Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    174s
  • max time network
    191s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27/05/2024, 11:33

General

  • Target

    NoxusMod.jar

  • Size

    1.4MB

  • MD5

    462734450a265e297b3a3e8ebad04f25

  • SHA1

    da384ae6cf08f161f7ec2bbfbd1e8598c88a7de6

  • SHA256

    1179aeeafbdaeb7b6ffbc070551c440eb7dfe9786d50dc5beb415bb2f17eded4

  • SHA512

    7494ee564de93139b90a4a909a3cfbf8229683f54799698b616ac9fb192f45a1667b7832eef71fb7af87fb490900c7796c2d18e1c242ce4ba10de780b4270d3f

  • SSDEEP

    24576:VO+tNLEsGPiCnvnbIcDWsBCTh0z1xwRIRyzVVo719mthe5cW2RegoH9ru0:VO+wpLbbWslfZ2EXmtheyMbK0

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 53 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 49 IoCs
  • Suspicious use of SendNotifyMessage 48 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\NoxusMod.jar
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4700
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:4564
    • C:\Windows\SYSTEM32\attrib.exe
      attrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1716809710058.tmp
      2⤵
      • Views/modifies file attributes
      PID:1264
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1716809710058.tmp" /f"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4792
      • C:\Windows\system32\reg.exe
        REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1716809710058.tmp" /f
        3⤵
        • Adds Run key to start application
        PID:3352
  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
      "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1448
      • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
        "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Relaunch /Play C:\Users\Admin\Desktop\TraceDisconnect.midi
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:3132
    • C:\Windows\SysWOW64\unregmp2.exe
      "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1496
      • C:\Windows\System32\unregmp2.exe
        "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:5044
  • \??\c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s upnphost
    1⤵
    • Drops file in Windows directory
    PID:5056
  • C:\Windows\system32\mspaint.exe
    "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\OptimizeSearch.jpeg" /ForceBootstrapPaint3D
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2884
  • C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe
    "C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe" -ServerName:Microsoft.MSPaint.AppX437q68k2qc2asvaagas2prv9tjej6ja9.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1732
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    7170ced272217140294c8ca38016e132

    SHA1

    fab71dc4cad7c26aee5a42d2ccdb0e1469dc99c1

    SHA256

    99f9b1c0f532159bf9ae3ba0005b3741c80e98dede95456136d0534a3e7cd9cf

    SHA512

    f06073b13eec5df587b9e9fcd285f8f4b6900fbb19141411020e98b69c600046dffe1f623b7da5ae885a0c1c240cbe948b64bcb126954a9d6f3e3bd3ad07f117

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    64KB

    MD5

    0e807656bd86f2aef7ccf207f963973b

    SHA1

    27052af8d103d134369e356b793eb88ba873df55

    SHA256

    c509c498682bec50142782a51785655020bea27652f46e104e07a530c2ff5162

    SHA512

    e6c7d5e001e8322ccb1abd101d47e7f1401597518f45dd8da1d757728147262bcb3b1f96128f291e0e367c5b34026b401468e4219b27cf3c37a8d434180cd8f3

  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

    Filesize

    1024KB

    MD5

    7dd542c83b593de839809b948b4cfc3f

    SHA1

    0ddf8297b74cf38b79760ac6d057b39b36117934

    SHA256

    1431d1193b057a572f907c572e5cb714a113b457ab591e839fac620d7ff4ed65

    SHA512

    24900048456ebd001c1c253b07763d6dd211cf0a5870a1282ec9ee17c8ca0418841b571e2e718c4639c9888b11c3a5614cc2968a404fd497c66f4ebb32a10406

  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

    Filesize

    9KB

    MD5

    7050d5ae8acfbe560fa11073fef8185d

    SHA1

    5bc38e77ff06785fe0aec5a345c4ccd15752560e

    SHA256

    cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

    SHA512

    a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\Projects.json

    Filesize

    2B

    MD5

    d751713988987e9331980363e24189ce

    SHA1

    97d170e1550eee4afc0af065b78cda302a97674c

    SHA256

    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

    SHA512

    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\Projects.json

    Filesize

    233B

    MD5

    11d090bbdc586cfbdfed6d0a14293f95

    SHA1

    07c394d63f9965b61ad0e8db27e2a3d23eed75d8

    SHA256

    4aa86ecb72f53e1b8a828792ad7321577e3c268ec309e44230c29f53722b37fe

    SHA512

    f7d5ba2171ff67958743adc036d369159746e862e39064c7704eb1c2336e51e0613ca3de740a6c00961f13f349f6ef74ce5d943fe8176c30475839e5a5abd2e4

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\cloudCommunitySettings.json

    Filesize

    2KB

    MD5

    404a3ec24e3ebf45be65e77f75990825

    SHA1

    1e05647cf0a74cedfdeabfa3e8ee33b919780a61

    SHA256

    cc45905af3aaa62601a69c748a06a2fa48eca3b28d44d8ec18764a7e8e4c3da2

    SHA512

    a55382b72267375821b0a229d3529ed54cef0f295f550d1e95661bafccec606aa1cd72e059d37d78e7d2927ae72e2919941251d233152f5eeb32ffdfc96023e5

  • C:\Users\Admin\AppData\Local\Temp\tmp12718.WMC\allservices.xml

    Filesize

    546B

    MD5

    df03e65b8e082f24dab09c57bc9c6241

    SHA1

    6b0dacbf38744c9a381830e6a5dc4c71bd7cedbf

    SHA256

    155b9c588061c71832af329fafa5678835d9153b8fbb7592195ae953d0c455ba

    SHA512

    ef1cc8d27fbc5da5daab854c933d3914b84ee539d4d2f0126dc1a04a830c5599e39a923c80257653638b1b99b0073a7174cc164be5887181730883c752ba2f99

  • C:\Users\Admin\AppData\Local\Temp\tmp14046.WMC\serviceinfo.xml

    Filesize

    523B

    MD5

    d58da90d6dc51f97cb84dfbffe2b2300

    SHA1

    5f86b06b992a3146cb698a99932ead57a5ec4666

    SHA256

    93acdb79543d9248ca3fca661f3ac287e6004e4b3dafd79d4c4070794ffbf2ad

    SHA512

    7f1e95e5aa4c8a0e4c967135c78f22f4505f2a48bbc619924d0096bf4a94d469389b9e8488c12edacfba819517b8376546687d1145660ad1f49d8c20a744e636

  • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

    Filesize

    1KB

    MD5

    5c79cf4ad68e7f74c73f25abb925e0d6

    SHA1

    fddbb7683bf1f9838be70ec0e79cba602714937a

    SHA256

    26c6f86e595d7ac671660c8706ba399d84d345c243c644f32565e555ba7c9202

    SHA512

    a316c5fc476fa3bb7a0b3283205b522daba4cc5046a40e9f7c39d60894a127349ada1b897cf6ad1a748f901474e07c323225aa0c00e707f7138bba16b7cdac0a

  • C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1716809710058.tmp

    Filesize

    1.4MB

    MD5

    462734450a265e297b3a3e8ebad04f25

    SHA1

    da384ae6cf08f161f7ec2bbfbd1e8598c88a7de6

    SHA256

    1179aeeafbdaeb7b6ffbc070551c440eb7dfe9786d50dc5beb415bb2f17eded4

    SHA512

    7494ee564de93139b90a4a909a3cfbf8229683f54799698b616ac9fb192f45a1667b7832eef71fb7af87fb490900c7796c2d18e1c242ce4ba10de780b4270d3f

  • memory/4700-104-0x0000027792670000-0x0000027792680000-memory.dmp

    Filesize

    64KB

  • memory/4700-175-0x0000027792840000-0x0000027792850000-memory.dmp

    Filesize

    64KB

  • memory/4700-28-0x00000277925C0000-0x00000277925D0000-memory.dmp

    Filesize

    64KB

  • memory/4700-27-0x00000277925B0000-0x00000277925C0000-memory.dmp

    Filesize

    64KB

  • memory/4700-32-0x00000277925D0000-0x00000277925E0000-memory.dmp

    Filesize

    64KB

  • memory/4700-37-0x00000277925E0000-0x00000277925F0000-memory.dmp

    Filesize

    64KB

  • memory/4700-38-0x00000277922C0000-0x00000277922C1000-memory.dmp

    Filesize

    4KB

  • memory/4700-40-0x00000277925F0000-0x0000027792600000-memory.dmp

    Filesize

    64KB

  • memory/4700-47-0x0000027792550000-0x0000027792560000-memory.dmp

    Filesize

    64KB

  • memory/4700-46-0x0000027792610000-0x0000027792620000-memory.dmp

    Filesize

    64KB

  • memory/4700-45-0x0000027792600000-0x0000027792610000-memory.dmp

    Filesize

    64KB

  • memory/4700-49-0x0000027792560000-0x0000027792570000-memory.dmp

    Filesize

    64KB

  • memory/4700-50-0x0000027792620000-0x0000027792630000-memory.dmp

    Filesize

    64KB

  • memory/4700-53-0x0000027792570000-0x0000027792580000-memory.dmp

    Filesize

    64KB

  • memory/4700-56-0x0000027792650000-0x0000027792660000-memory.dmp

    Filesize

    64KB

  • memory/4700-55-0x0000027792640000-0x0000027792650000-memory.dmp

    Filesize

    64KB

  • memory/4700-54-0x0000027792630000-0x0000027792640000-memory.dmp

    Filesize

    64KB

  • memory/4700-44-0x00000277922E0000-0x0000027792550000-memory.dmp

    Filesize

    2.4MB

  • memory/4700-60-0x0000027792660000-0x0000027792670000-memory.dmp

    Filesize

    64KB

  • memory/4700-59-0x0000027792590000-0x00000277925A0000-memory.dmp

    Filesize

    64KB

  • memory/4700-58-0x0000027792580000-0x0000027792590000-memory.dmp

    Filesize

    64KB

  • memory/4700-64-0x0000027792670000-0x0000027792680000-memory.dmp

    Filesize

    64KB

  • memory/4700-63-0x00000277925A0000-0x00000277925B0000-memory.dmp

    Filesize

    64KB

  • memory/4700-70-0x00000277925C0000-0x00000277925D0000-memory.dmp

    Filesize

    64KB

  • memory/4700-73-0x0000027792690000-0x00000277926A0000-memory.dmp

    Filesize

    64KB

  • memory/4700-72-0x00000277925D0000-0x00000277925E0000-memory.dmp

    Filesize

    64KB

  • memory/4700-71-0x0000027792680000-0x0000027792690000-memory.dmp

    Filesize

    64KB

  • memory/4700-69-0x00000277925B0000-0x00000277925C0000-memory.dmp

    Filesize

    64KB

  • memory/4700-78-0x00000277926A0000-0x00000277926B0000-memory.dmp

    Filesize

    64KB

  • memory/4700-81-0x00000277926B0000-0x00000277926C0000-memory.dmp

    Filesize

    64KB

  • memory/4700-80-0x00000277925F0000-0x0000027792600000-memory.dmp

    Filesize

    64KB

  • memory/4700-77-0x00000277925E0000-0x00000277925F0000-memory.dmp

    Filesize

    64KB

  • memory/4700-83-0x00000277922C0000-0x00000277922C1000-memory.dmp

    Filesize

    4KB

  • memory/4700-84-0x0000027792600000-0x0000027792610000-memory.dmp

    Filesize

    64KB

  • memory/4700-85-0x00000277926C0000-0x00000277926D0000-memory.dmp

