Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

21/02/2024, 03:56

240221-ehdpwsbf32 3

21/02/2024, 03:52

240221-efkenaba6z 4

21/02/2024, 03:49

240221-edm3rsba2z 3

Analysis

  • max time kernel
    142s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    21/02/2024, 03:49

General

  • Target

    A1.py

  • Size

    2KB

  • MD5

    d5fe66c95538284c75363f4b0c8d4581

  • SHA1

    40714520dafe2c27560f2345e830276b5a5eecdc

  • SHA256

    006b8d042862590447b34e6c5bb2f196e4e0fdeffd95734fd0de1a7b07e6e507

  • SHA512

    e39ee887708d5ab729bceb42c01ad6cb36666907f4dec772e4852694f7b62e806537eca1229b63fe1dfb37e9acbbee1c5cd359ca4af757cd6fe9c2601e590a93

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 13 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 52 IoCs
  • Suspicious use of SendNotifyMessage 48 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\A1.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\A1.py
      2⤵
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:3008
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\A1.py
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:2796
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5f39758,0x7fef5f39768,0x7fef5f39778
      2⤵
        PID:2876
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1172 --field-trial-handle=1364,i,1491020388655509608,16125239822914473174,131072 /prefetch:2
        2⤵
          PID:1452
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1392 --field-trial-handle=1364,i,1491020388655509608,16125239822914473174,131072 /prefetch:8
          2⤵
            PID:280
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1564 --field-trial-handle=1364,i,1491020388655509608,16125239822914473174,131072 /prefetch:8
            2⤵
              PID:1968
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2272 --field-trial-handle=1364,i,1491020388655509608,16125239822914473174,131072 /prefetch:1
              2⤵
                PID:828
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2260 --field-trial-handle=1364,i,1491020388655509608,16125239822914473174,131072 /prefetch:1
                2⤵
                  PID:764
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1588 --field-trial-handle=1364,i,1491020388655509608,16125239822914473174,131072 /prefetch:2
                  2⤵
                    PID:1340
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3272 --field-trial-handle=1364,i,1491020388655509608,16125239822914473174,131072 /prefetch:1
                    2⤵
                      PID:560
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3680 --field-trial-handle=1364,i,1491020388655509608,16125239822914473174,131072 /prefetch:8
                      2⤵
                        PID:2304
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3676 --field-trial-handle=1364,i,1491020388655509608,16125239822914473174,131072 /prefetch:1
                        2⤵
                          PID:1700
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3680 --field-trial-handle=1364,i,1491020388655509608,16125239822914473174,131072 /prefetch:1
                          2⤵
                            PID:2660
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1112 --field-trial-handle=1364,i,1491020388655509608,16125239822914473174,131072 /prefetch:1
                            2⤵
                              PID:1380
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=1364,i,1491020388655509608,16125239822914473174,131072 /prefetch:8
                              2⤵
                                PID:1608
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2024 --field-trial-handle=1364,i,1491020388655509608,16125239822914473174,131072 /prefetch:1
                                2⤵
                                  PID:2464
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2636 --field-trial-handle=1364,i,1491020388655509608,16125239822914473174,131072 /prefetch:1
                                  2⤵
                                    PID:1536
                                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                  "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                  1⤵
                                    PID:3012
                                  • C:\Program Files\VideoLAN\VLC\vlc.exe
                                    "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\HideImport.wav"
                                    1⤵
                                    • Suspicious behavior: AddClipboardFormatListener
                                    • Suspicious behavior: GetForegroundWindowSpam
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SendNotifyMessage
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1792
                                  • C:\Windows\system32\cmd.exe
                                    cmd /c ""C:\Users\Admin\Desktop\DismountClear.bat" "
                                    1⤵
                                      PID:936
                                    • C:\Windows\system32\rundll32.exe
                                      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\∞
                                      1⤵
                                      • Modifies registry class
                                      PID:2844
                                      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
                                        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\Desktop\∞"
                                        2⤵
                                          PID:2240

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        344B

                                        MD5

                                        f7e87eee0166b896f4cf8b3433d01ddb

                                        SHA1

                                        bc747e7a7b403b8035c14072a1e06c9815886dc8

                                        SHA256

                                        e06cd1c9660d3384e003b9656a64eaba108fd526aa542a762bf6601689bfd202

                                        SHA512

                                        06600b63c1b41559196b7e01eea5db7838f0e0c5e14c5543d59d242542bc0df27e4c1ba96e2d4f5e49b8dcf5af1626efd5ef149059d18e650d5054083c499a9e

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        344B

                                        MD5

                                        d2bde1bf170221fdb4d21bfc9f5f270b

                                        SHA1

                                        a611308176804206b7e514969042c67391fa9eab

                                        SHA256

                                        e5dc565722633d39906e631510e5220db44c85f85338974a49cca46def71aa14

                                        SHA512

                                        ad97bfd3a302efa01300451b2e11f9fc8e39ee4fa5005a705a206f6787d87dfd2511491d4569898ae16ad56582f11642c52be3504433b16b5eee62b3aa136f47

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000007

                                        Filesize

                                        194KB

                                        MD5

                                        ac84f1282f8542dee07f8a1af421f2a7

                                        SHA1

                                        261885284826281a99ff982428a765be30de9029

                                        SHA256

                                        193b8f571f3fd65b98dc39601431ff6e91ade5f90ee7790bfc1fba8f7580a4b0

                                        SHA512

                                        9f4f58ab43ddadad903cea3454d79b99a750f05e4d850de5f25371d5bec16fc312015a875b8f418154f1124c400ae1c82e2efd862870cd35c3f0961426c8cd82

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                        Filesize

                                        264KB

                                        MD5

                                        f50f89a0a91564d0b8a211f8921aa7de

                                        SHA1

                                        112403a17dd69d5b9018b8cede023cb3b54eab7d

                                        SHA256

                                        b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                        SHA512

                                        bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                        Filesize

                                        363B

                                        MD5

                                        23804dccee4ced4b2e98b46dae35e082

                                        SHA1

                                        adb6d6e5daf43bc1fa774c91ebc811f4213c6936

                                        SHA256

                                        4fd6e98609325b6418a11bf6398157e3423098192601a5636447c39b5df8f31d

                                        SHA512

                                        91adef443faafab719fed98709e9de6a1b806df54200ee0e39929e38474d0cdac7665f463d178ba77aabd7e754ef12bf052071330af7ecbc82eb6f25f90f7e67

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                        Filesize

                                        854B

                                        MD5

                                        14ab7f84926082f89d0daa1086dac740

                                        SHA1

                                        fa869fd963e966cf38bfa4800f63ac1ad5afccfb

                                        SHA256

                                        a56616a7689b49e03f9861cfa68fd845c79c2d2e5a5af5ffce225c7985e5ae8a

                                        SHA512

                                        38359de52007d5a0ff9455952d20f76b09d81a49e768b5125a2a40d0c4581a77f15aa820e643c0950e2fa5122e9de0aceddbc6e39d4b2a758e407afab8dc2eee

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity~RFf77cbf6.TMP

                                        Filesize

                                        363B

                                        MD5

                                        4dffc7763a6a7356665248f26daf864e

                                        SHA1

                                        ac3bbb417088665aed6e532d5c283cef8f25349c

                                        SHA256

                                        fe878d1de260acbec5f3d526997f5ac0b996f49a873182c9ee57af93588de0d9

                                        SHA512

                                        a8e053f09bcb0a2490c9044836213e0037595a984024811bb5f1d4da97f59dfff4bb293b898a7c1b670ace971fee6846862a311ef60c8dae84bd62f24e6cbbae

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        5KB

                                        MD5

                                        1a3f56bc799bd991f0a416174c0b7a57

                                        SHA1

                                        53634eaa878b08626a98ebc7fb452ebd70a54220

                                        SHA256

                                        bf2a23c8f5c58d93daf4ac603bf5584c0f6f2919a2e55b0c3a88bca14aaa2234

                                        SHA512

                                        4ac116478fc101a9f615c5f0151ce8d9be50937ebf4f2ab154ef638fbd526c7b5b8a2905024da3f97ee283a770d211917509c41ab3a3e1ae3ee823cc3af83eea

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        4KB

                                        MD5

                                        13ae96031f6a5cbb3d10172afd242b67

                                        SHA1

                                        f18980c32d7866d03b90a15ba9d2d542f22dc59b

                                        SHA256

                                        00b6fefd148b1c9929508c3b33e25193e4b05afecfbd3740525c41df7b8ff9de

                                        SHA512

                                        47e0b56070efd6b219f420654f3135bbc22ac83a61c232cee8d4f06352c2643681c9b63c270b4c693e0af3a24d8a76242076059aa2e8d38f723bc6c63f29f779

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        5KB

                                        MD5

                                        6c034e3a8f919c71eece4bf6096e085e

                                        SHA1

                                        2559d383a9208a11eb13d6c1b4c2e07557221e1a

                                        SHA256

                                        8ce7ad83abfbd50850a4368d64473516f1f0a20ad6da078968e08334c99771db

                                        SHA512

                                        66774c7cf412d873ccac448655d033fa72e87176690b818cc3a1908b2001d051b9c47804471a71b3ef639bd68454b3ad546bff1913c7c428d4c13ece073a0cd9

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        5KB

                                        MD5

                                        0ed39f137e64a74ab5c67dd0e64c04f4

                                        SHA1

                                        1e8f7d179a8cc67a963e6022f5f873694ba86478

                                        SHA256

                                        46c4aaa4a9ff8d327fdb8d7b2e7210b9e1f97375e056834e6b30e3972a1169fa

                                        SHA512

                                        d2b8f2cab9a4592d8dff0b30a4dd1057de0940d9cd3ffdece6a4179ba19a4fb16c57a91c100eef086c4f2099091a82e3db2664a586bb7e86e93de1532c87c00a

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\CURRENT

                                        Filesize

                                        16B

                                        MD5

                                        18e723571b00fb1694a3bad6c78e4054

                                        SHA1

                                        afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                        SHA256

                                        8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                        SHA512

                                        43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                        Filesize

                                        240KB

                                        MD5

                                        59ef3be22ca3193e669b14fd0833e108

                                        SHA1

                                        d20262684c989b0228734b50591d814ddf044677

                                        SHA256

                                        f3e47b320d2f8c95353dd9adc92c290284d8ec7132577f2014aec7dbb77dfbd3

                                        SHA512

                                        8b077d27dbe04729334b5615d2274839d12bac2235e238d890e8cfbae6c41d413bff32d6756b0c5e22dff62f7342f651da71005706d51c57a739fd2d7acb7f7f

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\b285eb32-f062-4c06-b0e4-e54e70bfc2b1.tmp

                                        Filesize

                                        240KB

                                        MD5

                                        276efa60aecda36f9a47c229a62d5687

                                        SHA1

                                        3278393696494802658ba231dd834a49b9ccca27

                                        SHA256

                                        cb80ea7b8fcd1df63fce79808109a8720b0a2142798083e2d3961fc1fa056758

                                        SHA512

                                        fdbc6bcf14610e5267d3650f6748e22a4af474eaa2fabe4b751ca1ad01404c2c6104b5036406018d893629182b31ff102367c47084ba5dfcf0dcc23998da3fec

                                      • C:\Users\Admin\AppData\Local\Temp\CabA5F2.tmp

                                        Filesize

                                        65KB

                                        MD5

                                        ac05d27423a85adc1622c714f2cb6184

                                        SHA1

                                        b0fe2b1abddb97837ea0195be70ab2ff14d43198

                                        SHA256

                                        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                                        SHA512

                                        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                                      • C:\Users\Admin\AppData\Local\Temp\TarA662.tmp

                                        Filesize

                                        171KB

                                        MD5

                                        9c0c641c06238516f27941aa1166d427

                                        SHA1

                                        64cd549fb8cf014fcd9312aa7a5b023847b6c977

                                        SHA256

                                        4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

                                        SHA512

                                        936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

                                      • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

                                        Filesize

                                        3KB

                                        MD5

                                        03cc87920689df3a8783c384227dfc24

                                        SHA1

                                        41773b27347e083605cdf97c4f9d4ab99d978bf8

                                        SHA256

                                        5ba62f9a3e019b4a4d94c186ea93e90392dd40d7a7cccaca13b0a64822d684d9

                                        SHA512

                                        6ed231775cd399b0170a22635d4f02a034cd49739d339571ba04d92398b334cd2383bd8b615365f69555891c518d9c54848391b89fc58ab5c5c71fd43f594716

                                      • memory/1792-533-0x000007FEF6350000-0x000007FEF6361000-memory.dmp

                                        Filesize

                                        68KB

                                      • memory/1792-549-0x000007FEF4280000-0x000007FEF42D6000-memory.dmp

                                        Filesize

                                        344KB

                                      • memory/1792-526-0x000007FEF6370000-0x000007FEF6624000-memory.dmp

                                        Filesize

                                        2.7MB

                                      • memory/1792-530-0x000007FEF6790000-0x000007FEF67A7000-memory.dmp

                                        Filesize

                                        92KB

                                      • memory/1792-531-0x000007FEF6770000-0x000007FEF6781000-memory.dmp

                                        Filesize

                                        68KB

                                      • memory/1792-529-0x000007FEF67B0000-0x000007FEF67C1000-memory.dmp

                                        Filesize

                                        68KB

                                      • memory/1792-528-0x000007FEF67D0000-0x000007FEF67E7000-memory.dmp

                                        Filesize

                                        92KB

                                      • memory/1792-527-0x000007FEFB5D0000-0x000007FEFB5E8000-memory.dmp

                                        Filesize

                                        96KB

                                      • memory/1792-532-0x000007FEF6750000-0x000007FEF676D000-memory.dmp

                                        Filesize

                                        116KB

                                      • memory/1792-524-0x000000013FE30000-0x000000013FF28000-memory.dmp

                                        Filesize

                                        992KB

                                      • memory/1792-534-0x000007FEF5810000-0x000007FEF5A10000-memory.dmp

                                        Filesize

                                        2.0MB

                                      • memory/1792-535-0x000007FEF57D0000-0x000007FEF580F000-memory.dmp

                                        Filesize

                                        252KB

                                      • memory/1792-536-0x000007FEF42E0000-0x000007FEF538B000-memory.dmp

                                        Filesize

                                        16.7MB

                                      • memory/1792-537-0x000007FEF57A0000-0x000007FEF57C1000-memory.dmp

                                        Filesize

                                        132KB

                                      • memory/1792-538-0x000007FEF6330000-0x000007FEF6348000-memory.dmp

                                        Filesize

                                        96KB

                                      • memory/1792-539-0x000007FEF5780000-0x000007FEF5791000-memory.dmp

                                        Filesize

                                        68KB

                                      • memory/1792-540-0x000007FEF5760000-0x000007FEF5771000-memory.dmp

                                        Filesize

                                        68KB

                                      • memory/1792-541-0x000007FEF5740000-0x000007FEF5751000-memory.dmp

                                        Filesize

                                        68KB

                                      • memory/1792-542-0x000007FEF5720000-0x000007FEF573B000-memory.dmp

                                        Filesize

                                        108KB

                                      • memory/1792-543-0x000007FEF5700000-0x000007FEF5711000-memory.dmp

                                        Filesize

                                        68KB

                                      • memory/1792-544-0x000007FEF56E0000-0x000007FEF56F8000-memory.dmp

                                        Filesize

                                        96KB

                                      • memory/1792-545-0x000007FEF56B0000-0x000007FEF56E0000-memory.dmp

                                        Filesize

                                        192KB

                                      • memory/1792-546-0x000007FEF5640000-0x000007FEF56A7000-memory.dmp

                                        Filesize

                                        412KB

                                      • memory/1792-547-0x000007FEF55D0000-0x000007FEF563F000-memory.dmp

                                        Filesize

                                        444KB

                                      • memory/1792-548-0x000007FEF55B0000-0x000007FEF55C1000-memory.dmp

                                        Filesize

                                        68KB

                                      • memory/1792-525-0x000007FEFAA40000-0x000007FEFAA74000-memory.dmp

                                        Filesize

                                        208KB

                                      • memory/1792-550-0x000007FEF4250000-0x000007FEF4278000-memory.dmp

                                        Filesize

                                        160KB

                                      • memory/1792-551-0x000007FEF4220000-0x000007FEF4244000-memory.dmp

                                        Filesize

                                        144KB

                                      • memory/1792-552-0x000007FEF5590000-0x000007FEF55A7000-memory.dmp

                                        Filesize

                                        92KB

                                      • memory/1792-554-0x000007FEF41F0000-0x000007FEF4213000-memory.dmp

                                        Filesize

                                        140KB

                                      • memory/1792-565-0x000000013FE30000-0x000000013FF28000-memory.dmp

                                        Filesize

                                        992KB

                                      • memory/1792-567-0x000007FEFAA40000-0x000007FEFAA74000-memory.dmp

                                        Filesize

                                        208KB

                                      • memory/1792-569-0x000007FEF6370000-0x000007FEF6624000-memory.dmp

                                        Filesize

                                        2.7MB

                                      • memory/1792-571-0x000007FEF42E0000-0x000007FEF538B000-memory.dmp

                                        Filesize

                                        16.7MB

                                      • memory/1792-582-0x000007FEF3970000-0x000007FEF3A82000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/2796-24-0x0000000001CC0000-0x0000000001CC1000-memory.dmp

                                        Filesize

                                        4KB