Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    26/11/2023, 23:59

General

  • Target

    a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe

  • Size

    223KB

  • MD5

    8d3f2f53848fd102286d88695f8a223a

  • SHA1

    6c1990c0d2a15bdd6d259122f4341f5f9c23281b

  • SHA256

    a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f

  • SHA512

    f5ce8c099b0e50ed1cf217281ab7d0e3900415ad43fb4d9dac8a06aad9700585394f0d29d4c4c747e398f00d7de50e79b2730560bdd9015c792f7e3e6cefd80e

  • SSDEEP

    3072:QZ7wXfSRZ0ON/EwW66wN94xu4CkAZJM2k5D66L+NfGbVON2Nqi/6gS5UoWXHz72n:YwPSUONLNsuWA7koN+boRi9S6oiz72D

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Drops file in Drivers directory 9 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 9 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Drops file in System32 directory 23 IoCs
  • Drops file in Program Files directory 31 IoCs
  • Drops file in Windows directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 59 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:424
      • C:\Windows\Help\dvdplay.exe
        "C:\Windows\Help\dvdplay.exe"
        2⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2736
        • C:\Windows\system32\perfmon.exe
          "C:\Windows\system32\perfmon.exe"
          3⤵
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          PID:1952
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of AdjustPrivilegeToken
      PID:1248
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1284
      • C:\Users\Admin\AppData\Local\Temp\a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe
        "C:\Users\Admin\AppData\Local\Temp\a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe"
        2⤵
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:536
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe"
          3⤵
          • Deletes itself
          • Suspicious use of WriteProcessMemory
          PID:528
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 1
            4⤵
            • Delays execution with timeout.exe
            PID:476

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Cab4EED.tmp

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\CabB35A.tmp

      Filesize

      29KB

      MD5

      d59a6b36c5a94916241a3ead50222b6f

      SHA1

      e274e9486d318c383bc4b9812844ba56f0cff3c6

      SHA256

      a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

      SHA512

      17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

    • C:\Users\Admin\AppData\Local\Temp\Tar7499.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • C:\Users\Admin\AppData\Local\Temp\TarB36C.tmp

      Filesize

      81KB

      MD5

      b13f51572f55a2d31ed9f266d581e9ea

      SHA1

      7eef3111b878e159e520f34410ad87adecf0ca92

      SHA256

      725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

      SHA512

      f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

    • C:\Windows\1NUkHaI3appUSn.sys

      Filesize

      415KB

      MD5

      64bc1983743c584a9ad09dacf12792e5

      SHA1

      0f14098f523d21f11129c4df09451413ddff6d61

      SHA256

      057ec356f1577fe86b706e5aeb74e3bdd6fe04d22586fecf69b866f8f72db7f5

      SHA512

      9ab4ddb64bd97dd1a7ee15613a258edf1d2eba880a0896a91487c47a32c9bd1118cde18211053a5b081216d123d5f901b454a525cbba01d8067c31babd8c8c3c

    • C:\Windows\2OuDWbmricvxO5.sys

      Filesize

      447KB

      MD5

      d15f5f23df8036bd5089ce8d151b0e0d

      SHA1

      4066ff4d92ae189d92fcdfb8c11a82cc9db56bb2

      SHA256

      f2c40dde6f40beaa3c283b66791ff27e6f06d66c8dd6eff5262f51e02ee26520

      SHA512

      feaec8a00346b0a74c530859785e1b280da5833bf3113083bf4664ebee85b14ceca648499f36d266d329d602349f9ad0fc21a10e605377b3a2c24b456f3a9bd9

    • C:\Windows\8Z81Pimrt6YWy.sys

      Filesize

      415KB

      MD5

      2ab2cc083d6c7a14d0c2e76e9a110342

      SHA1

      b113699238f7b8e46786a8e114168333fbb32b80

      SHA256

      fd859ffcf859a029b960768c2e7825b51782422dbf678dee9b887e2863d3abba

      SHA512

      2ab0bbcb840508561d503bece9176b845c78d285c11a41d91acb8517b3bab1803d41b483c094a3dafafb43a2674ff8344bb1b5799177e95cdf82c6a998836a28

    • C:\Windows\Help\dvdplay.exe

      Filesize

      11KB

      MD5

      2c97f495cac9ec9d86bfb2c8a264133a

      SHA1

      976daabd0a2bc133380035aa7676362e05034109

      SHA256

      96a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2

      SHA512

      2d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76

    • C:\Windows\Help\dvdplay.exe

      Filesize

      11KB

      MD5

      2c97f495cac9ec9d86bfb2c8a264133a

      SHA1

      976daabd0a2bc133380035aa7676362e05034109

      SHA256

      96a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2

      SHA512

      2d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76

    • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      7713cf4d6ee5a0b897467e27fc581def

      SHA1

      9869b3de46a23fa07244cf08cb55d5b0d9592a75

      SHA256

      1d76cff93e76286855cd637b649e2e9481917ffb6dc0a17a9894d6f25c03b746

      SHA512

      3273afab124448dd9d5478f74ed49b38fec5d8e24673973b703491d920c0e0ff8e84659d0ec279ac70ce0967269c0caebb69d3a0e275d80e952b2ae7ad9ae63e

    • C:\Windows\w5WnC3Z2tXUy.sys

      Filesize

      447KB

      MD5

      c3f402c80c48412f277bd5be3b299e53

      SHA1

      6fbc5af54bad77872a23fe361666192d2653266d

      SHA256

      8ee6322b41af0a9dfbe278fa65a963358ba6734ceb681dd3eafb9387e43bc540

      SHA512

      22d1314d66404f9a6beab0c3141878f77af5f29bf139665149ac1ea01ab8e6b35eb6f7717b70ddb4f78688d5af79c7d4d518c4fec7b9a9b84a2fba07cba3c4bc

    • \Windows\Help\dvdplay.exe

      Filesize

      11KB

      MD5

      2c97f495cac9ec9d86bfb2c8a264133a

      SHA1

      976daabd0a2bc133380035aa7676362e05034109

      SHA256

      96a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2

      SHA512

      2d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76

    • \Windows\Help\dvdplay.exe

      Filesize

      11KB

      MD5

      2c97f495cac9ec9d86bfb2c8a264133a

      SHA1

      976daabd0a2bc133380035aa7676362e05034109

      SHA256

      96a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2

      SHA512

      2d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76

    • \Windows\Help\dvdplay.exe

      Filesize

      11KB

      MD5

      2c97f495cac9ec9d86bfb2c8a264133a

      SHA1

      976daabd0a2bc133380035aa7676362e05034109

      SHA256

      96a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2

      SHA512

      2d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76

    • \Windows\Help\dvdplay.exe

      Filesize

      11KB

      MD5

      2c97f495cac9ec9d86bfb2c8a264133a

      SHA1

      976daabd0a2bc133380035aa7676362e05034109

      SHA256

      96a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2

      SHA512

      2d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76

    • \Windows\Help\dvdplay.exe

      Filesize

      11KB

      MD5

      2c97f495cac9ec9d86bfb2c8a264133a

      SHA1

      976daabd0a2bc133380035aa7676362e05034109

      SHA256

      96a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2

      SHA512

      2d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76

    • \Windows\Help\dvdplay.exe

      Filesize

      11KB

      MD5

      2c97f495cac9ec9d86bfb2c8a264133a

      SHA1

      976daabd0a2bc133380035aa7676362e05034109

      SHA256

      96a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2

      SHA512

      2d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76

    • \Windows\Help\dvdplay.exe

      Filesize

      11KB

      MD5

      2c97f495cac9ec9d86bfb2c8a264133a

      SHA1

      976daabd0a2bc133380035aa7676362e05034109

      SHA256

      96a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2

      SHA512

      2d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76

    • \Windows\Help\dvdplay.exe

      Filesize

      11KB

      MD5

      2c97f495cac9ec9d86bfb2c8a264133a

      SHA1

      976daabd0a2bc133380035aa7676362e05034109

      SHA256

      96a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2

      SHA512

      2d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76

    • \Windows\Help\dvdplay.exe

      Filesize

      11KB

      MD5

      2c97f495cac9ec9d86bfb2c8a264133a

      SHA1

      976daabd0a2bc133380035aa7676362e05034109

      SHA256

      96a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2

      SHA512

      2d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76

    • memory/424-124-0x0000000000880000-0x00000000008A8000-memory.dmp

      Filesize

      160KB

    • memory/424-43-0x00000000007E0000-0x00000000007E3000-memory.dmp

      Filesize

      12KB

    • memory/424-45-0x0000000000880000-0x00000000008A8000-memory.dmp

      Filesize

      160KB

    • memory/536-46-0x00000000001B0000-0x000000000021E000-memory.dmp

      Filesize

      440KB

    • memory/536-79-0x00000000001B0000-0x000000000021E000-memory.dmp

      Filesize

      440KB

    • memory/536-0-0x00000000001B0000-0x000000000021E000-memory.dmp

      Filesize

      440KB

    • memory/1284-505-0x0000000002AC0000-0x0000000002ACD000-memory.dmp

      Filesize

      52KB

    • memory/1284-480-0x0000000002B20000-0x0000000002B21000-memory.dmp

      Filesize

      4KB

    • memory/1284-17-0x0000000002B00000-0x0000000002B03000-memory.dmp

      Filesize

      12KB

    • memory/1284-19-0x0000000002B00000-0x0000000002B03000-memory.dmp

      Filesize

      12KB

    • memory/1284-20-0x0000000007320000-0x0000000007417000-memory.dmp

      Filesize

      988KB

    • memory/1284-18-0x0000000002B00000-0x0000000002B03000-memory.dmp

      Filesize

      12KB

    • memory/1284-21-0x0000000007320000-0x0000000007417000-memory.dmp

      Filesize

      988KB

    • memory/1284-790-0x00000000089A0000-0x0000000008AC2000-memory.dmp

      Filesize

      1.1MB

    • memory/1284-789-0x0000000003A90000-0x0000000003A93000-memory.dmp

      Filesize

      12KB

    • memory/1284-565-0x0000000002AC0000-0x0000000002ACD000-memory.dmp

      Filesize

      52KB

    • memory/1284-381-0x0000000002B20000-0x0000000002B21000-memory.dmp

      Filesize

      4KB

    • memory/1284-564-0x0000000002B20000-0x0000000002B21000-memory.dmp

      Filesize

      4KB

    • memory/1284-556-0x0000000002AC0000-0x0000000002ACD000-memory.dmp

      Filesize

      52KB

    • memory/1284-539-0x0000000002AC0000-0x0000000002ACD000-memory.dmp

      Filesize

      52KB

    • memory/1284-522-0x0000000002AC0000-0x0000000002ACD000-memory.dmp

      Filesize

      52KB

    • memory/1284-99-0x0000000007320000-0x0000000007417000-memory.dmp

      Filesize

      988KB

    • memory/1284-489-0x0000000002AC0000-0x0000000002ACD000-memory.dmp

      Filesize

      52KB

