Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/11/2024, 06:06 UTC

General

  • Target

    7e1ba998c313492e21f222b6fb48dc816e961a190f87b098a2d8592e1daa0969.exe

  • Size

    349KB

  • MD5

    353ca44d703c5912307a6e548909096b

  • SHA1

    76a9724fc7cc628fb0f0606c6d29ea586042b769

  • SHA256

    7e1ba998c313492e21f222b6fb48dc816e961a190f87b098a2d8592e1daa0969

  • SHA512

    5e143858f25aff8d5767e94c2a6f38fce961da8ac0f08f2cb60139cc07615ce783e64914906601cd05eeedb7258cc7cf6ae723b6d39717de352a4f3faae6a5ff

  • SSDEEP

    6144:FB1QKZaOpBjQepew/PjuGyFPr527Uf2u/jGw0qun597/QKjJ8zkjDpyAYpIk:FB1Q6rpr7MrswfLjGwW5xFdRyJpd

Malware Config

Extracted

Family

nanocore

Version

1.2.2.2

C2

bemery2.no-ip.biz:57628

127.0.0.1:57628

Mutex

997af15f-5576-4030-975c-eb3264fb6789

Attributes
  • activate_away_mode

    true

  • backup_connection_host

    127.0.0.1

  • backup_dns_server

    8.8.4.4

  • buffer_size

    65535

  • build_time

    2015-04-23T21:31:33.540664436Z

  • bypass_user_account_control

    true

  • bypass_user_account_control_data

  • clear_access_control

    true

  • clear_zone_identifier

    true

  • connect_delay

    4000

  • connection_port

    57628

  • default_group

    grace

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+08

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+09

  • mutex

    997af15f-5576-4030-975c-eb3264fb6789

  • mutex_timeout

    5000

  • prevent_system_sleep

    true

  • primary_connection_host

    bemery2.no-ip.biz

  • primary_dns_server

    8.8.8.8

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    false

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.2

  • wan_timeout

    8000

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Nanocore family
  • Sets file to hidden 1 TTPs 1 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Adds Run key to start application 2 TTPs 14 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 37 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 20 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 20 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e1ba998c313492e21f222b6fb48dc816e961a190f87b098a2d8592e1daa0969.exe
    "C:\Users\Admin\AppData\Local\Temp\7e1ba998c313492e21f222b6fb48dc816e961a190f87b098a2d8592e1daa0969.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Runs ping.exe
      PID:2840
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Runs ping.exe
      PID:2600
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Runs ping.exe
      PID:1728
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Runs ping.exe
      PID:2020
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Runs ping.exe
      PID:2224
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Runs ping.exe
      PID:1644
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Runs ping.exe
      PID:2508
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Runs ping.exe
      PID:1924
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Runs ping.exe
      PID:1108
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Runs ping.exe
      PID:1916
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
      "\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
      2⤵
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:1556
    • C:\Windows\SysWOW64\attrib.exe
      "C:\Windows\System32\attrib.exe" +s +h C:\Users\Admin\AppData\Local\Temp\7e1ba998c313492e21f222b6fb48dc816e961a190f87b098a2d8592e1daa0969.exe
      2⤵
      • Sets file to hidden
      • System Location Discovery: System Language Discovery
      • Views/modifies file attributes
      PID:2584
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Runs ping.exe
      PID:2948
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Runs ping.exe
      PID:2016
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Runs ping.exe
      PID:1800
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Runs ping.exe
      PID:1132
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Runs ping.exe
      PID:800
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Runs ping.exe
      PID:1396
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Runs ping.exe
      PID:1968
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Runs ping.exe
      PID:3028
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Runs ping.exe
      PID:1044
    • C:\Windows\SysWOW64\ping.exe
      C:\Windows\System32\ping.exe google.com
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Runs ping.exe
      PID:1632
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe
      2⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:868
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe
      2⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:1568
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe
      2⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2732
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe
      2⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2988
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe
      2⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2644
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe
      2⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:1720
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe
      2⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2932
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe
      2⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2368
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe
      2⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2672
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe
      2⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2912
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe
      2⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:1260
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe
      2⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:3020
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Google Chrome" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe
      2⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2284
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2848

