Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 02:22

General

  • Target

    0b7f855c9f53a021551e7b43a9b87970.exe

  • Size

    368KB

  • MD5

    0b7f855c9f53a021551e7b43a9b87970

  • SHA1

    168d5faef9fa91c5d0df1c430759ba02ec1caec8

  • SHA256

    41e5b9ead647fe7d753b46ce735813e53b302308e456f471fbd3b4f183025db7

  • SHA512

    f59b405055284f5aa8f142b4307aa27cac4675f75d60e80c21d6a26732b174998dd21aacbc1aa785b4a2daf7751d6740acf474f2d3a51d31a93401534e193429

  • SSDEEP

    1536:kaxhd8R1Sl1TDL0QXlkae7oMEqLY7xicp+ZvaRhdsRxO25Qd:kaDT3L0QBMoeLAxpp+ZvajL2

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b7f855c9f53a021551e7b43a9b87970.exe
    "C:\Users\Admin\AppData\Local\Temp\0b7f855c9f53a021551e7b43a9b87970.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2768
    • C:\Windows\userinit.exe
      C:\Windows\userinit.exe
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2152
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2976
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:3272
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:3796
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:3176
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:1108
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2372
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:1596
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:1452
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:4864
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2632
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:4464
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:3784
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:8
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:1864
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2988
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:428
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4024
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4680
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1632
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3840
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3176
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:5024
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3696
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3728
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3052
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2564
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:636
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2060
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:464
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3360
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:3716
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:1792
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:2084
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:3728
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:3656
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:636
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:3812
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:4612
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:4860
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:4696
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:2924
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:3640
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:552
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:2488
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:1664
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:3744
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:1740
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:3268
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:4312
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:464
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:4644
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:3048
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:4476
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:2556
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:1640
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:3940
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:3744
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:1628
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:5076
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:4072
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:2884
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:4860
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
        • Executes dropped EXE
        PID:3232
      • C:\Windows\SysWOW64\system.exe
        C:\Windows\system32\system.exe
        3⤵
          PID:1108
        • C:\Windows\SysWOW64\system.exe
          C:\Windows\system32\system.exe
          3⤵
            PID:2060
          • C:\Windows\SysWOW64\system.exe
            C:\Windows\system32\system.exe
            3⤵
              PID:4056
            • C:\Windows\SysWOW64\system.exe
              C:\Windows\system32\system.exe
              3⤵
                PID:3840
              • C:\Windows\SysWOW64\system.exe
                C:\Windows\system32\system.exe
                3⤵
                  PID:1052
                • C:\Windows\SysWOW64\system.exe
                  C:\Windows\system32\system.exe
                  3⤵
                    PID:3696
                  • C:\Windows\SysWOW64\system.exe
                    C:\Windows\system32\system.exe
                    3⤵
                      PID:1644
                    • C:\Windows\SysWOW64\system.exe
                      C:\Windows\system32\system.exe
                      3⤵
                        PID:2288
                      • C:\Windows\SysWOW64\system.exe
                        C:\Windows\system32\system.exe
                        3⤵
                          PID:2400
                        • C:\Windows\SysWOW64\system.exe
                          C:\Windows\system32\system.exe
                          3⤵
                            PID:4540
                          • C:\Windows\SysWOW64\system.exe
                            C:\Windows\system32\system.exe
                            3⤵
                              PID:3636
                            • C:\Windows\SysWOW64\system.exe
                              C:\Windows\system32\system.exe
                              3⤵
                                PID:4448
                              • C:\Windows\SysWOW64\system.exe
                                C:\Windows\system32\system.exe
                                3⤵
                                  PID:1124

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Windows\SysWOW64\system.exe

                              Filesize

                              339KB

                              MD5

                              1450c451faa3ed0cefaaaeee99a32677

                              SHA1

                              4b3291019a1eee657934534eaae17d1f3b190c3b

                              SHA256

                              93d6b5db6a7f43e01faa2182b0b3201873b17683fb2d64c99e26950a5f81b943

                              SHA512

                              8c6b3223b633582e1ca4a08143057b6a23f2cabee1abd7e757abad63796c38872f836a7519f54bdfcaf625a178bf50cfb0ea3810ee2f97b43ae51df75c311507

                            • C:\Windows\SysWOW64\system.exe

                              Filesize

                              265KB

                              MD5

                              87c2d6a2fbc9dd7116f1e2b17ef8e046

                              SHA1

                              cf52adca02a9d5cd31a44878cf6aebfb8109948e

                              SHA256

                              fd59fd373f54f3dcf480570c953b73a6a5eaa7c0da2ee47a809a8ef4beea8ae6

                              SHA512

                              b82e3e4f01174ab80634fd2ff01901869e7b9709b928d68bc4caa5fb82d5f203947a6993656dad0db7b0ee87a88e650eb4eeaa71c3463ea3530aeb8b80573846

                            • C:\Windows\SysWOW64\system.exe

                              Filesize

                              345KB

                              MD5

                              b868d1883761fc841f1b5cdd5bfda9f6

                              SHA1

                              897fd25c713d5fdbf337d141335f21c7fdea884f

                              SHA256

                              09f59e2bc565614afab699788ac3253e79dcf7f6b430aaf8f05e8322895c2747

                              SHA512

                              17a5283814c3a53b560ccc2d18123a7ef45481eed42f82b446690e88aebff1a2132f07acdb784670a475ff1f18e760132b1a3fcc3932b8bf21ecf1add6e4b9ff

                            • C:\Windows\userinit.exe

                              Filesize

                              368KB

                              MD5

                              0b7f855c9f53a021551e7b43a9b87970

                              SHA1

                              168d5faef9fa91c5d0df1c430759ba02ec1caec8

                              SHA256

                              41e5b9ead647fe7d753b46ce735813e53b302308e456f471fbd3b4f183025db7

                              SHA512

                              f59b405055284f5aa8f142b4307aa27cac4675f75d60e80c21d6a26732b174998dd21aacbc1aa785b4a2daf7751d6740acf474f2d3a51d31a93401534e193429

                            • memory/8-84-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/428-99-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/464-164-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/464-267-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/552-233-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/636-154-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/636-198-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/1108-44-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/1108-332-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/1452-59-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/1596-54-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/1628-306-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/1632-114-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/1640-291-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/1740-252-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/1792-178-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/1864-89-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/2060-336-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/2060-159-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/2084-183-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/2152-321-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/2372-49-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/2488-238-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/2556-286-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/2564-149-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/2632-69-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/2768-0-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/2768-13-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/2924-223-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/2976-20-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/2976-24-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/2988-94-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/3052-144-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/3176-124-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/3176-39-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/3268-257-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/3272-29-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/3360-169-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/3640-228-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/3656-193-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/3696-134-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/3728-188-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/3728-139-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/3744-247-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/3744-301-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/3784-79-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/3796-34-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/3812-203-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/3840-119-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/3940-296-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/4024-104-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/4072-316-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/4312-262-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/4464-74-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/4476-281-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/4612-208-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/4644-272-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/4680-109-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/4696-218-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/4860-213-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/4860-325-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/4864-64-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/5024-129-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/5076-311-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB