Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    09/04/2024, 02:34

General

  • Target

    febf09854a2da260e26ef0d3cb71a090bbc56d4eaf57b8a902d10ba766eb7cd5.exe

  • Size

    4.2MB

  • MD5

    854ce7d690d1d8637c38127a10cce9fc

  • SHA1

    5ea37bfa0d74a4d8edaaf037221112820440129a

  • SHA256

    febf09854a2da260e26ef0d3cb71a090bbc56d4eaf57b8a902d10ba766eb7cd5

  • SHA512

    8997d7d5abfbcda6f4ad1f80b26d723b1be65285ac1feaec0c330c2b626bfbace0e30a0ff40b39e72e9118fdf7efd19cbcb95cfc4325eb3e192b91498dff4695

  • SSDEEP

    98304:MBo7TEOS9z37c565/OF7GVbQ0Ggv3fjQl4owZWsM:VSa5f7GFQ+3EqoWG

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 20 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\febf09854a2da260e26ef0d3cb71a090bbc56d4eaf57b8a902d10ba766eb7cd5.exe
    "C:\Users\Admin\AppData\Local\Temp\febf09854a2da260e26ef0d3cb71a090bbc56d4eaf57b8a902d10ba766eb7cd5.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1216
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4972
    • C:\Users\Admin\AppData\Local\Temp\febf09854a2da260e26ef0d3cb71a090bbc56d4eaf57b8a902d10ba766eb7cd5.exe
      "C:\Users\Admin\AppData\Local\Temp\febf09854a2da260e26ef0d3cb71a090bbc56d4eaf57b8a902d10ba766eb7cd5.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1668
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3936
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:708
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:692
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1644
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:676
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Manipulates WinMonFS driver.
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4596
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3656
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:3284
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:4656
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4072
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2808
          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:2080
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            4⤵
            • Creates scheduled task(s)
            PID:3892
          • C:\Windows\windefender.exe
            "C:\Windows\windefender.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4992
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:896
              • C:\Windows\SysWOW64\sc.exe
                sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                6⤵
                • Launches sc.exe
                • Suspicious use of AdjustPrivilegeToken
                PID:4940
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 904
          3⤵
          • Program crash
          PID:4980
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 920
        2⤵
        • Program crash
        PID:3024
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1216 -ip 1216
      1⤵
        PID:4312
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1668 -ip 1668
        1⤵
          PID:4336
        • C:\Windows\windefender.exe
          C:\Windows\windefender.exe
          1⤵
          • Executes dropped EXE
          • Modifies data under HKEY_USERS
          PID:708

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rh0dwioz.w5j.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

          Filesize

          281KB

          MD5

          d98e33b66343e7c96158444127a117f6

          SHA1

          bb716c5509a2bf345c6c1152f6e3e1452d39d50d

          SHA256

          5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

          SHA512

          705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

          Filesize

          2KB

          MD5

          d0c46cad6c0778401e21910bd6b56b70

          SHA1

          7be418951ea96326aca445b8dfe449b2bfa0dca6

          SHA256

          9600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02

          SHA512

          057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949

        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

          Filesize

          19KB

          MD5

          e2631d1dae32681a7e9f552406c6a210

          SHA1

          73a282ad05a63090d4376ede90c412db3c3ee2df

          SHA256

          84de4c511950663d1ceb8909726ed4874e01f6ad7f2ff97ad51b786aa08f8c46

          SHA512

          6688f311db4b23488762785418fb2a4c7671b6f9f5b2c58bf9b9546455bf1d0aed75f6149ec7a7ff88ad6b0199f4b278e1ed1a593ec2590bd4fe1ea08ac97223

        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

          Filesize

          19KB

          MD5

          38da9bdaa961da1a9f82fe512e75d89f

          SHA1

          68eefed2c7f02232356bd41e2d8a05c6b4134944

          SHA256

          90654b45891ae5b0b87409177d1ffe36724d69f593c31a4773f452b7a362349b

          SHA512

          6db2dce41c6d89e632df35c27c423751f685df65a49d6e6cd98ff3c24a2b5b19bfa5939b5e9a6aac23bcd4e80494a0889bc93cd13d8e7db5973ffdb1b7f44095

        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

          Filesize

          19KB

          MD5

          28dc4acbbff39884fd791f4350b3f7d8

          SHA1

          bf7edef3b73d25693700a9c3b3677ef050089c5d

          SHA256

          cafcd7ec9747883bda35d469a77608786921f57972bec23908c301c25754c687

          SHA512

          0c24f25e529bc1605810a9271c965e61c717c3a45be79695bc8a0283a91de6ba6a81ca94d301bd49995ba581d8bb0c61c347bdc969c0bb5ee35092089111f894

        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

          Filesize

          19KB

          MD5

          56fa848b41e162333242232201194faa

          SHA1

          5db206ff96cadd393e1616bdb976dfe95e8b5ea7

          SHA256

          625cd5b6b1f0e7244784f0a62bcedb67055cce7d200e2370ed2112aa709ff9b2

          SHA512

          d86cba107924b90390c658de86eef5bcb4d40251a4e796e34cc5bcb610c20f0ba3661a171f3198c4fbc4807502f824c640af020fff876ae76c7b2a2c0503252d

        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

          Filesize

          19KB

          MD5

          2987e3921415fbd0cb027c907caf248e

          SHA1

          846a82fb7f8e893740dc0320c7ef4aa500d53855

          SHA256

          6d79866a72d29e9d6cc2a21e10a763713c7b371c83f807aed98d69b55f5836dd

          SHA512

          483652cb3fa6316c636684bee67245d5f0eee275297769a7f56c0336d9c3b8766a233bfdbcd518bab1c9a44d079b0f4ba02b5abff3ee1000c9ee617724516f1a

        • C:\Windows\rss\csrss.exe

          Filesize

          4.2MB

          MD5

          854ce7d690d1d8637c38127a10cce9fc

          SHA1

          5ea37bfa0d74a4d8edaaf037221112820440129a

          SHA256

          febf09854a2da260e26ef0d3cb71a090bbc56d4eaf57b8a902d10ba766eb7cd5

          SHA512

          8997d7d5abfbcda6f4ad1f80b26d723b1be65285ac1feaec0c330c2b626bfbace0e30a0ff40b39e72e9118fdf7efd19cbcb95cfc4325eb3e192b91498dff4695

        • C:\Windows\windefender.exe

          Filesize

          2.0MB

          MD5

          8e67f58837092385dcf01e8a2b4f5783

          SHA1

          012c49cfd8c5d06795a6f67ea2baf2a082cf8625

          SHA256

          166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

          SHA512

          40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

        • memory/676-116-0x0000000002490000-0x00000000024A0000-memory.dmp

          Filesize

          64KB

        • memory/676-128-0x000000007FD00000-0x000000007FD10000-memory.dmp

          Filesize

          64KB

        • memory/676-130-0x00000000713D0000-0x0000000071727000-memory.dmp

          Filesize

          3.3MB

        • memory/676-129-0x0000000071180000-0x00000000711CC000-memory.dmp

          Filesize

          304KB

        • memory/676-115-0x0000000074EA0000-0x0000000075651000-memory.dmp

          Filesize

          7.7MB

        • memory/676-117-0x0000000002490000-0x00000000024A0000-memory.dmp

          Filesize

          64KB

        • memory/708-255-0x0000000000400000-0x00000000008DF000-memory.dmp

          Filesize

          4.9MB

        • memory/708-259-0x0000000000400000-0x00000000008DF000-memory.dmp

          Filesize

          4.9MB

        • memory/1216-2-0x0000000005270000-0x0000000005B5B000-memory.dmp

          Filesize

          8.9MB

        • memory/1216-3-0x0000000000400000-0x0000000003104000-memory.dmp

          Filesize

          45.0MB

        • memory/1216-53-0x0000000005270000-0x0000000005B5B000-memory.dmp

          Filesize

          8.9MB

        • memory/1216-51-0x0000000000400000-0x0000000003104000-memory.dmp

          Filesize

          45.0MB

        • memory/1216-1-0x0000000004E70000-0x000000000526F000-memory.dmp

          Filesize

          4.0MB

        • memory/1644-87-0x0000000074EA0000-0x0000000075651000-memory.dmp

          Filesize

          7.7MB

        • memory/1644-88-0x00000000027F0000-0x0000000002800000-memory.dmp

          Filesize

          64KB

        • memory/1644-112-0x00000000027F0000-0x0000000002800000-memory.dmp

          Filesize

          64KB

        • memory/1644-103-0x0000000071300000-0x0000000071657000-memory.dmp

          Filesize

          3.3MB

        • memory/1644-101-0x0000000071180000-0x00000000711CC000-memory.dmp

          Filesize

          304KB

        • memory/1644-98-0x0000000005800000-0x0000000005B57000-memory.dmp

          Filesize

          3.3MB

        • memory/1644-114-0x0000000074EA0000-0x0000000075651000-memory.dmp

          Filesize

          7.7MB

        • memory/1644-102-0x000000007F2D0000-0x000000007F2E0000-memory.dmp

          Filesize

          64KB

        • memory/1644-89-0x00000000027F0000-0x0000000002800000-memory.dmp

          Filesize

          64KB

        • memory/1668-100-0x0000000004E10000-0x000000000520C000-memory.dmp

          Filesize

          4.0MB

        • memory/1668-52-0x0000000004E10000-0x000000000520C000-memory.dmp

          Filesize

          4.0MB

        • memory/1668-127-0x0000000000400000-0x0000000003104000-memory.dmp

          Filesize

          45.0MB

        • memory/1668-54-0x0000000000400000-0x0000000003104000-memory.dmp

          Filesize

          45.0MB

        • memory/1668-147-0x0000000000400000-0x0000000003104000-memory.dmp

          Filesize

          45.0MB

        • memory/3936-81-0x0000000007A70000-0x0000000007A81000-memory.dmp

          Filesize

          68KB

        • memory/3936-57-0x0000000006040000-0x0000000006397000-memory.dmp

          Filesize

          3.3MB

        • memory/3936-66-0x0000000006510000-0x000000000655C000-memory.dmp

          Filesize

          304KB

        • memory/3936-68-0x0000000071180000-0x00000000711CC000-memory.dmp

          Filesize

          304KB

        • memory/3936-80-0x0000000007730000-0x00000000077D4000-memory.dmp

          Filesize

          656KB

        • memory/3936-79-0x0000000005280000-0x0000000005290000-memory.dmp

          Filesize

          64KB

        • memory/3936-78-0x0000000005280000-0x0000000005290000-memory.dmp

          Filesize

          64KB

        • memory/3936-69-0x00000000713D0000-0x0000000071727000-memory.dmp

          Filesize

          3.3MB

        • memory/3936-67-0x000000007FDE0000-0x000000007FDF0000-memory.dmp

          Filesize

          64KB

        • memory/3936-56-0x0000000005280000-0x0000000005290000-memory.dmp

          Filesize

          64KB

        • memory/3936-82-0x0000000007AC0000-0x0000000007AD5000-memory.dmp

          Filesize

          84KB

        • memory/3936-85-0x0000000074EA0000-0x0000000075651000-memory.dmp

          Filesize

          7.7MB

        • memory/3936-55-0x0000000074EA0000-0x0000000075651000-memory.dmp

          Filesize

          7.7MB

        • memory/4596-276-0x0000000000400000-0x0000000003104000-memory.dmp

          Filesize

          45.0MB

        • memory/4596-274-0x0000000000400000-0x0000000003104000-memory.dmp

          Filesize

          45.0MB

        • memory/4596-272-0x0000000000400000-0x0000000003104000-memory.dmp

          Filesize

          45.0MB

        • memory/4596-270-0x0000000000400000-0x0000000003104000-memory.dmp

          Filesize

          45.0MB

        • memory/4596-268-0x0000000000400000-0x0000000003104000-memory.dmp

          Filesize

          45.0MB

        • memory/4596-266-0x0000000000400000-0x0000000003104000-memory.dmp

          Filesize

          45.0MB

        • memory/4596-264-0x0000000000400000-0x0000000003104000-memory.dmp

          Filesize

          45.0MB

        • memory/4596-262-0x0000000000400000-0x0000000003104000-memory.dmp

          Filesize

          45.0MB

        • memory/4596-260-0x0000000000400000-0x0000000003104000-memory.dmp

          Filesize

          45.0MB

        • memory/4596-258-0x0000000000400000-0x0000000003104000-memory.dmp

          Filesize

          45.0MB

        • memory/4596-256-0x0000000000400000-0x0000000003104000-memory.dmp

          Filesize

          45.0MB

        • memory/4596-254-0x0000000000400000-0x0000000003104000-memory.dmp

          Filesize

          45.0MB

        • memory/4596-245-0x0000000000400000-0x0000000003104000-memory.dmp

          Filesize

          45.0MB

        • memory/4972-25-0x0000000071070000-0x00000000710BC000-memory.dmp

          Filesize

          304KB

        • memory/4972-37-0x00000000054A0000-0x00000000054B0000-memory.dmp

          Filesize

          64KB

        • memory/4972-26-0x00000000711F0000-0x0000000071547000-memory.dmp

          Filesize

          3.3MB

        • memory/4972-23-0x000000007FD60000-0x000000007FD70000-memory.dmp

          Filesize

          64KB

        • memory/4972-22-0x0000000006C30000-0x0000000006C76000-memory.dmp

          Filesize

          280KB

        • memory/4972-21-0x0000000006850000-0x000000000689C000-memory.dmp

          Filesize

          304KB

        • memory/4972-20-0x0000000006800000-0x000000000681E000-memory.dmp

          Filesize

          120KB

        • memory/4972-19-0x0000000006320000-0x0000000006677000-memory.dmp

          Filesize

          3.3MB

        • memory/4972-10-0x00000000061F0000-0x0000000006256000-memory.dmp

          Filesize

          408KB

        • memory/4972-9-0x0000000006110000-0x0000000006176000-memory.dmp

          Filesize

          408KB

        • memory/4972-8-0x0000000005A40000-0x0000000005A62000-memory.dmp

          Filesize

          136KB

        • memory/4972-7-0x0000000005AE0000-0x000000000610A000-memory.dmp

          Filesize

          6.2MB

        • memory/4972-36-0x0000000007C90000-0x0000000007D34000-memory.dmp

          Filesize

          656KB

        • memory/4972-5-0x0000000074E00000-0x00000000755B1000-memory.dmp

          Filesize

          7.7MB

        • memory/4972-49-0x0000000074E00000-0x00000000755B1000-memory.dmp

          Filesize

          7.7MB

        • memory/4972-35-0x0000000007C70000-0x0000000007C8E000-memory.dmp

          Filesize

          120KB

        • memory/4972-6-0x00000000054A0000-0x00000000054B0000-memory.dmp

          Filesize

          64KB

        • memory/4972-24-0x0000000007C30000-0x0000000007C64000-memory.dmp

          Filesize

          208KB

        • memory/4972-39-0x0000000007DC0000-0x0000000007DDA000-memory.dmp

          Filesize

          104KB

        • memory/4972-4-0x0000000003330000-0x0000000003366000-memory.dmp

          Filesize

          216KB

        • memory/4972-40-0x0000000007E00000-0x0000000007E0A000-memory.dmp

          Filesize

          40KB

        • memory/4972-38-0x0000000008400000-0x0000000008A7A000-memory.dmp

          Filesize

          6.5MB

        • memory/4972-41-0x0000000007F10000-0x0000000007FA6000-memory.dmp

          Filesize

          600KB

        • memory/4972-42-0x0000000007E20000-0x0000000007E31000-memory.dmp

          Filesize

          68KB

        • memory/4972-43-0x0000000007E70000-0x0000000007E7E000-memory.dmp

          Filesize

          56KB

        • memory/4972-45-0x0000000007ED0000-0x0000000007EEA000-memory.dmp

          Filesize

          104KB

        • memory/4972-44-0x0000000007E80000-0x0000000007E95000-memory.dmp

          Filesize

          84KB

        • memory/4972-46-0x0000000007EF0000-0x0000000007EF8000-memory.dmp

          Filesize

          32KB

        • memory/4992-252-0x0000000000400000-0x00000000008DF000-memory.dmp

          Filesize

          4.9MB