    Filesize

    64KB

  • memory/4700-88-0x00000277926D0000-0x00000277926E0000-memory.dmp

    Filesize

    64KB

  • memory/4700-87-0x0000027792610000-0x0000027792620000-memory.dmp

    Filesize

    64KB

  • memory/4700-91-0x0000027792620000-0x0000027792630000-memory.dmp

    Filesize

    64KB

  • memory/4700-92-0x00000277926E0000-0x00000277926F0000-memory.dmp

    Filesize

    64KB

  • memory/4700-94-0x0000027792630000-0x0000027792640000-memory.dmp

    Filesize

    64KB

  • memory/4700-96-0x0000027792650000-0x0000027792660000-memory.dmp

    Filesize

    64KB

  • memory/4700-97-0x00000277926F0000-0x0000027792700000-memory.dmp

    Filesize

    64KB

  • memory/4700-95-0x0000027792640000-0x0000027792650000-memory.dmp

    Filesize

    64KB

  • memory/4700-101-0x0000027792660000-0x0000027792670000-memory.dmp

    Filesize

    64KB

  • memory/4700-102-0x0000027792700000-0x0000027792710000-memory.dmp

    Filesize

    64KB

  • memory/4700-22-0x00000277922C0000-0x00000277922C1000-memory.dmp

    Filesize

    4KB

  • memory/4700-105-0x0000027792710000-0x0000027792720000-memory.dmp

    Filesize

    64KB

  • memory/4700-106-0x00000277922C0000-0x00000277922C1000-memory.dmp

    Filesize

    4KB

  • memory/4700-109-0x0000027792680000-0x0000027792690000-memory.dmp

    Filesize

    64KB

  • memory/4700-110-0x0000027792720000-0x0000027792730000-memory.dmp

    Filesize

    64KB

  • memory/4700-24-0x00000277925A0000-0x00000277925B0000-memory.dmp

    Filesize

    64KB

  • memory/4700-112-0x0000027792690000-0x00000277926A0000-memory.dmp

    Filesize

    64KB

  • memory/4700-177-0x00000277927B0000-0x00000277927C0000-memory.dmp

    Filesize

    64KB

  • memory/4700-115-0x00000277926A0000-0x00000277926B0000-memory.dmp

    Filesize

    64KB

  • memory/4700-117-0x00000277922C0000-0x00000277922C1000-memory.dmp

    Filesize

    4KB

  • memory/4700-120-0x0000027792750000-0x0000027792760000-memory.dmp

    Filesize

    64KB

  • memory/4700-119-0x00000277926B0000-0x00000277926C0000-memory.dmp

    Filesize

    64KB

  • memory/4700-123-0x00000277926C0000-0x00000277926D0000-memory.dmp

    Filesize

    64KB

  • memory/4700-124-0x0000027792760000-0x0000027792770000-memory.dmp

    Filesize

    64KB

  • memory/4700-126-0x00000277926D0000-0x00000277926E0000-memory.dmp

    Filesize

    64KB

  • memory/4700-127-0x0000027792770000-0x0000027792780000-memory.dmp

    Filesize

    64KB

  • memory/4700-130-0x00000277926E0000-0x00000277926F0000-memory.dmp

    Filesize

    64KB

  • memory/4700-131-0x0000027792780000-0x0000027792790000-memory.dmp

    Filesize

    64KB

  • memory/4700-134-0x00000277926F0000-0x0000027792700000-memory.dmp

    Filesize

    64KB

  • memory/4700-135-0x0000027792790000-0x00000277927A0000-memory.dmp

    Filesize

    64KB

  • memory/4700-138-0x00000277927A0000-0x00000277927B0000-memory.dmp

    Filesize

    64KB

  • memory/4700-137-0x0000027792700000-0x0000027792710000-memory.dmp

    Filesize

    64KB

  • memory/4700-142-0x00000277927B0000-0x00000277927C0000-memory.dmp

    Filesize

    64KB

  • memory/4700-141-0x0000027792710000-0x0000027792720000-memory.dmp

    Filesize

    64KB

  • memory/4700-144-0x0000027792720000-0x0000027792730000-memory.dmp

    Filesize

    64KB

  • memory/4700-145-0x00000277927C0000-0x00000277927D0000-memory.dmp

    Filesize

    64KB

  • memory/4700-147-0x0000027792730000-0x0000027792740000-memory.dmp

    Filesize

    64KB

  • memory/4700-148-0x00000277927D0000-0x00000277927E0000-memory.dmp

    Filesize

    64KB

  • memory/4700-151-0x0000027792740000-0x0000027792750000-memory.dmp

    Filesize

    64KB

  • memory/4700-152-0x00000277927E0000-0x00000277927F0000-memory.dmp

    Filesize

    64KB

  • memory/4700-155-0x0000027792750000-0x0000027792760000-memory.dmp

    Filesize

    64KB

  • memory/4700-156-0x00000277927F0000-0x0000027792800000-memory.dmp

    Filesize

    64KB

  • memory/4700-159-0x0000027792760000-0x0000027792770000-memory.dmp

    Filesize

    64KB

  • memory/4700-160-0x0000027792800000-0x0000027792810000-memory.dmp

    Filesize

    64KB

  • memory/4700-163-0x0000027792770000-0x0000027792780000-memory.dmp

    Filesize

    64KB

  • memory/4700-164-0x0000027792810000-0x0000027792820000-memory.dmp

    Filesize

    64KB

  • memory/4700-167-0x0000027792780000-0x0000027792790000-memory.dmp

    Filesize

    64KB

  • memory/4700-168-0x0000027792820000-0x0000027792830000-memory.dmp

    Filesize

    64KB

  • memory/4700-171-0x0000027792790000-0x00000277927A0000-memory.dmp

    Filesize

    64KB

  • memory/4700-172-0x0000027792830000-0x0000027792840000-memory.dmp

    Filesize

    64KB

  • memory/4700-174-0x00000277927A0000-0x00000277927B0000-memory.dmp

    Filesize

    64KB

  • memory/4700-113-0x0000027792730000-0x0000027792740000-memory.dmp

    Filesize

    64KB

  • memory/4700-116-0x0000027792740000-0x0000027792750000-memory.dmp

    Filesize

    64KB

  • memory/4700-178-0x0000027792850000-0x0000027792860000-memory.dmp

    Filesize

    64KB

  • memory/4700-182-0x0000027792860000-0x0000027792870000-memory.dmp

    Filesize

    64KB

  • memory/4700-181-0x00000277927C0000-0x00000277927D0000-memory.dmp

    Filesize

    64KB

  • memory/4700-185-0x00000277927D0000-0x00000277927E0000-memory.dmp

    Filesize

    64KB

  • memory/4700-188-0x00000277927E0000-0x00000277927F0000-memory.dmp

    Filesize

    64KB

  • memory/4700-189-0x0000027792870000-0x0000027792880000-memory.dmp

    Filesize

    64KB

  • memory/4700-20-0x0000027792580000-0x0000027792590000-memory.dmp

    Filesize

    64KB

  • memory/4700-21-0x0000027792590000-0x00000277925A0000-memory.dmp

    Filesize

    64KB

  • memory/4700-17-0x0000027792570000-0x0000027792580000-memory.dmp

    Filesize

    64KB

  • memory/4700-15-0x0000027792560000-0x0000027792570000-memory.dmp

    Filesize

    64KB

  • memory/4700-14-0x0000027792550000-0x0000027792560000-memory.dmp

    Filesize

    64KB

  • memory/4700-2-0x00000277922E0000-0x0000027792550000-memory.dmp

    Filesize

    2.4MB

  • memory/4700-192-0x00000277927F0000-0x0000027792800000-memory.dmp

    Filesize

    64KB

  • memory/4700-231-0x00000277922C0000-0x00000277922C1000-memory.dmp

    Filesize

    4KB

  • memory/4700-234-0x00000277922C0000-0x00000277922C1000-memory.dmp

    Filesize

    4KB