Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    5s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 04:28

General

  • Target

    542125699bda1d6021af5ac4e6954ed2.exe

  • Size

    16KB

  • MD5

    542125699bda1d6021af5ac4e6954ed2

  • SHA1

    ae486f186e3775920e092a095868f2f8ed3d59f8

  • SHA256

    cfe15d2df1942fc342b5ff432385415b2986b0a1426aee36b1285b4d10d9867d

  • SHA512

    bfd78f9dba3b4d7143bd316ec48f37ea9046f7a8f084dae077b799cb98826e38586b47a27233aa1c5caf70eef488123e7524017a21bf713d66a3f615c18ceacb

  • SSDEEP

    384:Iy76FphlRGXtBYAeewY81XYMjpAp8lO3hcczrfZRI:WPDRktBYAwxju6lOnrfZ+

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 10 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 10 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 23 IoCs
  • Modifies registry class 18 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\542125699bda1d6021af5ac4e6954ed2.exe
    "C:\Users\Admin\AppData\Local\Temp\542125699bda1d6021af5ac4e6954ed2.exe"
    1⤵
    • Loads dropped DLL
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259409444.bat
      2⤵
        PID:1420
      • C:\Windows\SysWOW64\stjxakin.exe
        C:\Windows\system32\stjxakin.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5444
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259410131.bat
          3⤵
            PID:5516
          • C:\Windows\SysWOW64\stjxakin.exe
            C:\Windows\system32\stjxakin.exe
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Installs/modifies Browser Helper Object
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:5568
            • C:\Windows\SysWOW64\stjxakin.exe
              C:\Windows\system32\stjxakin.exe
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Installs/modifies Browser Helper Object
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:5668
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259410334.bat
                5⤵
                  PID:5728
                • C:\Windows\SysWOW64\stjxakin.exe
                  C:\Windows\system32\stjxakin.exe
                  5⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Installs/modifies Browser Helper Object
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1344
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259412564.bat
                    6⤵
                      PID:1348
                    • C:\Windows\SysWOW64\stjxakin.exe
                      C:\Windows\system32\stjxakin.exe
                      6⤵
                        PID:1400
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259414405.bat
                          7⤵
                            PID:2248
                          • C:\Windows\SysWOW64\stjxakin.exe
                            C:\Windows\system32\stjxakin.exe
                            7⤵
                              PID:3324
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259415560.bat
                                8⤵
                                  PID:3376
                                • C:\Windows\SysWOW64\stjxakin.exe
                                  C:\Windows\system32\stjxakin.exe
                                  8⤵
                                    PID:3432
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259418555.bat
                                      9⤵
                                        PID:3524
                                      • C:\Windows\SysWOW64\stjxakin.exe
                                        C:\Windows\system32\stjxakin.exe
                                        9⤵
                                          PID:3572
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259421581.bat
                                            10⤵
                                              PID:1160
                                            • C:\Windows\SysWOW64\stjxakin.exe
                                              C:\Windows\system32\stjxakin.exe
                                              10⤵
                                                PID:2456
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259431316.bat
                                                  11⤵
                                                    PID:5160
                                                  • C:\Windows\SysWOW64\stjxakin.exe
                                                    C:\Windows\system32\stjxakin.exe
                                                    11⤵
                                                      PID:4780
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        cmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259468335.bat
                                                        12⤵
                                                          PID:5700
                                                        • C:\Windows\SysWOW64\stjxakin.exe
                                                          C:\Windows\system32\stjxakin.exe
                                                          12⤵
                                                            PID:4688
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              cmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259502000.bat
                                                              13⤵
                                                                PID:4528
                                                              • C:\Windows\SysWOW64\stjxakin.exe
                                                                C:\Windows\system32\stjxakin.exe
                                                                13⤵
                                                                  PID:4676
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    cmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259543262.bat
                                                                    14⤵
                                                                      PID:4696
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  cmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259532420.bat
                                                                  12⤵
                                                                    PID:4736
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  cmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259498755.bat
                                                                  11⤵
                                                                    PID:5144
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  cmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259461752.bat
                                                                  10⤵
                                                                    PID:4444
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  cmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259455122.bat
                                                                  9⤵
                                                                    PID:4408
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  cmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259448008.bat
                                                                  8⤵
                                                                    PID:4600
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  cmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259446011.bat
                                                                  7⤵
                                                                    PID:4560
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  cmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259443687.bat
                                                                  6⤵
                                                                    PID:4536
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  cmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259442610.bat
                                                                  5⤵
                                                                    PID:4512
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                cmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259440910.bat
                                                                3⤵
                                                                  PID:4656
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                cmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259448086.bat
                                                                2⤵
                                                                  PID:5700
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                cmd /c C:\Users\Admin\AppData\Local\Temp\~DFD259410209.bat
                                                                1⤵
                                                                  PID:5616

                                                                Network

                                                                MITRE ATT&CK Enterprise v15

                                                                Replay Monitor

                                                                Loading Replay Monitor...

                                                                Downloads

                                                                • C:\Users\Admin\AppData\Local\Temp\~DFD259409444.bat

                                                                  Filesize

                                                                  121B

                                                                  MD5

                                                                  09517fc62284f33e877a276463580bd1

                                                                  SHA1

                                                                  0b14fe1db4493818f9de0bf2a56ee5370b8d479a

                                                                  SHA256

                                                                  6cc6bbb1f3f754b6894d84130f5f2d86569ac3a603e1632d3cefa028f22b6238

                                                                  SHA512

                                                                  1b924dd216d0f38199cc6df215e65ff260aa48fa37aa620dabcbc616f434643bd1f2e617d66b14bd52900214148741565128ba9589782ba582fd7308369f4a4d

                                                                • C:\Users\Admin\AppData\Local\Temp\~DFD259440910.bat

                                                                  Filesize

                                                                  242B

                                                                  MD5

                                                                  8d3d0b11282ed7f1707c38bd28ac531f

                                                                  SHA1

                                                                  aea382c85827e538a235ccccc86da2bad660f58c

                                                                  SHA256

                                                                  c76899d4ce01e20d1a359f759cb3fd685ef732b76ce2838486182da5abcb26cc

                                                                  SHA512

                                                                  d78cf15d7c4af99598b0151019e76b2d1a95056e6274d5e82f2bc276e6c31c8f64be0bbfa40c50102626c8e8e04c43a7e46f0ef2af0cfec02ad3d062e00eb2dd

                                                                • C:\Users\Admin\AppData\Local\Temp\~DFD259446011.bat

                                                                  Filesize

                                                                  121B

                                                                  MD5

                                                                  fbe040169fe8d8da373af471238e2139

                                                                  SHA1

                                                                  5bd0bb0f3da2df996354d666a2974cce7c790257

                                                                  SHA256

                                                                  60cf091534f758a9c4514b4243fa1f31570187311cbabc136d9b5bfb1d71d0da

                                                                  SHA512

                                                                  e342ebf3179f7f30527657868a663c2572ff2054adde49b2ff65f298a9188bece720d0f4cd696f8f255ec60cd3a51c66e8e09c2a62ad0e961198caae837ad569

                                                                • C:\Users\Admin\AppData\Local\Temp\~DFD259448086.bat

                                                                  Filesize

                                                                  197B

                                                                  MD5

                                                                  778aec69857727327591be9d4bb0b161

                                                                  SHA1

                                                                  5536f1db045eb982d8d2a3c10ae65bf522235c9a

                                                                  SHA256

                                                                  74f778e3d9458e397db53b940eb26038029ea083c75c27285c05da52a3322d92

                                                                  SHA512

                                                                  51d9f60b7839a63bf22c7b6f9671fb8fd1483bf85ab8396ef6f8535039afb0061497888f64f61585f34986d873f26f5842a0796839c1b511b9f201c250f935f3

                                                                • C:\Windows\SysWOW64\erjxakin.sys

                                                                  Filesize

                                                                  1KB

                                                                  MD5

                                                                  9c19410e8c397b363bd56a95c80fc8e9

                                                                  SHA1

                                                                  47636558fb5eba16f172c84bec44a86fefcc1f08

                                                                  SHA256

                                                                  2bcd6f90c573d7bdbd7d4cf929267337a40c319c5e9c68b4acbb2dc3fba819fb

                                                                  SHA512

                                                                  976670ab73ab66dfda687b1d0c92e308ed0afc2eb8ac7393910c90e61383498891f13869ae04ac3bb5a4d71e8a3b2a57d3375b3a726c1001554d267b1c7348c4

                                                                • C:\Windows\SysWOW64\erjxakin.sys

                                                                  Filesize

                                                                  1KB

                                                                  MD5

                                                                  84946dcbc1009b575361c86864c05f1f

                                                                  SHA1

                                                                  122db35c2c18e16788a0af5d52d0d9a65d1157dd

                                                                  SHA256

                                                                  7414d312341aaf8528c83ce7aad682fd64914e3906fb6d3772a515691be5221b

                                                                  SHA512

                                                                  7f7f95c7678d2437ec969801dd253bc9c3797df26efa6d458ddae764865b04efe7181e3c1250414f88ec6d99b126f2fa3109397ba7cd58aee3776fd17182667f

                                                                • C:\Windows\SysWOW64\erjxakin.sys

                                                                  Filesize

                                                                  2KB

                                                                  MD5

                                                                  7601bdcf8e254cffb509e7ea05ceda68

                                                                  SHA1

                                                                  9c08720abf84b53bd67d60df25a3c8e31b34bd2d

                                                                  SHA256

                                                                  f34de2a13c6040958880676fcf95652060e6805841d7a8e0549b9434a6e54b31

                                                                  SHA512

                                                                  29ca7f142b74b37b2a5589164088f423b84337c5dee87be7bc8be0a6692d646a2d867c39fc5b4bd62dfbcaaf1196db26a39c3638395c7cb937fdebab33676a16

                                                                • C:\Windows\SysWOW64\erjxakin.sys

                                                                  Filesize

                                                                  2KB

                                                                  MD5

                                                                  b9d9354290be26e3a2d4cc44e5c2662a

                                                                  SHA1

                                                                  e4a08e23c816cac3bb1792fc64073673e675ca7b

                                                                  SHA256

                                                                  6f5cd208d8a6ef3649b0995e195f53bfe03eb31b13efa61f701372c300e5fe1c

                                                                  SHA512

                                                                  0d46eee985b4a4e7de4ddfc9c5cb233a66e7876928af0c93b95b2674056d4dfb3e03fa0f8d06a8b0108b037850f6867377592d3d3e079b33f74e817d93275fc5

                                                                • C:\Windows\SysWOW64\erjxakin.sys

                                                                  Filesize

                                                                  3KB

                                                                  MD5

                                                                  126bf2bd81bd60cca8d26e7d39e4e05b

                                                                  SHA1

                                                                  367fbc5925ef2b2bdf6c1e38d3bec7ee99429ba9

                                                                  SHA256

                                                                  5d7c784b1f1c1a83b78a44bc87ff446585aad34c9b9575c8ce9629ef00b36dac

                                                                  SHA512

                                                                  378de0d2273c8f19b46e162bd5d12f55d7ce5007407022c025aebcdd59ef360a52b92f70fbb2032dfc2bf79ae86503c7673696a4ddceecc54fc6b8f9c8511f4b

                                                                • C:\Windows\SysWOW64\erjxakin.sys

                                                                  Filesize

                                                                  3KB

                                                                  MD5

                                                                  16c21be145bed1e868738cf83b63f428

                                                                  SHA1

                                                                  6cf82cb1dbfbcb8170098f86a5669aa3926bb3d0

                                                                  SHA256

                                                                  d593a0a0f4067c98151bc8b7a49bd8859fa6d9d8b061110689bebf4c03c784a5

                                                                  SHA512

                                                                  77d95ed438941921ff0b0fe60d33ab3e47126e6750f2425c10aafb6c6d1eab27bfe2620a0bfc357ad26262886cdfae34f4e9efbbd30aa705e4b9ac2b2fb75b6a

                                                                • C:\Windows\SysWOW64\erjxakin.sys

                                                                  Filesize

                                                                  4KB

                                                                  MD5

                                                                  69a99134ede990b192f34dbd1a62df2d

                                                                  SHA1

                                                                  9d2714a600767721de0221d12dfda24a7c70a083

                                                                  SHA256

                                                                  00f22ee5d42cc4fffced84d7d38ddd6b62f1ee193535448ac0d06a7633a677b3

                                                                  SHA512

                                                                  cce156da8f4f88c7f0176c9438514031a849b57bbe532f993259189642d1cc598fc721777516be2383032d772e71b53e4dd0171f69d29f54d55a18d6bf717dd5

                                                                • C:\Windows\SysWOW64\erjxakin.sys

                                                                  Filesize

                                                                  4KB

                                                                  MD5

                                                                  fae138adc26dcbd246d12c5e88d790a1

                                                                  SHA1

                                                                  76fe07148e774ae57fd48760bd951b9e5df34737

                                                                  SHA256

                                                                  05a4ff0e59fea10b283ff3013c07bdba114050b845ca84377238b2f754ad1ece

                                                                  SHA512

                                                                  c4eac1a7d848f13aecdae6c9c876f4b7aea2f77876c40ad072e027592af53d6bf109a1556ae8517f33beaf395b706a64c1546ef721b5b7774c09e5809fe7616e

                                                                • C:\Windows\SysWOW64\erjxakin.sys

                                                                  Filesize

                                                                  5KB

                                                                  MD5

                                                                  561a97b7b991064a326c486d7423ab10

                                                                  SHA1

                                                                  13a0530164935e8ab4aa03b9d3408cd6ca694fd1

                                                                  SHA256

                                                                  0d00eb39f787044e52a53f44e984198e29d638a869b93fc42c8018aa99d94aa0

                                                                  SHA512

                                                                  5d3c76eb091642ede2fae188262536892843d30fffbf3e67b7890770e302ed62f524807acd835fb104933ae1befc35f0f375ec1eac3c5178e8087030ffd161b9

                                                                • C:\Windows\SysWOW64\erjxakin.sys

                                                                  Filesize

                                                                  5KB

                                                                  MD5

                                                                  1d230246b36043365992c1216e90aa82

                                                                  SHA1

                                                                  d654eb34617c6b413569433c15022497fdf150c4

                                                                  SHA256

                                                                  abff39eaa8982983204cc17f8c0089781b4db04c770f18499cb09b6dec17e229

                                                                  SHA512

                                                                  2a49f75b32b0d700d8376a82638d4460936ffccd5b20b2724414ace028e14c913be3c82b64d0de0e28606e926f015291ef7b2445782671719832f538afd6fd52

                                                                • C:\Windows\SysWOW64\rijxbkin.dll

                                                                  Filesize

                                                                  524KB

                                                                  MD5

                                                                  a9fbf2fdb36b23407aaca4f78ca39094

                                                                  SHA1

                                                                  678024c727517d112b8acec2cbbd9b55c30b6e29

                                                                  SHA256

                                                                  567f162613f6258172d88231aed4db6402e93a80d9367b63b866040047c39a01

                                                                  SHA512

                                                                  1e3ad3312e1412c85745bac2f0fc3364361ceae29a4a745f6a0f29d29f632b3392fbefa2f31ffc6a73b01d4135a3cac5d6aaf87c4453f52d22e27e9dc55276e6

                                                                • C:\Windows\SysWOW64\rijxbkin.dll

                                                                  Filesize

                                                                  234KB

                                                                  MD5

                                                                  08b591c341872006fce34bf4133d7e93

                                                                  SHA1

                                                                  1dadcf903f477b7ba8474ca5532cecca2892bf25

                                                                  SHA256

                                                                  6a91045b7cad2f29e51f04fb1818edbd88333f896ff009a65d3342ffd5ec90b1

                                                                  SHA512

                                                                  90ab44bee5ed000be2188d927573cd94d1c1a22bbb032672f971f434234aab55a9104210d5a337d480a4421e50168669058e65413ce2a9b31f061fe2af740458

                                                                • \Windows\SysWOW64\stjxakin.exe

                                                                  Filesize

                                                                  16KB

                                                                  MD5

                                                                  542125699bda1d6021af5ac4e6954ed2

                                                                  SHA1

                                                                  ae486f186e3775920e092a095868f2f8ed3d59f8

                                                                  SHA256

                                                                  cfe15d2df1942fc342b5ff432385415b2986b0a1426aee36b1285b4d10d9867d

                                                                  SHA512

                                                                  bfd78f9dba3b4d7143bd316ec48f37ea9046f7a8f084dae077b799cb98826e38586b47a27233aa1c5caf70eef488123e7524017a21bf713d66a3f615c18ceacb

                                                                • memory/1344-3182-0x00000000002F0000-0x000000000030A000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/1344-3133-0x00000000002F0000-0x000000000030A000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/1344-2111-0x00000000002F0000-0x000000000030A000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/1400-3134-0x0000000000400000-0x000000000041A000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/1400-3201-0x0000000000360000-0x000000000037A000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/1400-3153-0x0000000000360000-0x000000000037A000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/1400-3200-0x0000000000360000-0x000000000037A000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/2400-0-0x0000000000400000-0x000000000041A000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/2400-3158-0x0000000000380000-0x000000000039A000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/2400-1032-0x0000000000380000-0x000000000039A000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/2400-3136-0x0000000000400000-0x000000000041A000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/2456-3202-0x0000000000400000-0x000000000041A000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/2456-4297-0x00000000005B0000-0x00000000005CA000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/3324-3155-0x0000000000400000-0x000000000041A000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/3324-3218-0x00000000001B0000-0x00000000001CA000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/3324-3159-0x00000000001B0000-0x00000000001CA000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/3432-3179-0x0000000000260000-0x000000000027A000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/3432-3220-0x0000000000260000-0x000000000027A000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/3432-3219-0x0000000000260000-0x000000000027A000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/3572-3197-0x0000000000260000-0x000000000027A000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/4688-7368-0x00000000002F0000-0x000000000030A000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/4688-6693-0x00000000002F0000-0x000000000030A000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/4780-5326-0x00000000003E0000-0x00000000003FA000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/4780-5327-0x00000000003E0000-0x00000000003FA000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/5444-3178-0x0000000000270000-0x000000000028A000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/5444-1061-0x0000000000270000-0x000000000028A000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/5444-1047-0x0000000000400000-0x000000000041A000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/5444-3176-0x0000000000270000-0x000000000028A000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/5568-1067-0x0000000000220000-0x000000000023A000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/5668-2092-0x0000000000270000-0x000000000028A000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/5668-2095-0x0000000000270000-0x000000000028A000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/5668-3181-0x0000000000270000-0x000000000028A000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/5668-3180-0x0000000000270000-0x000000000028A000-memory.dmp

                                                                  Filesize

                                                                  104KB