Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    130s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2024, 00:30

General

  • Target

    d6bd697860b7d7949f116fe082d78e8ba8775c55d5b0002255491e546313d633.exe

  • Size

    820KB

  • MD5

    58a22bd7a300da6547a6326f5c0c819a

  • SHA1

    057bd3fc1b0309f72de62d67b447cd7e3fa99031

  • SHA256

    d6bd697860b7d7949f116fe082d78e8ba8775c55d5b0002255491e546313d633

  • SHA512

    46a8ca787c8a77bc391cbc846ebdbdeabf6195b8f33cef011ea3202e7185afd7ef55b3399cb76dfd700a9988169bd868a0d5e8298b1360f789b1d254d89dc258

  • SSDEEP

    12288:qz+slYvILhLf7YgW19QJIFXzUWMZafyDG7/:BIdLf7EQJLICI

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 9 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d6bd697860b7d7949f116fe082d78e8ba8775c55d5b0002255491e546313d633.exe
    "C:\Users\Admin\AppData\Local\Temp\d6bd697860b7d7949f116fe082d78e8ba8775c55d5b0002255491e546313d633.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2044
    • \??\c:\users\admin\appdata\local\temp\wmpscfgs.exe
      c:\users\admin\appdata\local\temp\\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2368
    • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1612
      • \??\c:\users\admin\appdata\local\temp\wmpscfgs.exe
        c:\users\admin\appdata\local\temp\\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2528
      • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2548
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:576
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:576 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1752
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:576 CREDAT:472074 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe

    Filesize

    829KB

    MD5

    c752aa75bd90da3eb2bd340fb8b03984

    SHA1

    1c822a1808d62d64bdf3c05fcb4952b5d12e486e

    SHA256

    aa35e9c8aa9112953876ca03c91f2da10d734085f66834900d09e62ccaf5f2ae

    SHA512

    27892a59ec76d58d01eced2be00294406a3d5db0567d121076e166fc806c1b3845b8f314415c9cdee460a73abd5bf77d24805a70cd293c29e1fcdf0c00bc226b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3b2b962135ca126bbe63ddce9c7ce656

    SHA1

    6e7065ffbcff76f49167eb1ec336cbf73484ab6f

    SHA256

    bbbad8280c39769ace90b9289cb2352a3b95a86cf891a9b1a39fc25f0f29ee63

    SHA512

    e293b3cb169e50cc3a33384a513957b0157a1239fbd891b63504dff8c7bbc2082b6423fa3fc2e8ecc2e6734eec1381fa627051e3c0ec844dcc778e9972c97d22

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e0760b19de8b34408bf848050966e8d2

    SHA1

    b74cb989e4da1943b425eb8dea373f29e2a3ae15

    SHA256

    9c08851ae0be133f628f71b24c4b485e31071b96e69b66b800d8373fabb45f13

    SHA512

    ba0ba274eed45698f670a67ec62b71c74c08aa496c58156638af6dbe71df005a2e991f45d2e5e546453d89e5faa8910d28007d3479a3fb9c3cde7b01e91facaf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0868b1a5c52659f025f29eabd62b6187

    SHA1

    6d522442c1e7a932528505f73dadf3553c7ecff0

    SHA256

    6e315870fb2e70c0ac9d4b85d1fd91e59b7bcfd51aa1a39a13d17f5f587c9848

    SHA512

    0fe8f11bb28cf3a5496c1e399e311468cf1d5f966169b45a3fd27204c5975871211b5b1dc8a62908c4198c77620d09644513877beee0f0c75f20e5c6019a4a94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    19fc40e806e79c44794a2838d8d0b3ef

    SHA1

    388ea3e8d290388080b9f90d4e712e31d19dc882

    SHA256

    61472372418c8ee5d69dd641f7bbae4589c186566c27acb842ec70b309d4ca8a

    SHA512

    5f29f7cf09f9443b599bf76a7a36e3179764bfab92058139f1ee4ac607acde542499c36beba69c5990c753ae971eb8374ad8f57731c0c1b439696ca16be64112

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    61e9eb08592e6cbb7232a628ff750528