    • memory/1284-396-0x0000000002B20000-0x0000000002B21000-memory.dmp

      Filesize

      4KB

    • memory/1284-135-0x0000000002B20000-0x0000000002B21000-memory.dmp

      Filesize

      4KB

    • memory/1284-479-0x0000000002B20000-0x0000000002B21000-memory.dmp

      Filesize

      4KB

    • memory/1284-140-0x00000000006F0000-0x000000000071E000-memory.dmp

      Filesize

      184KB

    • memory/1284-155-0x0000000002B20000-0x0000000002B21000-memory.dmp

      Filesize

      4KB

    • memory/1284-470-0x0000000002B20000-0x0000000002B21000-memory.dmp

      Filesize

      4KB

    • memory/1284-427-0x0000000002B20000-0x0000000002B21000-memory.dmp

      Filesize

      4KB

    • memory/1284-412-0x0000000002B20000-0x0000000002B21000-memory.dmp

      Filesize

      4KB

    • memory/1284-186-0x0000000002B20000-0x0000000002B21000-memory.dmp

      Filesize

      4KB

    • memory/1284-194-0x0000000002B20000-0x0000000002B21000-memory.dmp

      Filesize

      4KB

    • memory/1284-202-0x0000000002B20000-0x0000000002B21000-memory.dmp

      Filesize

      4KB

    • memory/1284-252-0x0000000002B20000-0x0000000002B21000-memory.dmp

      Filesize

      4KB

    • memory/1284-404-0x0000000002B20000-0x0000000002B21000-memory.dmp

      Filesize

      4KB

    • memory/1284-320-0x0000000002B20000-0x0000000002B21000-memory.dmp

      Filesize

      4KB

    • memory/1284-329-0x0000000002B20000-0x0000000002B21000-memory.dmp

      Filesize

      4KB

    • memory/1284-337-0x0000000002B20000-0x0000000002B21000-memory.dmp

      Filesize

      4KB

    • memory/1284-352-0x0000000002B20000-0x0000000002B21000-memory.dmp

      Filesize

      4KB

    • memory/1952-129-0x0000000001E50000-0x0000000001FF6000-memory.dmp

      Filesize

      1.6MB

    • memory/1952-112-0x0000000000230000-0x00000000003CC000-memory.dmp

      Filesize

      1.6MB

    • memory/2736-136-0x0000000000880000-0x00000000008A8000-memory.dmp

      Filesize

      160KB

    • memory/2736-100-0x00000000004F0000-0x00000000004F1000-memory.dmp

      Filesize

      4KB

    • memory/2736-185-0x00000000058D0000-0x0000000005A9A000-memory.dmp

      Filesize

      1.8MB

    • memory/2736-176-0x0000000005700000-0x0000000005822000-memory.dmp

      Filesize

      1.1MB

    • memory/2736-101-0x00000000004F0000-0x00000000004F1000-memory.dmp

      Filesize

      4KB

    • memory/2736-98-0x00000000004F0000-0x00000000004F1000-memory.dmp

      Filesize

      4KB

    • memory/2736-134-0x00000000006F0000-0x000000000071E000-memory.dmp

      Filesize

      184KB

    • memory/2736-102-0x00000000004F0000-0x00000000004F1000-memory.dmp

      Filesize

      4KB

    • memory/2736-131-0x0000000001E50000-0x0000000001FF6000-memory.dmp

      Filesize

      1.6MB

    • memory/2736-97-0x0000000000880000-0x00000000008A8000-memory.dmp

      Filesize

      160KB

    • memory/2736-125-0x0000000005700000-0x0000000005822000-memory.dmp

      Filesize

      1.1MB

    • memory/2736-127-0x0000000000500000-0x0000000000501000-memory.dmp

      Filesize

      4KB

    • memory/2736-103-0x00000000004F0000-0x00000000004F1000-memory.dmp

      Filesize

      4KB

    • memory/2736-113-0x00000000058D0000-0x0000000005A9A000-memory.dmp

      Filesize

      1.8MB

    • memory/2736-111-0x00000000058D0000-0x0000000005A9A000-memory.dmp

      Filesize

      1.8MB

    • memory/2736-570-0x0000000002AC0000-0x0000000002ACD000-memory.dmp

      Filesize

      52KB

    • memory/2736-95-0x0000000037450000-0x0000000037460000-memory.dmp

      Filesize

      64KB

    • memory/2736-41-0x00000000000C0000-0x00000000000C1000-memory.dmp

      Filesize

      4KB

    • memory/2736-602-0x00000000004F0000-0x00000000004FA000-memory.dmp

      Filesize

      40KB

    • memory/2736-39-0x000007FEBF540000-0x000007FEBF550000-memory.dmp

      Filesize

      64KB

    • memory/2736-40-0x0000000000610000-0x00000000006DB000-memory.dmp

      Filesize

      812KB

    • memory/2736-677-0x00000000004F0000-0x00000000004FA000-memory.dmp

      Filesize

      40KB

    • memory/2736-110-0x0000000000610000-0x00000000006DB000-memory.dmp

      Filesize

      812KB

    • memory/2736-777-0x00000000004F0000-0x00000000004FA000-memory.dmp

      Filesize

      40KB

    • memory/2736-109-0x00000000006E0000-0x00000000006EF000-memory.dmp

      Filesize

      60KB

    • memory/2736-37-0x0000000000610000-0x00000000006DB000-memory.dmp

      Filesize

      812KB

    • memory/2736-33-0x0000000000090000-0x0000000000093000-memory.dmp

      Filesize

      12KB

    • memory/2736-27-0x0000000000060000-0x0000000000061000-memory.dmp

      Filesize

      4KB

    • memory/2736-25-0x0000000000180000-0x0000000000243000-memory.dmp

      Filesize

      780KB

    • memory/2736-108-0x0000000003BF0000-0x0000000003CA7000-memory.dmp

      Filesize

      732KB

    • memory/2736-107-0x0000000003BF0000-0x0000000003CA7000-memory.dmp

      Filesize

      732KB

    • memory/2736-106-0x00000000004F0000-0x00000000004F1000-memory.dmp

      Filesize

      4KB

    • memory/2736-105-0x00000000004F0000-0x00000000004F1000-memory.dmp

      Filesize

      4KB

    • memory/2736-104-0x00000000004F0000-0x00000000004F1000-memory.dmp

      Filesize

      4KB