Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    16s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/06/2024, 04:04

General

  • Target

    4674052e1bdaf5f0e51bf1a731e1b6e8.exe

  • Size

    5.3MB

  • MD5

    4674052e1bdaf5f0e51bf1a731e1b6e8

  • SHA1

    341a06ed501decaa13e94284e9cf3bc9dc74321c

  • SHA256

    e71d256a4b1f8aff106556a27fc45f1c48384232353bd8028f588ba6ef59c3f6

  • SHA512

    4b24c67097d9a172f4a8826af8489b8c0c5c0160b4da40b070340105cd056005062d214808a3296d5fcb349ad21a97044a36ad28b4eceb0f7f9713dc91536ec8

  • SSDEEP

    98304:7LSHPhEzeeUn3SLIeOrctwZlaqYPXg3zwPLsfN3x:7e569UisISalPXHPLsfNh

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Drops file in Drivers directory 1 IoCs
  • Stops running service(s) 4 TTPs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:620
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:336
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:668
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
        1⤵
          PID:960
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
          1⤵
            PID:512
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
            1⤵
              PID:872
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
              1⤵
                PID:1076
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                1⤵
                  PID:1088
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                  1⤵
                    PID:1180
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                    1⤵
                      PID:1192
                      • C:\Windows\system32\taskhostw.exe
                        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                        2⤵
                          PID:2760
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                        1⤵
                          PID:1280
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                          1⤵
                            PID:1312
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                            1⤵
                              PID:1368
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                              1⤵
                                PID:1420
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                1⤵
                                  PID:1484
                                  • C:\Windows\system32\sihost.exe
                                    sihost.exe
                                    2⤵
                                      PID:2484
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                    1⤵
                                      PID:1496
                                    • C:\Windows\System32\svchost.exe
                                      C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                      1⤵
                                        PID:1516
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                        1⤵
                                          PID:1632
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                          1⤵
                                            PID:1700
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                            1⤵
                                              PID:1752
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                              1⤵
                                                PID:1808
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                1⤵
                                                  PID:1840
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                  1⤵
                                                    PID:1924
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                    1⤵
                                                      PID:1932
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                      1⤵
                                                        PID:1996
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                        1⤵
                                                          PID:2016
                                                        • C:\Windows\System32\spoolsv.exe
                                                          C:\Windows\System32\spoolsv.exe
                                                          1⤵
                                                            PID:1764
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                            1⤵
                                                              PID:2140
                                                            • C:\Windows\System32\svchost.exe
                                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                              1⤵
                                                                PID:2256
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                1⤵
                                                                  PID:2320
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                  1⤵
                                                                    PID:2468
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                    1⤵
                                                                      PID:2476
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                      1⤵
                                                                        PID:2496
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                        1⤵
                                                                          PID:2704
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                          1⤵
                                                                            PID:2712
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                            1⤵
                                                                              PID:2780
                                                                            • C:\Windows\sysmon.exe
                                                                              C:\Windows\sysmon.exe
                                                                              1⤵
                                                                                PID:2808
                                                                              • C:\Windows\System32\svchost.exe
                                                                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                                1⤵
                                                                                  PID:2836
                                                                                • C:\Users\Admin\AppData\Local\Temp\4674052e1bdaf5f0e51bf1a731e1b6e8.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\4674052e1bdaf5f0e51bf1a731e1b6e8.exe"
                                                                                  1⤵
                                                                                  • Drops file in Drivers directory
                                                                                  • Drops file in System32 directory
                                                                                  • Suspicious use of SetThreadContext
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  • Suspicious use of WriteProcessMemory
                                                                                  PID:3616
                                                                                  • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                    2⤵
                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:2228
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                    2⤵
                                                                                    • Suspicious use of WriteProcessMemory
                                                                                    PID:1900
                                                                                    • C:\Windows\system32\wusa.exe
                                                                                      wusa /uninstall /kb:890830 /quiet /norestart
                                                                                      3⤵
                                                                                        PID:4336
                                                                                    • C:\Windows\system32\powercfg.exe
                                                                                      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                                      2⤵
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:4320
                                                                                    • C:\Windows\system32\powercfg.exe
                                                                                      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                                      2⤵
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:316
                                                                                    • C:\Windows\system32\powercfg.exe
                                                                                      C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                                      2⤵
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:3444
                                                                                    • C:\Windows\system32\powercfg.exe
                                                                                      C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                                      2⤵
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:3384
                                                                                    • C:\Windows\system32\dialer.exe
                                                                                      C:\Windows\system32\dialer.exe
                                                                                      2⤵
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      • Suspicious use of WriteProcessMemory
                                                                                      PID:5080
                                                                                    • C:\Windows\system32\sc.exe
                                                                                      C:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"
                                                                                      2⤵
                                                                                      • Launches sc.exe
                                                                                      PID:3828
                                                                                    • C:\Windows\system32\sc.exe
                                                                                      C:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"
                                                                                      2⤵
                                                                                      • Launches sc.exe
                                                                                      PID:4712
                                                                                    • C:\Windows\system32\sc.exe
                                                                                      C:\Windows\system32\sc.exe stop eventlog
                                                                                      2⤵
                                                                                      • Launches sc.exe
                                                                                      PID:4792
                                                                                    • C:\Windows\system32\sc.exe
                                                                                      C:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"
                                                                                      2⤵
                                                                                      • Launches sc.exe
                                                                                      PID:4040
                                                                                  • C:\ProgramData\Google\Chrome\updater.exe
                                                                                    C:\ProgramData\Google\Chrome\updater.exe
                                                                                    1⤵
                                                                                      PID:4608
                                                                                      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                        2⤵
                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                        PID:220
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                        2⤵
                                                                                          PID:4652
                                                                                          • C:\Windows\system32\wusa.exe
                                                                                            wusa /uninstall /kb:890830 /quiet /norestart
                                                                                            3⤵
                                                                                              PID:1124
                                                                                          • C:\Windows\system32\powercfg.exe
                                                                                            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                                            2⤵
                                                                                              PID:1820
                                                                                            • C:\Windows\system32\powercfg.exe
                                                                                              C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                                              2⤵
                                                                                                PID:2444
                                                                                              • C:\Windows\system32\powercfg.exe
                                                                                                C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                                                2⤵
                                                                                                  PID:1592
                                                                                                • C:\Windows\system32\powercfg.exe
                                                                                                  C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                                                  2⤵
                                                                                                    PID:3732
                                                                                                  • C:\Windows\system32\dialer.exe
                                                                                                    C:\Windows\system32\dialer.exe
                                                                                                    2⤵
                                                                                                      PID:3480
                                                                                                    • C:\Windows\system32\dialer.exe
                                                                                                      C:\Windows\system32\dialer.exe
                                                                                                      2⤵
                                                                                                        PID:436
                                                                                                      • C:\Windows\system32\dialer.exe
                                                                                                        dialer.exe
                                                                                                        2⤵
                                                                                                          PID:2168

                                                                                                      Network

                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                      Replay Monitor

                                                                                                      Loading Replay Monitor...

                                                                                                      Downloads

                                                                                                      • C:\ProgramData\Google\Chrome\updater.exe

                                                                                                        Filesize

                                                                                                        5.3MB

                                                                                                        MD5

                                                                                                        4674052e1bdaf5f0e51bf1a731e1b6e8

                                                                                                        SHA1

                                                                                                        341a06ed501decaa13e94284e9cf3bc9dc74321c

                                                                                                        SHA256

                                                                                                        e71d256a4b1f8aff106556a27fc45f1c48384232353bd8028f588ba6ef59c3f6

                                                                                                        SHA512

                                                                                                        4b24c67097d9a172f4a8826af8489b8c0c5c0160b4da40b070340105cd056005062d214808a3296d5fcb349ad21a97044a36ad28b4eceb0f7f9713dc91536ec8

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_f5bj4ku0.b0f.ps1

                                                                                                        Filesize

                                                                                                        60B

                                                                                                        MD5

                                                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                                                        SHA1

                                                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                        SHA256

                                                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                        SHA512

                                                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                      • C:\Windows\system32\drivers\etc\hosts

                                                                                                        Filesize

                                                                                                        3KB

                                                                                                        MD5

                                                                                                        00930b40cba79465b7a38ed0449d1449

                                                                                                        SHA1

                                                                                                        4b25a89ee28b20ba162f23772ddaf017669092a5

                                                                                                        SHA256

                                                                                                        eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01

                                                                                                        SHA512

                                                                                                        cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62

                                                                                                      • memory/220-314-0x00000205701E0000-0x00000205701FC000-memory.dmp

                                                                                                        Filesize

                                                                                                        112KB

                                                                                                      • memory/220-319-0x0000020570210000-0x000002057021A000-memory.dmp

                                                                                                        Filesize

                                                                                                        40KB

                                                                                                      • memory/220-316-0x0000020570220000-0x000002057023A000-memory.dmp

                                                                                                        Filesize

                                                                                                        104KB

                                                                                                      • memory/220-317-0x00000205701D0000-0x00000205701D8000-memory.dmp

                                                                                                        Filesize

                                                                                                        32KB

                                                                                                      • memory/220-318-0x0000020570200000-0x0000020570206000-memory.dmp

                                                                                                        Filesize

                                                                                                        24KB

                                                                                                      • memory/220-315-0x00000205701C0000-0x00000205701CA000-memory.dmp

                                                                                                        Filesize

                                                                                                        40KB

                                                                                                      • memory/220-311-0x000002056FFA0000-0x000002056FFBC000-memory.dmp

                                                                                                        Filesize

                                                                                                        112KB

                                                                                                      • memory/220-312-0x000002056FFC0000-0x0000020570075000-memory.dmp

                                                                                                        Filesize

                                                                                                        724KB

                                                                                                      • memory/220-313-0x000002056FF90000-0x000002056FF9A000-memory.dmp

                                                                                                        Filesize

                                                                                                        40KB

                                                                                                      • memory/336-36-0x0000018B3D620000-0x0000018B3D64B000-memory.dmp

                                                                                                        Filesize

                                                                                                        172KB

                                                                                                      • memory/336-37-0x00007FF8C7930000-0x00007FF8C7940000-memory.dmp

                                                                                                        Filesize

                                                                                                        64KB

                                                                                                      • memory/512-46-0x0000021416DD0000-0x0000021416DFB000-memory.dmp

                                                                                                        Filesize

                                                                                                        172KB

                                                                                                      • memory/512-47-0x00007FF8C7930000-0x00007FF8C7940000-memory.dmp

                                                                                                        Filesize

                                                                                                        64KB

                                                                                                      • memory/620-29-0x000001E7CBE40000-0x000001E7CBE64000-memory.dmp

                                                                                                        Filesize

                                                                                                        144KB

                                                                                                      • memory/620-40-0x00007FF8C7930000-0x00007FF8C7940000-memory.dmp

                                                                                                        Filesize

                                                                                                        64KB

                                                                                                      • memory/620-39-0x000001E7CBE70000-0x000001E7CBE9B000-memory.dmp

                                                                                                        Filesize

                                                                                                        172KB

                                                                                                      • memory/668-32-0x00007FF8C7930000-0x00007FF8C7940000-memory.dmp

                                                                                                        Filesize

                                                                                                        64KB

                                                                                                      • memory/668-31-0x000001E1665A0000-0x000001E1665CB000-memory.dmp

                                                                                                        Filesize

                                                                                                        172KB

                                                                                                      • memory/872-51-0x00007FF8C7930000-0x00007FF8C7940000-memory.dmp

                                                                                                        Filesize

                                                                                                        64KB

                                                                                                      • memory/872-50-0x00000164EC530000-0x00000164EC55B000-memory.dmp

                                                                                                        Filesize

                                                                                                        172KB

                                                                                                      • memory/960-43-0x000001E8CBBD0000-0x000001E8CBBFB000-memory.dmp

                                                                                                        Filesize

                                                                                                        172KB

                                                                                                      • memory/960-44-0x00007FF8C7930000-0x00007FF8C7940000-memory.dmp

                                                                                                        Filesize

                                                                                                        64KB

                                                                                                      • memory/1076-57-0x000001F249890000-0x000001F2498BB000-memory.dmp

                                                                                                        Filesize

                                                                                                        172KB

                                                                                                      • memory/1076-58-0x00007FF8C7930000-0x00007FF8C7940000-memory.dmp

                                                                                                        Filesize

                                                                                                        64KB

                                                                                                      • memory/1088-60-0x000001E500C90000-0x000001E500CBB000-memory.dmp

                                                                                                        Filesize

                                                                                                        172KB

                                                                                                      • memory/1088-61-0x00007FF8C7930000-0x00007FF8C7940000-memory.dmp

                                                                                                        Filesize

                                                                                                        64KB

                                                                                                      • memory/1180-63-0x000002E21DF10000-0x000002E21DF3B000-memory.dmp

                                                                                                        Filesize

                                                                                                        172KB

                                                                                                      • memory/1180-64-0x00007FF8C7930000-0x00007FF8C7940000-memory.dmp

                                                                                                        Filesize

                                                                                                        64KB

                                                                                                      • memory/1192-67-0x00007FF8C7930000-0x00007FF8C7940000-memory.dmp

                                                                                                        Filesize

                                                                                                        64KB

                                                                                                      • memory/1192-66-0x000001A8B46E0000-0x000001A8B470B000-memory.dmp

                                                                                                        Filesize

                                                                                                        172KB

                                                                                                      • memory/1280-71-0x000001DE0C560000-0x000001DE0C58B000-memory.dmp

                                                                                                        Filesize

                                                                                                        172KB

                                                                                                      • memory/1280-72-0x00007FF8C7930000-0x00007FF8C7940000-memory.dmp

                                                                                                        Filesize

                                                                                                        64KB

                                                                                                      • memory/1312-74-0x000001919EB90000-0x000001919EBBB000-memory.dmp

                                                                                                        Filesize

                                                                                                        172KB

                                                                                                      • memory/1312-75-0x00007FF8C7930000-0x00007FF8C7940000-memory.dmp

                                                                                                        Filesize

                                                                                                        64KB

                                                                                                      • memory/2228-0-0x00007FF8E8A93000-0x00007FF8E8A95000-memory.dmp

                                                                                                        Filesize

                                                                                                        8KB

                                                                                                      • memory/2228-15-0x00007FF8E8A90000-0x00007FF8E9551000-memory.dmp

                                                                                                        Filesize

                                                                                                        10.8MB

                                                                                                      • memory/2228-10-0x0000017533FC0000-0x0000017533FE2000-memory.dmp

                                                                                                        Filesize

                                                                                                        136KB

                                                                                                      • memory/2228-11-0x00007FF8E8A90000-0x00007FF8E9551000-memory.dmp

                                                                                                        Filesize

                                                                                                        10.8MB

                                                                                                      • memory/2228-12-0x00007FF8E8A90000-0x00007FF8E9551000-memory.dmp

                                                                                                        Filesize

                                                                                                        10.8MB

                                                                                                      • memory/5080-22-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                        Filesize

                                                                                                        172KB

                                                                                                      • memory/5080-17-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                        Filesize

                                                                                                        172KB

                                                                                                      • memory/5080-19-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                        Filesize

                                                                                                        172KB

                                                                                                      • memory/5080-20-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                        Filesize

                                                                                                        172KB

                                                                                                      • memory/5080-26-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                        Filesize

                                                                                                        172KB

                                                                                                      • memory/5080-18-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                        Filesize

                                                                                                        172KB

                                                                                                      • memory/5080-24-0x00007FF905E30000-0x00007FF905EEE000-memory.dmp

                                                                                                        Filesize

                                                                                                        760KB

                                                                                                      • memory/5080-23-0x00007FF9078B0000-0x00007FF907AA5000-memory.dmp

                                                                                                        Filesize

                                                                                                        2.0MB