Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    124s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2024, 02:11

General

  • Target

    a31caf45df20b90deb44b8d2b89e5dd0_NEIKI.exe

  • Size

    5.8MB

  • MD5

    a31caf45df20b90deb44b8d2b89e5dd0

  • SHA1

    1aa5aa2973af1a5b756fdaafec0c24186e11dda3

  • SHA256

    2c6c4f1a9af7e5d4710d7ce874f3d93166d7d98a9a096be21a1ab38c92635407

  • SHA512

    4b25932bb1850c322fe9134b9a4a7b69b3c2f92c847074878e489b13e7d32c0aa1d83243ce83f584a579b6c9d125ba71126fe029a933c8707222954d4da13364

  • SSDEEP

    98304:aLo5QTQrSjGzwbEwxCMPJVWlNKK31yzX6kPmh3ue7FH0oRVoiwhSi2BEiOfcCbEB:lkQujGjwxdBVxpHmj9nmhv2SiOfcCbw

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 10 IoCs
  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a31caf45df20b90deb44b8d2b89e5dd0_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\a31caf45df20b90deb44b8d2b89e5dd0_NEIKI.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2860
    • \??\c:\users\admin\appdata\local\temp\wmpscfgs.exe
      c:\users\admin\appdata\local\temp\\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2580
      • \??\c:\users\admin\appdata\local\temp\wmpscfgs.exe
        c:\users\admin\appdata\local\temp\\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1316
      • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2448
    • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2584
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2492
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2492 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:356
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2492 CREDAT:537611 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a557b6ed343ff1010eeef0bdd0061b36

    SHA1

    84ae0e817a26ccda12fa6916e734e18398f6bfe5

    SHA256

    9655c7898c1bdf060b75da68d01b40d60b39c7a1e507e4b87342f4733579b02a

    SHA512

    f8c06fb272bff962a0043469a8089a63212d967a48186e4b4161d68054b828e5cee6d26d2b3e82767642a8102c26e72d3f6936d4d9e9e0b5319b5ecca90f2b59

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dbac3d4690cb607113d71019b21c1881

    SHA1

    6e4df5263ffebbf544d49c098948c7fdf2c3db56

    SHA256

    50980e51d531fb904b417b3ff817f1becc04f691041e1a1c2d6d8215785286cb

    SHA512

    4e3b44a44bb1a12cf7cae267d4e46253bd3798b00774d9fe96731c0c50b4309ba579c324c9aa77f0dfd5bf47fe6edbfb97b49d6e3653b1d56903df1e84e27164

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    693a4ebed6a2713bb9f76abd3183db88

    SHA1

    cbeb17bd4967904c7d2a7392d603d7f7e1b97ba7

    SHA256

    0ff6b49e4dd40b9a7bf3014bb637fe3bf49c59e27da44265b2cd80fc7696444d

    SHA512

    a7ece4433f6dd2594b656859f61be93786e1b26f9be7122e86d7228213d67952766e4bbce7ed87b5593765d2aa2c4cf5c0d79ec5fb1fca3b5554abf03a063cb4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aabfccd64d3c5291a889482235c09f35

    SHA1

    e170cb029df8c7a373df3322a5b563e713117dd6

    SHA256

    698c03481c02304bba6336c7615e03aa6482bd3b3454fdaa9bbfec888c965d55

    SHA512

    9b084421d2ffe96b2ee7a9980958b7e14442d7ea715de9799f77bff787940d1b0a0a91ae133070e0a0a112f8257715a858bf9ef1a02c73973ddf654bf80a6881

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7ec9cfdfd3770ee3e2dfd4164206942f

    SHA1

    26bfa5bc81c2a1a8824bbdc45d78e29050d82ecf

    SHA256

    3371728d3cc99df980d844dab2a7cdac2f118768915f411b2ab86daddbfef363

    SHA512

    be30c753d9a827417540aa7bddbd66af0d0e08a29113f59bac3012179b74e4ced2b6b145e38f3ef0c7d94d8f797b5efaf0910cfd1e0cf0c377b1f56d6962cd45