    SHA1

    e7ad0530b240c79f278f41d7aae1a847964a593d

    SHA256

    bcb65ace89bb0fcc85c4f396062649c17d27cd871378afdcf3e0efde51b844eb

    SHA512

    73e65de44025deed44137d2294cbc8267d5234538489db2ed427a304e2b061156d5fd201ac941488e0dd8293b0cf726e6df326c01aa7907e7131d2a69447a433

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6b100fc1fb061221451828c41de8fa46

    SHA1

    0b8c5e39587630148cb3b537d45d9a78636e0068

    SHA256

    4240d51c7c02f33feb40806ae919a915e8989436744e8c15229ae158bcf79e36

    SHA512

    9b970f6e22f4648ae7ea37cfbae9d8035e374c354b2571638ea4331828c9c19c940867822895b7637ee74ae27c16dc573c8d83fc11e61ca8bb97589b2612df0d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bcb875cf312259b09637d8a70862c72b

    SHA1

    cdfa479b0435197dca8c481f4f2d4abfaa276445

    SHA256

    66cb949c0d1fba8409bcda6986a69a627e87f96210608a83ca4796ae2b0d19ff

    SHA512

    d7099a088371505e996a966999cc5a47af6f72e3f2b7c34c1315cc306208acbd6f7400b42d84591ba834603717dba270930cc710a25479d7683caf044408d416

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7a0ed81852abd48181d44141cda2fe2d

    SHA1

    f099f11447ac1e60a972e9ff3dbcbd68222924ae

    SHA256

    683b1d1464979c0b27f241ea26f411b2d73a536423a6a3f41f4a52d22f9f5475

    SHA512

    9db717ed673ca9229b3fbfa1a2eec58a6f28b2d316f4f97464d7cea7e2d7f85c74f568615e8798b21ba90b210c8fdaa3bae9e8f7c89a88ca8d0dbe7583d363e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4b0fb0b54ff563cd2d68dc280c028411

    SHA1

    54bbdc0a71b9432457036c7abae7c8a8a52646f6

    SHA256

    a74baf4dd7d8fc19b5243c451b171dd78f9567d48fd23b4af4d6d54270e710ce

    SHA512

    6fcea7775d9313da63bbdecc5de319eed517c9d63384779832c5b624944ca3074d13fbd7871f39a78b0c6f7f28aefb7312799a4aec2e3f8efc3459db5915f725

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c8af1c649b67abcea1b8214da2f7985c

    SHA1

    20df1166db2f2bf3a9002b38242aa514ddabd914

    SHA256

    ee01c677626c89fb9ceb932d4bb3aabae8d43f96483befc66748849171bb5f64

    SHA512

    8d12acc7d9c4ca65701814d7c2119cdd325df909d314f8af8b48f06324ed32ce3ad3e0c3b2803ad5b3377e984c3d8fac29f586c2da6e9315c6810fa38e95b00b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    21eddb03b7da5a3ec8914bb702a649e1

    SHA1

    647cb16c6460ff0c53211cd4047b992e66fc45b2

    SHA256

    c898cd5c46f20a4186030d225d840e7962ef6044702d865997c2bd1f7105effc

    SHA512

    8f13ffe1319bc1a07ebb6e4986018ed9344ff060fcb99b0bb06e54584e67da4af111646a16b45a8b15cb6dbe4b0fd5dc84be955028ea2df24bf8e32aa759f7ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    130753ee6791214fb8374b8c803fef39

    SHA1

    b5a57606e51fd7053fb8473e9b564edec818de0d

    SHA256

    65e268bd934a23eef7683abfc6e228124381e3fa0bec362316c0e7974f046afd

    SHA512

    1f7f087febfd8b73809c08a77861e99db638780505a6594d18aa34fab45deca28d225797379878eb201c7aba9792e26c7cdda708d1f547712b22cc1a173e72f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    47028956620990f371e6635441e271c2

    SHA1

    301d90fc54112a8df71ad45c17c370d2f932e2a6

    SHA256

    27af0fc131c0ef0ee157b64426813f4b259328f0958bdb3406d9ede71fc1a0b2

    SHA512

    35ddb4f0848be5b78379d1220f75354f9aee5e19794f84a26ad77c6bd3098a829960c415edeb67e74cf418d31b8b6aa363e0e8183acbb725bec8492da2f40ced

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e2f396bb9006d5398b14f9aec65e472f

    SHA1

    9c86602594c01888461c2d820b6d4486a7ef73b0

    SHA256

    b4b3322bea207bb558aab141166d59bfc059e64fa94dc1818740b16b64a55c9c

    SHA512

    2d114c624be51065c6c3ebf792786ba7e0b4d83f90fe56203bbc8ff9301f1381ba5ddd13c1c14397224951f5c2a7bee070cd190362cec520453fd2788a067ffe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3f799f0234a4a08b401af845898c766e

    SHA1

    176b5745ae15152f7ce8ef428ba74a81e51dfab1

    SHA256

    295cebc82a429a5579e23e8f0c352373adf25178f91e31a8d36bd1f486d9d190

    SHA512

    b994bbcc9dc8ad568b86160e37489cf421fb4556245a03c8dc241fc8f104745754eaabac2d44392949b43f211866430e32892cdec089ad18b63a61d440767048

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    379b0d9e2d2bd80fce7fbe8058825b04

    SHA1

    ee1dfe664733f495ac5e1600bdb052805d57ad3f

    SHA256

    1a35d37233aeefff7752146ffa6c403e2e233286af62382344c2225c3f4d8af4

    SHA512

    07017374f4d109e549c66e91d65be9abe1c6436ee463f17c8477741c26528356102da5ed17cbd75b9e8406b8e1a5158826ab9719ef6087561aa5dfe1e2899139

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U8A9A2DI\bBKUoULwz[1].js

    Filesize

    32KB

    MD5

    97451820d38de2419d8d60401fb3dcc3

    SHA1

    5af4a1ce7bbe427d4ddecb19b1f836622015d399

    SHA256

    d6921ce574cf816a962cd14ec8530150ffe35f482e2f0b61b7be4395b5bd40b0

    SHA512

    7ebdb7dffc5afc78c006f01410631e60f356341acadaa43197857500e882d7526f6d787c5288c3311d07a95f0a05a07416fbb8b4a6ca0be67865cb6bac9821ed

  • C:\Users\Admin\AppData\Local\Temp\CabD211.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarD350.tmp

    Filesize

    106KB

    MD5

    6e189e54b7b70970337ed23f60ee6c20

    SHA1

    c541b094a1b9c045a8dc43abb31bcfda56331c0f

    SHA256

    3b8dd9cd393fc2b1d80e9ca68e72e6167c954d57612eae86c569c1175c5fa8d9

    SHA512

    751560a676e7251def15f42916e9b54e164f297fc89874e4412b02267c79025bb6b66a35db4a55a4c7dd3d513a27dabfa23d5ed3e1adf817b7315fd1bdddd9db

  • C:\Users\Admin\AppData\Local\Temp\wmpscfgs.exe

    Filesize

    830KB

    MD5

    1cd3c157c87ab9583c16bf0bd002b6a8

    SHA1

    b086d7cfb2e600e896f681a4d813307b2ec60f2e

    SHA256

    84c9ac9c79580d12becfb5bc80ea95ffb1db2973e49c5e656f26ba8e7dd13911

    SHA512

    aff24653f6550bc6d0720fba2677e155fcb2c9ac96cf9eb5edd78a4b38d1396d5147e6216c1a6c494d4e5e44bce3563f27727e3ea7f39b178345362b870d340e

  • C:\Users\Admin\AppData\Local\Temp\~DF799F583B880C2D58.TMP

    Filesize

    16KB

    MD5

    fdc28f40f5c699e0e43c7aa1b899ac1f

    SHA1

    6dc876f68a8da326ee97a0ccbc0cef82a311d3d7

    SHA256

    bfe1e77b55477e0c4b8b1121cc60afb4e2865dca695435b83c6cf2fc4077ef1e

    SHA512

    d5f91a93ce3ed63a39397604c4ea9dbee3fd80d5df792dee131d7232116510a446dd3a2e8f30a9bf5e57664ea8d2767da0c844fd4e7175d12dad316800529cef

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\FM3ZZC75.txt

    Filesize

    122B

    MD5

    8e12ddfca22cb907bf99a9239dad5d3a

    SHA1

    a56268252e4a7d463df9cb97004e17d7eda3a81e

    SHA256

    31c6b3ca730a781e7d80400cf8e5b95acaccb54a453ea1207e01983d8d004f1e

    SHA512

    5d343a97674ad212fce4681bfeed1b3b620ebd47790b4af99fb7e29c4d7e498b28803be82bc8b749b3ee4db20863bc823c51f4f032ca0f255bf21567680cc436

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\OF962S0X.txt

    Filesize

    105B

    MD5

    2fdbf4a548a17b720bdeba14dddf29c5

    SHA1

    9396af14141ab90a33eeee32f513eb488d37663d

    SHA256

    13a64ace22ea741c648cbd2cc856a2c98782677f0b172c96f8e29cfd81195963

    SHA512

    598dbbdf7acb4f35970dd27b1442459ecba7240f9d870f28bec8cb87408b7bbc52845a6aefb046ebf5224bb4a485682889878c57ed588da5b9deab07e3a2a4fb

  • \??\c:\program files (x86)\adobe\acrotray.exe

    Filesize

    836KB

    MD5

    e49d6896e9ac3f153c1c6220b3425a64

    SHA1

    394cc43fe38f1581b035e307b1307947ccf162ae

    SHA256

    dfa6f1b2ecda6b6afc6d8489247f52d0b425b12f02bbfd7443770543e74534b8

    SHA512

    07380fce62bc9df7376b61242f32517775f487ad855c761a1cf204e15cfdd0b834a9970727d6d63bc3d2295a9c232d8b50af22e49dd256a436ae1aa22a61084a

  • \??\c:\program files (x86)\microsoft office\office14\bcssync.exe

    Filesize

    822KB

    MD5

    c76988315136d8dc6a4a8ac6b33dac7c

    SHA1

    e2fb0ba22a6225d42701e2ee536272fc48251371

    SHA256

    b0b514c95f125afe9ef8ebc10c0751949816f64efbd0e1b16c9d7aed2f82edf0

    SHA512

    45eb92a1705c8ebf769d011b6dc653e69eabd90bc9f18f3e77a000e48c24e53443b874f5426d984d38991a4631234cd01c0b025545425f903210a75ad1bdd924

  • \Users\Admin\AppData\Local\Temp\wmpscfgs.exe

    Filesize

    704KB

    MD5

    4eca221dcfa996dcef6683d11b5a3fb6

    SHA1

    92027edeee4103203ab46bdb941df91951e1cc61

    SHA256

    cddce125d4a91e0e8eccbf8de87232ec1bf9679506aa56996036a772c5cdc33e

    SHA512

    678d36c8d10f8d800359918ea0ebc51f9ab3230be1c304dc6e413996548e4272a985a0f6d25459ccd70b3d560df0aa50a598bd0e867441c2e6bcf87ee6eeb5e5

  • \Users\Admin\AppData\Local\Temp\wmpscfgs.exe

    Filesize

    845KB

    MD5

    f14e0139c87f5bbda40b4eecb32f8d1c

    SHA1

    65c83c883667602ff8312f677f87b86b98546bb6

    SHA256

    8e98f3b06b6ca073a822fd060bf2593bca5aeaac25f671b59cdb55e455a7b556

    SHA512

    bfa1d40356cac0eaada8634ebac3724286af0c823a85cb9f54d79415dfeeb064d14f2bfcccf4174c8d7ec2243bdb237d16582f46c8f00474f88e2cfda313e8d5

  • memory/1612-27-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/1612-72-0x0000000000280000-0x0000000000282000-memory.dmp

    Filesize

    8KB

  • memory/1612-71-0x0000000000260000-0x0000000000281000-memory.dmp

    Filesize

    132KB

  • memory/1612-66-0x0000000000260000-0x0000000000281000-memory.dmp

    Filesize

    132KB

  • memory/1612-26-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2044-11-0x00000000003D0000-0x00000000003F1000-memory.dmp

    Filesize

    132KB

  • memory/2044-24-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2044-1-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/2044-0-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2368-567-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2368-43-0x0000000000890000-0x0000000000892000-memory.dmp

    Filesize

    8KB

  • memory/2368-17-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2528-69-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2528-92-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2548-70-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2548-88-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB