007131b45c0741c30b83fb40c8ea9a7cb77b169a94fb70b5d1c

    SHA512

    feac9d000259d919f478ae78949e830d704abfa23f90211aaf8c7ee9c195e5653fd08b710b2203ba7af14de3dd60c6e9eb656cc980e767a0423ff9ee5dd9bbd9

  • \Program Files (x86)\Internet Explorer\wmpscfgs.exe

    Filesize

    404KB

    MD5

    891b573cc46fa4d30e9403f6ee17a0f5

    SHA1

    2bf02d31e7fd44a67ccfbd08a357ac2bcbd96d19

    SHA256

    e3acb0dc2a14c007131b45c0741c30b83fb40c8ea9a7cb77b169a94fb70b5d1c

    SHA512

    feac9d000259d919f478ae78949e830d704abfa23f90211aaf8c7ee9c195e5653fd08b710b2203ba7af14de3dd60c6e9eb656cc980e767a0423ff9ee5dd9bbd9

  • \Users\Admin\AppData\Local\Temp\wmpscfgs.exe

    Filesize

    436KB

    MD5

    ce2413217b0a8d0cd2651602c9632c55

    SHA1

    6ca8912889b7f928f4fc75573aaa0e97ed0cc65e

    SHA256

    af4f5091a3df13a375310a73606b4b10676879f282bea2b7b5aa25d841fe5524

    SHA512

    f4683ff2d08056b93a87c9ec04665e9b7d8669df5215d50930255817359368178b7f44873cc76c218f21c8de47a92bd73269a0eb2f9ad057f74e8b69c05cfeb5

  • \Users\Admin\AppData\Local\Temp\wmpscfgs.exe

    Filesize

    436KB

    MD5

    ce2413217b0a8d0cd2651602c9632c55

    SHA1

    6ca8912889b7f928f4fc75573aaa0e97ed0cc65e

    SHA256

    af4f5091a3df13a375310a73606b4b10676879f282bea2b7b5aa25d841fe5524

    SHA512

    f4683ff2d08056b93a87c9ec04665e9b7d8669df5215d50930255817359368178b7f44873cc76c218f21c8de47a92bd73269a0eb2f9ad057f74e8b69c05cfeb5

  • \Users\Admin\AppData\Local\Temp\wmpscfgs.exe

    Filesize

    436KB

    MD5

    ce2413217b0a8d0cd2651602c9632c55

    SHA1

    6ca8912889b7f928f4fc75573aaa0e97ed0cc65e

    SHA256

    af4f5091a3df13a375310a73606b4b10676879f282bea2b7b5aa25d841fe5524

    SHA512

    f4683ff2d08056b93a87c9ec04665e9b7d8669df5215d50930255817359368178b7f44873cc76c218f21c8de47a92bd73269a0eb2f9ad057f74e8b69c05cfeb5

  • \Users\Admin\AppData\Local\Temp\wmpscfgs.exe

    Filesize

    436KB

    MD5

    ce2413217b0a8d0cd2651602c9632c55

    SHA1

    6ca8912889b7f928f4fc75573aaa0e97ed0cc65e

    SHA256

    af4f5091a3df13a375310a73606b4b10676879f282bea2b7b5aa25d841fe5524

    SHA512

    f4683ff2d08056b93a87c9ec04665e9b7d8669df5215d50930255817359368178b7f44873cc76c218f21c8de47a92bd73269a0eb2f9ad057f74e8b69c05cfeb5

  • \Users\Admin\AppData\Local\Temp\wmpscfgs.exe

    Filesize

    436KB

    MD5

    ce2413217b0a8d0cd2651602c9632c55

    SHA1

    6ca8912889b7f928f4fc75573aaa0e97ed0cc65e

    SHA256

    af4f5091a3df13a375310a73606b4b10676879f282bea2b7b5aa25d841fe5524

    SHA512

    f4683ff2d08056b93a87c9ec04665e9b7d8669df5215d50930255817359368178b7f44873cc76c218f21c8de47a92bd73269a0eb2f9ad057f74e8b69c05cfeb5

  • \Users\Admin\AppData\Local\Temp\wmpscfgs.exe

    Filesize

    436KB

    MD5

    ce2413217b0a8d0cd2651602c9632c55

    SHA1

    6ca8912889b7f928f4fc75573aaa0e97ed0cc65e

    SHA256

    af4f5091a3df13a375310a73606b4b10676879f282bea2b7b5aa25d841fe5524

    SHA512

    f4683ff2d08056b93a87c9ec04665e9b7d8669df5215d50930255817359368178b7f44873cc76c218f21c8de47a92bd73269a0eb2f9ad057f74e8b69c05cfeb5

  • \Users\Admin\AppData\Local\Temp\wmpscfgs.exe

    Filesize

    436KB

    MD5

    ce2413217b0a8d0cd2651602c9632c55

    SHA1

    6ca8912889b7f928f4fc75573aaa0e97ed0cc65e

    SHA256

    af4f5091a3df13a375310a73606b4b10676879f282bea2b7b5aa25d841fe5524

    SHA512

    f4683ff2d08056b93a87c9ec04665e9b7d8669df5215d50930255817359368178b7f44873cc76c218f21c8de47a92bd73269a0eb2f9ad057f74e8b69c05cfeb5

  • memory/772-0-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/1936-22-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/2792-35-0x00000000003D0000-0x00000000003D2000-memory.dmp

    Filesize

    8KB