Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    01/11/2023, 13:53

General

  • Target

    NEAS.0ff02e578b946881a6f80a1c511dc890.exe

  • Size

    317KB

  • MD5

    0ff02e578b946881a6f80a1c511dc890

  • SHA1

    99cafeb256475dfe4809dab942092b3095f7e1b7

  • SHA256

    965c8ad9a47a0c82ceef371c2f6915573a536548368cca39c86c6bb3fb7f7cb3

  • SHA512

    9091c2e388108160b59d8a60c047cd1c815c7885553fc1502ee211ed4f7d6131e508c2222721fcb8166fb8e78660485a1b881e8341bb4ebf4d49af56f8840493

  • SSDEEP

    6144:MVXm4i6pO0v/YBxK8eFLj3qJ5/TX2oK/aQq:Ms4++8ijaJRO/y

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.0ff02e578b946881a6f80a1c511dc890.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.0ff02e578b946881a6f80a1c511dc890.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2284
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\system32\svchost.exe"
      2⤵
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3036
      • C:\Windows\SysWOW64\mspaint.exe
        "C:\Windows\system32\mspaint.exe"
        3⤵
        • Deletes itself
        • Adds Run key to start application
        • Enumerates connected drives
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2700
    • C:\Users\Admin\AppData\Local\Temp\NEAS.0ff02e578b946881a6f80a1c511dc890.exe
      "C:\Users\Admin\AppData\Local\Temp\NEAS.0ff02e578b946881a6f80a1c511dc890.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2556
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2740
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2bb62858c8ddda1c418241862b3bd9ea

    SHA1

    9839655b07a7add9ee99e88d3eb2cd5673327162

    SHA256

    81b850766c5ef921bbeff3fdaff136e82aaec80a1930d65124f3947c248be6ec

    SHA512

    f61c4f1236aae49854f2a629cf6cae2f45567b0cb983d418727599f4488485a1dada7c0fe6eb3b41e104efccb5e8b14795537e41455866f3236531fe21e82451

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    41cbc9e2ca9d7b47d094c0da5c4476b1

    SHA1

    325b5012b79f19b120601dbb9056df3ea8db6b53

    SHA256

    fb9cc853d8e81ae83b68663d8f855ebeb15b532dcc7a2e4ee344ee653a62d4ac

    SHA512

    34b983015d9aebebeff331d381f4a15383a190dc772572ac9ffdde53abf3269b1a5f6ddeb2342ab28238b58f40b2ef83cbd7e22859b3e0ae45cf7ab636953c5d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    18bbc339eb64aec9f857ae5a10594624

    SHA1

    12b72c8422204f4282591909f8683e784c8363cf

    SHA256

    9f513d856f5135ab549b3ca83adf7545186ad6170c33a95df146ec1d99ee35b1

    SHA512

    c3e32548b77fb37a561030f30e4fad881e2c9c82228080133a7409db673371837c739f7b62e9f45a9bf3ff8df8637d27e6646721164fcc677833456cb0cfa501

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c72d1d465df379c116c3db8c06af0834

    SHA1

    b940cac08d5df171bea21e487b57d849b44140d2

    SHA256

    5c509d011ee1afde32bf65826b66b209e7e94fb0713169a6ef66403eb8b5f60e

    SHA512

    eaa8071b7729d470b95de60be9ad56d9ae38b5fb63fe499a521ad6d1f3c0e7ce591a4564377e91263119f7c02c6557c265434b3382ee50fe1a28bf444b513cb9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7a181d61897424bc8f67519f40d8bea4

    SHA1

    d4f29758d1ab398daba899590e88709afcb98e23

    SHA256

    4b3c18ee641091c0251af2b6b536eeb093b8b69991752f4e80ed8d32ab98ac30

    SHA512

    730ae1d93764e0a2b7c505a5bb7e60d07a5cd8b05057b7c9853010ce9cf4ef4ffb5fdf330d6af352b6d21aefae442846db7e7fcbd8ed8c3e2ceb992fba920ea6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    975758616e6ad50237d1459b0da23645

    SHA1

    4e8c43be877118d03635500730b0ce9449d6fd44

    SHA256

    d7e2e6f888273a3eb6f7f3ef108f31dd0a60a7c620d6acfcc9967b6366072331

    SHA512

    22af8ad8a13999cdfc566bac80823090902d66afaf3d3354854d96b8424f2720cbaf77401b868def9a2454a6a6ef94e53d4d86e02f6fc0694912b6b6902f1bcc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    95d4aa57ede124c164305926ce14cfd4

    SHA1

    cde016609978d7c83986118877ef2b51f329b0f4

    SHA256

    c2d8e8ac82ce005057037d74684ce18dabb7140b210a1c96899c31c8bee3c787

    SHA512

    18dcbc6076d6784fd1ede9668b9f4b78135af451fe49e638ffc6384383f1b71aed6d3c2afee0a035c0e72de0552a818e032dcb2d16c63757f1c5032a0445885c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9f905d216cae8e6558a1e97b65793eb5

    SHA1

    e2c631c5e8b1e4473edf119dc4c144ee253c8d9b

    SHA256

    75df8a626e566058997ccc0b0a56d011b6b4051fb7738605753ec14ace60e745

    SHA512

    5d4d736d72f846675066c76fd06b5422ccbe3c2ec6bb6b13b74bab725bcda1c1bec9eb6ad543782ac0a75e50b2bc932a8075887d7464192ca94a5a6d11aeded8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1e81c56dd1e8d0e902343cf8714e3b34

    SHA1

    acdcb698c4e8149eea1bb91ed81fb75bba3dbb7a

    SHA256

    8ffd9be8d576c0df474be704acd42e97fe7668d397d8f88240e50c420ff5daac

    SHA512

    f746b8fdeb5f7a7c5bd81ccdecd9773b79b9f6ad774813fcdd302f57e090f53defc21175add8668f5a306fc457cb697a3b5944eeed1c8623d0d358d9b6bc5324

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9466e42b00d83b20418029fbf386d71b

    SHA1

    6854ec6e1562223eabcd538f03fec70c0ca19df3

    SHA256

    22d6ade52adde6f7e0633375aac15e43e69b8ecb45064efc96aef246a994831d

    SHA512

    a97ad5ab6650b5a13589e52eb83045106355fc7253e3cb91d8bb8a49184efd2dce6991d2cddcb813e08c90bb71ea53eee8a06152817abdabc404e5a5fc94b580

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7005b273e2a3b06b0c699663b5456b4f

    SHA1

    a799768f57f69b98bf5e8421914fca9027211013

    SHA256

    3c2b5df1d63d3805a7efb2e6f08e77fb12a4cb01d66691ed535f87c95c28995e

    SHA512

    fcfc21e5816f410aa198803ee34e590cc98a212c0edb3df7244953438891d751f870bc9c840d692122fb0727b290017d076750860602434fc2fcdc7b2c36f478

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    081e04dcd0c5af7011e38f70855aece7

    SHA1

    afae08d28a8d1004fcf9e6bb17725781d8473812

    SHA256

    979104d11d952a70e5c80f02b63e7a7c0fb46d303febc7d499aad958f4454171

    SHA512

    97a981a2344eac736e99602f0a317337be1a61cb2d7f583e82cbd394e0dba2553f7e36bf4e98bd79c63f03d21ec2c87b1db895db76c8cd9f88dcca6ad15ad3d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    57ce48190dcc75625827d6d2ef4b4500

    SHA1

    c64ce1e96b56883aeea01ce3c588309e159ccf81

    SHA256

    b1f0edf0a9eb36177e927996110c3817bfd224b8ab1226f95f42c59efe9420ca

    SHA512

    a85f8ac25f9ecb7212982c665400f19fdd6a7cba69d91c575900d1d380e83e1634fc183bac1db034406c9f6334e5ea1f9be0d6f7ac42dc538791072984a72b5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1e66f32c48e0c02b99cb8a8c8fe5b46c

    SHA1

    02f500e9df5e8ea11ec280fe77598c9bd284da9b

    SHA256

    c497d1cbb8426313caca5d5f007fb1a4640500b244e0e5d927b5877c48e29d53

    SHA512

    f184bac33fbed1a6eaa86e5f2a9bd59dbe7aa3f8d108c05474d45651f33d5756a2ad7bf9b15ed3f7b49fcf289ba4a576a9095b6d9fb515002887b4053226869d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    47779021fea113858b8717cd31800936

    SHA1

    7a73e3e61f54fbdb85752c0e9181979d7b76c12c

    SHA256

    7fe13c7536ba4b817db81166d65d6e8da9b746eaf16d217efd0eaa0d6ace5fcb

    SHA512

    ef5f09f94befcc12e7885fda4e4cf0c911d07d862bbef62f10b1b595dd73892fa2a09dcee1e253d291f41bcbd47511be3ee7938ec44e193a78c42f91da25c471

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5740197b0515a32a1791f5cfc585c5e6

    SHA1

    b675204aae0c9a053a4ed8ed3aa9849ef28b4e04

    SHA256

    1fd080ccc80be1e0d1ecb63983d732d4fbaec535fdbe2f174bb1b79c551bb740

    SHA512

    a3b1219d04ed4bdb33d833d9e4e8028eb50acdc1f4f09bdbef6ccf75095a46a16ef12182e674204b7561e181b3f09bb2e72cdae28a4059b085d4e1a26cf4a0ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    afc93a913f7fa0549e857d286334b69c

    SHA1

    cd17421bcfad3a1ae4c7f54d9bc89dd37c6fbbff

    SHA256

    907d4a4fc6f30b17d833b085f2ef1b4acde97df50b0cdc1bd8283ee3aaaf4dda

    SHA512

    e545dea6d89ae5c8a4496205b1d320900ca8133e1bace811714e5d88e229fe276b49e1b77375ad5424933c3904d9ea6af02d29845d77da3bb69e81e978841301

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c2d16830e8597adc3ae0f49d733c955d

    SHA1

    23def3897993f3b9da6a8b9e329347c4e3a17b28

    SHA256

    d2986a9e6bf5491e737d5c0884e00765dddbbbb24f0aa64fa638ed1a3e34091a

    SHA512

    2161ea7c336bf36497d1535d415204b36521e862cdb98095dd4d8bc26d81d2ac239ec758430e36e4bbab19a8cc69685b6bdf293b2312b5e59c13f90d63af5f25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a85ec4ff3d0c418a3fedfc9907d0b7cc

    SHA1

    e2e3a8e4a359dc4678b728ae593ef31dc0e513a1

    SHA256

    0a6bf0e427397c130e96ebecccee5d46a79cad0fb84161ffcada88f6eafc8d54

    SHA512

    182969c0fa6a71c0783d07a0748d70d80060dc7cd2ab88eedddc31494a16dbeed91587711e5171911fb584373cc779f04fa5a23351266eaf31ca736e62ba2fa6

  • C:\Users\Admin\AppData\Local\Temp\CabEA51.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarEAA3.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Roaming\Microsoft\Xksusr.exe

    Filesize

    317KB

    MD5

    0ff02e578b946881a6f80a1c511dc890

    SHA1

    99cafeb256475dfe4809dab942092b3095f7e1b7

    SHA256

    965c8ad9a47a0c82ceef371c2f6915573a536548368cca39c86c6bb3fb7f7cb3

    SHA512

    9091c2e388108160b59d8a60c047cd1c815c7885553fc1502ee211ed4f7d6131e508c2222721fcb8166fb8e78660485a1b881e8341bb4ebf4d49af56f8840493

  • memory/2284-27-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/2284-1-0x00000000001B0000-0x00000000001C4000-memory.dmp

    Filesize

    80KB

  • memory/2284-2-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/2284-0-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/2284-12-0x0000000001F20000-0x0000000001F71000-memory.dmp

    Filesize

    324KB

  • memory/2656-23-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2656-25-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2656-46-0x0000000000500000-0x000000000054E000-memory.dmp

    Filesize

    312KB

  • memory/2656-60-0x000000007788F000-0x0000000077890000-memory.dmp

    Filesize

    4KB

  • memory/2656-11-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2656-58-0x0000000000500000-0x000000000054E000-memory.dmp

    Filesize

    312KB

  • memory/2656-17-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2656-52-0x0000000000500000-0x000000000054E000-memory.dmp

    Filesize

    312KB

  • memory/2656-66-0x0000000000500000-0x000000000054E000-memory.dmp

    Filesize

    312KB

  • memory/2656-14-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2656-21-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2656-19-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2656-196-0x0000000000500000-0x000000000054E000-memory.dmp

    Filesize

    312KB

  • memory/2656-73-0x0000000000500000-0x000000000054E000-memory.dmp

    Filesize

    312KB

  • memory/2656-28-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2656-74-0x000000007788F000-0x0000000077890000-memory.dmp

    Filesize

    4KB

  • memory/2656-29-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2656-80-0x0000000000500000-0x000000000054E000-memory.dmp

    Filesize

    312KB

  • memory/2656-253-0x0000000000500000-0x000000000054E000-memory.dmp

    Filesize

    312KB

  • memory/2656-250-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2700-30-0x0000000000410000-0x0000000000411000-memory.dmp

    Filesize

    4KB

  • memory/2700-68-0x0000000004300000-0x000000000434E000-memory.dmp

    Filesize

    312KB

  • memory/2700-84-0x000000007788F000-0x0000000077890000-memory.dmp

    Filesize

    4KB

  • memory/2700-255-0x0000000077890000-0x0000000077891000-memory.dmp

    Filesize

    4KB

  • memory/2700-719-0x0000000004300000-0x000000000434E000-memory.dmp

    Filesize

    312KB

  • memory/2700-271-0x0000000004300000-0x000000000434E000-memory.dmp

    Filesize

    312KB

  • memory/2700-272-0x0000000004300000-0x000000000434E000-memory.dmp

    Filesize

    312KB

  • memory/2700-76-0x0000000004300000-0x000000000434E000-memory.dmp

    Filesize

    312KB

  • memory/2700-55-0x0000000004300000-0x000000000434E000-memory.dmp

    Filesize

    312KB

  • memory/2700-64-0x0000000004300000-0x000000000434E000-memory.dmp

    Filesize

    312KB

  • memory/2700-70-0x000000007788F000-0x0000000077890000-memory.dmp

    Filesize

    4KB

  • memory/3036-75-0x0000000000270000-0x00000000002BE000-memory.dmp

    Filesize

    312KB

  • memory/3036-44-0x000000007788F000-0x0000000077890000-memory.dmp

    Filesize

    4KB

  • memory/3036-56-0x000000007788F000-0x0000000077890000-memory.dmp

    Filesize

    4KB

  • memory/3036-59-0x0000000000270000-0x00000000002BE000-memory.dmp

    Filesize

    312KB

  • memory/3036-154-0x0000000000270000-0x00000000002BE000-memory.dmp

    Filesize

    312KB

  • memory/3036-53-0x0000000000270000-0x00000000002BE000-memory.dmp

    Filesize

    312KB

  • memory/3036-47-0x0000000000270000-0x00000000002BE000-memory.dmp

    Filesize

    312KB

  • memory/3036-39-0x0000000000270000-0x00000000002BE000-memory.dmp

    Filesize

    312KB

  • memory/3036-258-0x0000000077890000-0x0000000077891000-memory.dmp

    Filesize

    4KB

  • memory/3036-67-0x0000000000270000-0x00000000002BE000-memory.dmp

    Filesize

    312KB

  • memory/3036-43-0x0000000000270000-0x00000000002BE000-memory.dmp

    Filesize

    312KB

  • memory/3036-37-0x0000000000270000-0x00000000002BE000-memory.dmp

    Filesize

    312KB

  • memory/3036-35-0x0000000000270000-0x00000000002BE000-memory.dmp

    Filesize

    312KB

  • memory/3036-31-0x0000000000080000-0x00000000000A1000-memory.dmp

    Filesize

    132KB

  • memory/3036-15-0x0000000000080000-0x00000000000A1000-memory.dmp

    Filesize

    132KB

  • memory/3036-7-0x0000000000080000-0x00000000000A1000-memory.dmp

    Filesize

    132KB

  • memory/3036-10-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB

  • memory/3036-8-0x00000000000F0000-0x00000000000F1000-memory.dmp

    Filesize

    4KB

  • memory/3036-6-0x0000000000080000-0x00000000000A1000-memory.dmp

    Filesize

    132KB