Network

  • flag-us
    DNS
    google.com
    ping.exe
    Remote address:
    8.8.8.8:53
    Request
    google.com
    IN A
    Response
    google.com
    IN A
    142.250.178.14
  • flag-us
    DNS
    bemery2.no-ip.biz
    RegAsm.exe
    Remote address:
    8.8.8.8:53
    Request
    bemery2.no-ip.biz
    IN A
    Response
    bemery2.no-ip.biz
    IN A
    0.0.0.0
  • flag-us
    DNS
    bemery2.no-ip.biz
    RegAsm.exe
    Remote address:
    8.8.8.8:53
    Request
    bemery2.no-ip.biz
    IN A
    Response
    bemery2.no-ip.biz
    IN A
    0.0.0.0
  • flag-us
    DNS
    bemery2.no-ip.biz
    RegAsm.exe
    Remote address:
    8.8.8.8:53
    Request
    bemery2.no-ip.biz
    IN A
    Response
    bemery2.no-ip.biz
    IN A
    0.0.0.0
  • flag-us
    DNS
    google.com
    ping.exe
    Remote address:
    8.8.8.8:53
    Request
    google.com
    IN A
    Response
    google.com
    IN A
    142.250.178.14
  • flag-us
    DNS
    bemery2.no-ip.biz
    RegAsm.exe
    Remote address:
    8.8.8.8:53
    Request
    bemery2.no-ip.biz
    IN A
    Response
    bemery2.no-ip.biz
    IN A
    0.0.0.0
  • flag-us
    DNS
    bemery2.no-ip.biz
    RegAsm.exe
    Remote address:
    8.8.8.8:53
    Request
    bemery2.no-ip.biz
    IN A
    Response
    bemery2.no-ip.biz
    IN A
    0.0.0.0
  • flag-us
    DNS
    bemery2.no-ip.biz
    RegAsm.exe
    Remote address:
    8.8.8.8:53
    Request
    bemery2.no-ip.biz
    IN A
    Response
    bemery2.no-ip.biz
    IN A
    0.0.0.0
  • flag-us
    DNS
    bemery2.no-ip.biz
    RegAsm.exe
    Remote address:
    8.8.8.8:53
    Request
    bemery2.no-ip.biz
    IN A
    Response
    bemery2.no-ip.biz
    IN A
    0.0.0.0
  • flag-us
    DNS
    bemery2.no-ip.biz
    RegAsm.exe
    Remote address:
    8.8.8.8:53
    Request
    bemery2.no-ip.biz
    IN A
    Response
    bemery2.no-ip.biz
    IN A
    0.0.0.0
  • flag-us
    DNS
    bemery2.no-ip.biz
    RegAsm.exe
    Remote address:
    8.8.8.8:53
    Request
    bemery2.no-ip.biz
    IN A
    Response
    bemery2.no-ip.biz
    IN A
    0.0.0.0
  • flag-us
    DNS
    bemery2.no-ip.biz
    RegAsm.exe
    Remote address:
    8.8.8.8:53
    Request
    bemery2.no-ip.biz
    IN A
    Response
    bemery2.no-ip.biz
    IN A
    0.0.0.0
  • flag-us
    DNS
    bemery2.no-ip.biz
    RegAsm.exe
    Remote address:
    8.8.8.8:53
    Request
    bemery2.no-ip.biz
    IN A
    Response
    bemery2.no-ip.biz
    IN A
    0.0.0.0
  • 127.0.0.1:57628
    RegAsm.exe
  • 127.0.0.1:57628
    RegAsm.exe
  • 127.0.0.1:57628
    RegAsm.exe
  • 127.0.0.1:57628
    RegAsm.exe
  • 127.0.0.1:57628
    RegAsm.exe
  • 127.0.0.1:57628
    RegAsm.exe
  • 127.0.0.1:57628
    RegAsm.exe
  • 127.0.0.1:57628
    RegAsm.exe
  • 127.0.0.1:57628
    RegAsm.exe
  • 8.8.8.8:53
    google.com
    dns
    ping.exe
    56 B
    72 B
    1
    1

    DNS Request

    google.com

    DNS Response

    142.250.178.14

  • 8.8.8.8:53
    bemery2.no-ip.biz
    dns
    RegAsm.exe
    63 B
    79 B
    1
    1

    DNS Request

    bemery2.no-ip.biz

    DNS Response

    0.0.0.0

  • 8.8.8.8:53
    bemery2.no-ip.biz
    dns
    RegAsm.exe
    63 B
    79 B
    1
    1

    DNS Request

    bemery2.no-ip.biz

    DNS Response

    0.0.0.0

  • 8.8.8.8:53
    bemery2.no-ip.biz
    dns
    RegAsm.exe
    63 B
    79 B
    1
    1

    DNS Request

    bemery2.no-ip.biz

    DNS Response

    0.0.0.0

  • 8.8.8.8:53
    google.com
    dns
    ping.exe
    56 B
    72 B
    1
    1

    DNS Request

    google.com

    DNS Response

    142.250.178.14

  • 8.8.8.8:53
    bemery2.no-ip.biz
    dns
    RegAsm.exe
    63 B
    79 B
    1
    1

    DNS Request

    bemery2.no-ip.biz

    DNS Response

    0.0.0.0

  • 8.8.8.8:53
    bemery2.no-ip.biz
    dns
    RegAsm.exe
    63 B
    79 B
    1
    1

    DNS Request

    bemery2.no-ip.biz

    DNS Response

    0.0.0.0

  • 8.8.8.8:53
    bemery2.no-ip.biz
    dns
    RegAsm.exe
    63 B
    79 B
    1
    1

    DNS Request

    bemery2.no-ip.biz

    DNS Response

    0.0.0.0

  • 8.8.8.8:53
    bemery2.no-ip.biz
    dns
    RegAsm.exe
    63 B
    79 B
    1
    1

    DNS Request

    bemery2.no-ip.biz

    DNS Response

    0.0.0.0

  • 8.8.8.8:53
    bemery2.no-ip.biz
    dns
    RegAsm.exe
    63 B
    79 B
    1
    1

    DNS Request

    bemery2.no-ip.biz

    DNS Response

    0.0.0.0

  • 8.8.8.8:53
    bemery2.no-ip.biz
    dns
    RegAsm.exe
    63 B
    79 B
    1
    1

    DNS Request

    bemery2.no-ip.biz

    DNS Response

    0.0.0.0

  • 8.8.8.8:53
    bemery2.no-ip.biz
    dns
    RegAsm.exe
    63 B
    79 B
    1
    1

    DNS Request

    bemery2.no-ip.biz

    DNS Response

    0.0.0.0

  • 8.8.8.8:53
    bemery2.no-ip.biz
    dns
    RegAsm.exe
    63 B
    79 B
    1
    1

    DNS Request

    bemery2.no-ip.biz

    DNS Response

    0.0.0.0

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DV.png

    Filesize

    100KB

    MD5

    85aa412748cec606260dfc07a2ba0493

    SHA1

    b1604d7f6a3bea2c716137e93c1b3206e4581595

    SHA256

    603e434580ef4df688fa85fa8b0bd552fcc06fa7882c1d2789c8c52bce87752f

    SHA512

    98ffc0676b705619d6fb206459c69cc73de285661971d43311e770898a474c2169749357c3126415f17a19e711badfe0fbbb98f056af8cf99cc6eaad7629a71a

  • C:\Users\Admin\AppData\Roaming\subfolder\chrome.exe.exe

    Filesize

    349KB

    MD5

    835e4f95ea580f526214e296a38a3084

    SHA1

    fd5010637e50a6d83002c24a7a911077d5ee3af3

    SHA256

    2af0e93dd925431f2861645fc966eb10210815b58b23a9a49131bbf653f20b6f

    SHA512

    7203c0eb7b3c02419cd2489079a3cb8c35ef0c0a7fc13aaf0926782b2c097e08f281a03dd038de33cd0950b62c21906cc158fcbc9c45bb96629519c4a1c294ba

  • memory/1556-14-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/1556-18-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/1556-8-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/1556-12-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/1556-16-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1556-10-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/1556-17-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/1556-19-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2316-7-0x0000000074A50000-0x0000000074FFB000-memory.dmp

    Filesize

    5.7MB

  • memory/2316-4-0x00000000049F0000-0x00000000049F2000-memory.dmp

    Filesize

    8KB

  • memory/2316-0-0x0000000074A51000-0x0000000074A52000-memory.dmp

    Filesize

    4KB

  • memory/2316-2-0x0000000074A50000-0x0000000074FFB000-memory.dmp

    Filesize

    5.7MB

  • memory/2316-1-0x0000000074A50000-0x0000000074FFB000-memory.dmp

    Filesize

    5.7MB

  • memory/2848-5-0x00000000001B0000-0x00000000001B2000-memory.dmp

    Filesize

    8KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.