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e4f51840bf2c608df783954b4685e29e

    SHA1

    8b0646bc0cf5a95e69d71e955ab9d85ecdfedb41

    SHA256

    d36b865d38e483f840af2ad03444ac21136d1804560cb6e3f90d6f1d52aab7dc

    SHA512

    8b558df57f6e8d9c19241450b5610d08d567b26e8d6a0ea42f50478fafbbb72932677890aa874297f64cc6e09b5af927ba7da0b97c67afc6728b9ecd21de8ec3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e0d51495392223613fd60e22a8cab60a

    SHA1

    268c4dc49e017c41117b066b0d35c120263a58d1

    SHA256

    7d68addb793b5e15c449b48448af14aec48e0f71a9e2cd31eb816973fbba1652

    SHA512

    336d6b65a213bedb2313022b3e18f99f132e114c7469ddd070732cf4afd3e0064d7f3d4b8d42759ec483f7cfa544918111636c940471b9d8a130a2aab911dfa7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    312b2e2e140aaf61f55e6fdde8752643

    SHA1

    4c7bb61acc3385409079d8f8e634aa095e40e895

    SHA256

    cbeada0d4d0f56135284dd198c0b9b3091b62b4a34ed5e2d522ca8e898e8890b

    SHA512

    f38cd9496c66b225aae732cac4e54fd8508de1df0712edd522f4e771a36749f48612ffe5595acf368f2c31898d1ac8b46bfa48fe97ea2c996dd3e6c4a93508a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5abf4e6699f8f89305a0dad779299e09

    SHA1

    d0cfb56d40f58a5b49c78adb362e40d5a75b6a33

    SHA256

    eecd5406fcb6995860f3321e2ceabffa94dba8ddf504b75ad74be6f6664cc737

    SHA512

    9c58dc4907c3a8c68d81ce6bf6e1abb4a9b08725223e244fbaee49e9b9963fb3cdc04bcb06d15073e9cd8dda0713875d385ce638f7ca30843d8d1d6fee3a93a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8af696eb19cc00cefc1cec68c9c3c6f0

    SHA1

    36748c3743175555361ea8997ef11c9ae1b99d15

    SHA256

    45c9cfebb5271f7ad9f6a2fb3f375dd4fd20bf6680be568198f230ff11906713

    SHA512

    b7bad2e5c4cb21765fa591595254ae23eee85ef6632fd18910597356322a65596277921a3f8d8fc7cf0d3396af4fbb76d42ed3aaff0d594d5bd5747792bb3250

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f65ccb2ecceb27811c2de107f67799b1

    SHA1

    ee2fedc81a4b989fcaf86851d887c33b71fc262c

    SHA256

    4ed697748c3673698a55912643622a9d22a208114f8cca7ee116e6b87ea2ab5d

    SHA512

    66751edb7c46b44767cb36c539e41e12a2f9dbc25ef5e9a98bedadc71b7659b39708b13289d86029bc88aef40edc7c74b87c8a3a7caea6ca14479d509b63c15b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    517dff05649314a9a4168fa639c3c291

    SHA1

    6f35dfe2878d079833084b40429c92ff06a14371

    SHA256

    117c03c4caf2cc9721712c9d74c7de8cda8121bf86802b30540869b207f23b5a

    SHA512

    0555ddbe7ca203210d2f1b10edf65c9b006c3ab8fb655b499b04d11a3215b06d04607b47b19a98a8c8b03b3868d8fefef2c0f5c8d019e47fd3a3c76a186facc9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    88e14a12ef2d0a73139b44ef36c3b491

    SHA1

    226107a51cf0eec95fa6a21470397e2b0518536b

    SHA256

    8f6e01bff7441562a771b1ef9f9a2afb8ba24fbaf00cd53c8a5a12253057477f

    SHA512

    5e2c8cf2a8eb5f0bbccbd5e24a11325e8d763f01093a90ee28008cef8935687dc02786c1f177533c3ae395cc4a3ef2044ccb3d8f74a34628e08713902c70959f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4f5180bc529a7c88718c32447b213964

    SHA1

    b69cb9af219d8f01a10ba1891fbec5b49bff7599

    SHA256

    fca59204e4e54f2509e86268c52ac7b46adb298b2caf84f6b0c61131d70dbb34

    SHA512

    d62552f6f105b697881bc4ccf331a2a725df5c378a7e1c340fc183d8e11142476d1bf2c140a23e929fbfdbf429cb6be128b2514463401c64a21aca4e8f6f301f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4f0be8025d036fdbd6a60946d0ff2545

    SHA1

    2e824df9761bef6a9ee678cd4f647568ac9e0389

    SHA256

    9071330d0d40e7ad9f8c66e4e19c22f429bcd1e53164561f531f1ba2b55a60d4

    SHA512

    a6c5846ab734154faaac136e84af76be1397c7435ac0578daf421ccee4f546d1953669fc8463c5b7868fd1cb2160bdea897524cfa7a4c28e5041e577f1c11fc0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b8427ddab07e051d98655d0b24fc5c33

    SHA1

    3b2f4dcc3b7269d1f7de4cf0aa301620f883aafd

    SHA256

    e4884590e0ce9151b2afcd5b2a8eef03e4581f922d36834b39f8a72fd18110ed

    SHA512

    1fdecf18f4634455d93c9b4179c92dd26c7fb364904f2acfe7efd886a91d62394133c2368027f4602f780c1a8e99451da44557cbf8e7717f53fe3022261e1b9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dd50f784903770e0f3a818dfbb811a9a

    SHA1

    c45abaae6b2d34b574ea6aa213f17e12cbaa901d

    SHA256

    c5ae2df658b2ed5ff864850af1c162d7be62a3070538505d303169caf2b7a886

    SHA512

    c7a34a6cf76286b5d997b9a5b19bbf37bf08a55cc9913a3ebc1c1f685e628a642e29636caec826a41f6c14e5a4cf4bfc69c750c80d085e575fc0d35b807e5b90

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    da5f383064b87f02c28bd18f361afdab

    SHA1

    2b1c89819d506f28019dd2690594472f71d50652

    SHA256

    d45e6f1a83838b8bdf9e49780c0149aa0f15fe6cdd2cb330c5c8474dbde9d3e4

    SHA512

    7caf75385480ab6caa3b2e28610df10b3722ef406875521398932b674c74326401eee41fd42adfb09c7b6bd4618668820f13f2b7ea0af84e473f5fa563bede3d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\673IEUYT\bxlQaqJmK[1].js

    Filesize

    32KB

    MD5

    f48baec69cc4dc0852d118259eff2d56

    SHA1

    e64c6e4423421da5b35700154810cb67160bc32b

    SHA256

    463d99ca5448f815a05b2d946ddae9eed3e21c335c0f4cfe7a16944e3512f76c

    SHA512

    06fdccb5d9536ab7c68355dbf49ac02ebccad5a4ea01cb62200fd67728a6d05c276403e588a5bdceacf5e671913fc65b63e8b92456ca5493dae5b5a70e4a8b37

  • C:\Users\Admin\AppData\Local\Temp\Cab87F8.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar949C.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\wmpscfgs.exe

    Filesize

    5.8MB

    MD5

    976617fd851a31bfd67b6e97adf76937

    SHA1

    134c5e82988878e76c68295d3f606abb53669dc5

    SHA256

    7f6ec775b2b640457163c65c25b65c168ec7a5dd980defbc6b45a6b2ebb5931c

    SHA512

    c631239237de2ce2bab79ee698de78c13666268d72c0c602c241b94c497f761a73b309f57a15d7d919d8fe297a242abda32f8f43f2243585e50298c1db91a03b

  • C:\Users\Admin\AppData\Local\Temp\~DFC520A68EFC4791BE.TMP

    Filesize

    16KB

    MD5

    379b83229dbc993b26cf5991831d7563

    SHA1

    de8e7bfae53944a5edf45a69c3f6faf76081997d

    SHA256

    8965c2b48aafab6d59bbde8f902ded9d31bef3e4aecca142f6985ef7f6b5bee7

    SHA512

    bfb534c69db77b9299ab8aadb25944957b87df6e5984394d53a66512ab512cb4f3d2be8d50ce2d3ea6c05ad386e48b6a92600ed1385984dc1437b0907d80d5ce

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\0JS03P0G.txt

    Filesize

    121B

    MD5

    b4a7c239a62e18f88dff7768b8becf1a

    SHA1

    1a28b8f9d5d69833334eb9f572e9e11dddc81856

    SHA256

    9a1381ba2afd3f59575239bcdcbc1e06405164edc5e5170dc7cad607857146e8

    SHA512

    741ceb65991d596a94a1772ffbc863735f5f9d23f3e38f1335e73ac7b91574d3f1f30bae1cd884f9256235a5fc7a46ea56bb6f866599b53fd009710d6a887761

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\RSV8D8AI.txt

    Filesize

    105B

    MD5

    b592daaf4f6216a1edc4ec4092442fdc

    SHA1

    859724242cb3968a3566407dcf70db2c8c8cc037

    SHA256

    10836becc4ae437c0b929889575e23d540d1de7d481ee34c692528d401d511b8

    SHA512

    5ff1eef8c812a8a6c9e557e0330dc2fdaed7ba7c8de7774ac7676454935327a1b0edc948e4996174e02880820cf565c4945d9181a0add4419c03f45c4341dd46

  • \??\c:\program files (x86)\microsoft office\office14\bcssync.exe

    Filesize

    5.8MB

    MD5

    a2370e56ff0f42479fd0d6e9cf7ba5a6

    SHA1

    ed1bfacec1e6517950de854d57668fda4ba007a9

    SHA256

    86047922c56c28f98f3ce11259a842a63ba4397a85363407df7b855d75152ef4

    SHA512

    c3575ede8d60f3744098c78ba01601cb830aa540df4932f0c07558bca5789d2996ab7cd8cdd2cf612542634d4c77013441080382631d01a108eb2265479c3473

  • \Program Files (x86)\Internet Explorer\wmpscfgs.exe

    Filesize

    5.8MB

    MD5

    cb89b645a95abc752bb501326367685c

    SHA1

    3ad6302134bc6444aa3343c9e75b457b1bab1c00

    SHA256

    7af97769a068d4ae9f8ae35946bd67f25ffc868fe4da10475fbd2a90f05c8e51

    SHA512

    254eeeaae5fb1fdcdc7e509be10f70c481059d82f251c0821704b5e9f32e244949afb819bad7fd0746c5e246070d581c253921916f5fac08ec88bfc95e15979a

  • memory/1316-123-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/1316-96-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/1316-98-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/2448-106-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/2580-99-0x00000000040D0000-0x0000000004985000-memory.dmp

    Filesize

    8.7MB

  • memory/2580-55-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/2580-37-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/2580-100-0x00000000002A0000-0x00000000002A2000-memory.dmp

    Filesize

    8KB

  • memory/2580-608-0x00000000040D0000-0x0000000004985000-memory.dmp

    Filesize

    8.7MB

  • memory/2580-64-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/2580-56-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/2580-53-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/2584-70-0x00000000003F0000-0x00000000003F2000-memory.dmp

    Filesize

    8KB

  • memory/2584-42-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2584-47-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/2584-44-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2584-45-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/2584-84-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/2584-39-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/2584-603-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/2860-38-0x0000000000422000-0x0000000000727000-memory.dmp

    Filesize

    3.0MB

  • memory/2860-0-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/2860-35-0x0000000004C30000-0x00000000054E5000-memory.dmp

    Filesize

    8.7MB

  • memory/2860-36-0x0000000004C30000-0x00000000054E5000-memory.dmp

    Filesize

    8.7MB

  • memory/2860-34-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/2860-10-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/2860-1-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2860-3-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2860-5-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2860-8-0x0000000000422000-0x0000000000727000-memory.dmp

    Filesize

    3.0MB

  • memory/2860-9-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/2860-6-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB