Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/04/2024, 04:48

General

  • Target

    3dd6be1b128a4863270df7887a2a438f221d5c12f1fba6039517d6d33a3f33d1.exe

  • Size

    4.2MB

  • MD5

    54f0c9fbff3cf8569a3b2a413397e618

  • SHA1

    acbaee9da9cfbc2b02d7babce4a3aa85856c897d

  • SHA256

    3dd6be1b128a4863270df7887a2a438f221d5c12f1fba6039517d6d33a3f33d1

  • SHA512

    008d26cc8266861b190b058f0fee68c3b144a7fd7a6b4fde58c1de872621fd936e7cd77378a5b00b32e46ead6c17b085a2064144675760bd219cca3c61323bfd

  • SSDEEP

    98304:GECH+3DSWnI1KGGLxQ5XsnDnmKFULzGt/AOX9k/3NCXH+HNQDf1LiqQ:GtH+32WnIs1Fg8DnrtoOX9+mBzQ

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 18 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3dd6be1b128a4863270df7887a2a438f221d5c12f1fba6039517d6d33a3f33d1.exe
    "C:\Users\Admin\AppData\Local\Temp\3dd6be1b128a4863270df7887a2a438f221d5c12f1fba6039517d6d33a3f33d1.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4408
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4464
    • C:\Users\Admin\AppData\Local\Temp\3dd6be1b128a4863270df7887a2a438f221d5c12f1fba6039517d6d33a3f33d1.exe
      "C:\Users\Admin\AppData\Local\Temp\3dd6be1b128a4863270df7887a2a438f221d5c12f1fba6039517d6d33a3f33d1.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2516
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4912
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4432
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:4804
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4968
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2908
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Manipulates WinMonFS driver.
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5004
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1688
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:5080
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:3984
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4348
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2608
          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:3068
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            4⤵
            • Creates scheduled task(s)
            PID:4860
          • C:\Windows\windefender.exe
            "C:\Windows\windefender.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3252
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:3656
              • C:\Windows\SysWOW64\sc.exe
                sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                6⤵
                • Launches sc.exe
                • Suspicious use of AdjustPrivilegeToken
                PID:560
    • C:\Windows\windefender.exe
      C:\Windows\windefender.exe
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:3840

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1agyax1s.ktn.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

      Filesize

      281KB

      MD5

      d98e33b66343e7c96158444127a117f6

      SHA1

      bb716c5509a2bf345c6c1152f6e3e1452d39d50d

      SHA256

      5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

      SHA512

      705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      3d086a433708053f9bf9523e1d87a4e8

      SHA1

      b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

      SHA256

      6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

      SHA512

      931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      4a1dc1cc002ac59859c2ffde51af11d3

      SHA1

      adfec08c6ed74db0fa59bca3629ed80f11056cf9

      SHA256

      411619f625b54863470af80b4ee8caca48ffb5635a85035e774985f4970b424b

      SHA512

      f73d9aba36a7b0b57c4f95b3632719b614e8854aae7fb0e8a6c9d3ee56ad2d9ad76133ce5fad802ca824c6c539097e6c469cfc781a33035564b994fdb477a54c

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      fda4d83eb3827c57d9615778d4c883c7

      SHA1

      c5678da1b13af96ccfcd4ea79d9ca77ec38a44b1

      SHA256

      345113be34a0fce34a65b62681048da008b2402723ab12792f70df3e0d6cf9af

      SHA512

      d0040c27418e21edc40b84d620c07c85a4a85dba5179fb22fb2fad8479bac13f6637c8f4af60296b60046a4d3b921a0259419d148819fedc2ee2287bb60804bd

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      b4f6ba4be6bdfc139917ba31ad638776

      SHA1

      79d828b37e40389a057909cb8c72f704b085dbff

      SHA256

      211710d5f3c6323983d925a829e3aab0b9526e7037b214027b6835d9f7f0650c

      SHA512

      bf9a00af3352ef9b6adc65b6988fde5d4f3fd1e348ce073b290c1d854f1457eb1918681649c27d4913c2881c6e552ada2ac54b82b50fb7f09a53d704f4b762fb

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      bb152e31a0ddb05eddd67dec6f77f5e9

      SHA1

      c2266cf0d45384a4ab7f22507f4c0586d6509d0b

      SHA256

      53375d3caaa4c3dc5091987a85f32f15627ee1e8cee640b82907bc9f36c2fd43

      SHA512

      c0bd57ac759c3b067b4cb476951bd4e44e9e9e37ade06117747ad8c57497f17fc8ffdcdba4052a26ea7ddbd172a1eb77348b3af8050c316f6b3b024b832accf3

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      fa12c71c2eeb6d4370e8eacb8ba69f2a

      SHA1

      53463bf1feee2e89203c544d1df71f41d65de2de

      SHA256

      c38f9ad69b16b78d735a486a3a04feeec33b6f337f5f444b92277038330af7b7

      SHA512

      295fa4d2310ffbcec784e047f734644d9d3bcb363b29581fcb37f7e2da1e714f231c791d1947f1d8a7ffd7b5e0e99e985948eb4aacc783d449104a024367fe5c

    • C:\Windows\rss\csrss.exe

      Filesize

      4.2MB

      MD5

      54f0c9fbff3cf8569a3b2a413397e618

      SHA1

      acbaee9da9cfbc2b02d7babce4a3aa85856c897d

      SHA256

      3dd6be1b128a4863270df7887a2a438f221d5c12f1fba6039517d6d33a3f33d1

      SHA512

      008d26cc8266861b190b058f0fee68c3b144a7fd7a6b4fde58c1de872621fd936e7cd77378a5b00b32e46ead6c17b085a2064144675760bd219cca3c61323bfd

    • C:\Windows\windefender.exe

      Filesize

      2.0MB

      MD5

      8e67f58837092385dcf01e8a2b4f5783

      SHA1

      012c49cfd8c5d06795a6f67ea2baf2a082cf8625

      SHA256

      166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

      SHA512

      40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

    • memory/2516-123-0x0000000002B40000-0x0000000002F46000-memory.dmp

      Filesize

      4.0MB

    • memory/2516-137-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/2516-159-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/2516-58-0x0000000002B40000-0x0000000002F46000-memory.dmp

      Filesize

      4.0MB

    • memory/2516-59-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/2908-126-0x0000000004E60000-0x0000000004E70000-memory.dmp

      Filesize

      64KB

    • memory/2908-124-0x0000000074370000-0x0000000074B20000-memory.dmp

      Filesize

      7.7MB

    • memory/2908-139-0x0000000070990000-0x0000000070CE4000-memory.dmp

      Filesize

      3.3MB

    • memory/2908-125-0x0000000004E60000-0x0000000004E70000-memory.dmp

      Filesize

      64KB

    • memory/2908-138-0x0000000070210000-0x000000007025C000-memory.dmp

      Filesize

      304KB

    • memory/3252-264-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/3840-277-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/3840-269-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/4408-55-0x0000000002AD0000-0x0000000002ED2000-memory.dmp

      Filesize

      4.0MB

    • memory/4408-1-0x0000000002AD0000-0x0000000002ED2000-memory.dmp

      Filesize

      4.0MB

    • memory/4408-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/4408-2-0x0000000002EE0000-0x00000000037CB000-memory.dmp

      Filesize

      8.9MB

    • memory/4408-57-0x0000000002EE0000-0x00000000037CB000-memory.dmp

      Filesize

      8.9MB

    • memory/4408-56-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/4464-31-0x0000000070950000-0x0000000070CA4000-memory.dmp

      Filesize

      3.3MB

    • memory/4464-30-0x0000000070210000-0x000000007025C000-memory.dmp

      Filesize

      304KB

    • memory/4464-49-0x0000000007590000-0x00000000075AA000-memory.dmp

      Filesize

      104KB

    • memory/4464-50-0x0000000007580000-0x0000000007588000-memory.dmp

      Filesize

      32KB

    • memory/4464-53-0x0000000074370000-0x0000000074B20000-memory.dmp

      Filesize

      7.7MB

    • memory/4464-47-0x0000000007520000-0x000000000752E000-memory.dmp

      Filesize

      56KB

    • memory/4464-46-0x00000000074E0000-0x00000000074F1000-memory.dmp

      Filesize

      68KB

    • memory/4464-45-0x00000000075E0000-0x0000000007676000-memory.dmp

      Filesize

      600KB

    • memory/4464-44-0x00000000074D0000-0x00000000074DA000-memory.dmp

      Filesize

      40KB

    • memory/4464-43-0x00000000073E0000-0x0000000007483000-memory.dmp

      Filesize

      652KB

    • memory/4464-4-0x0000000002800000-0x0000000002836000-memory.dmp

      Filesize

      216KB

    • memory/4464-5-0x0000000074370000-0x0000000074B20000-memory.dmp

      Filesize

      7.7MB

    • memory/4464-6-0x0000000004C20000-0x0000000004C30000-memory.dmp

      Filesize

      64KB

    • memory/4464-8-0x0000000005260000-0x0000000005888000-memory.dmp

      Filesize

      6.2MB

    • memory/4464-7-0x0000000004C20000-0x0000000004C30000-memory.dmp

      Filesize

      64KB

    • memory/4464-9-0x0000000004E20000-0x0000000004E42000-memory.dmp

      Filesize

      136KB

    • memory/4464-48-0x0000000007540000-0x0000000007554000-memory.dmp

      Filesize

      80KB

    • memory/4464-10-0x0000000004EE0000-0x0000000004F46000-memory.dmp

      Filesize

      408KB

    • memory/4464-11-0x0000000005140000-0x00000000051A6000-memory.dmp

      Filesize

      408KB

    • memory/4464-21-0x0000000005890000-0x0000000005BE4000-memory.dmp

      Filesize

      3.3MB

    • memory/4464-22-0x0000000005E00000-0x0000000005E1E000-memory.dmp

      Filesize

      120KB

    • memory/4464-23-0x0000000005E40000-0x0000000005E8C000-memory.dmp

      Filesize

      304KB

    • memory/4464-41-0x00000000073C0000-0x00000000073DE000-memory.dmp

      Filesize

      120KB

    • memory/4464-24-0x0000000006370000-0x00000000063B4000-memory.dmp

      Filesize

      272KB

    • memory/4464-25-0x0000000007120000-0x0000000007196000-memory.dmp

      Filesize

      472KB

    • memory/4464-26-0x0000000007820000-0x0000000007E9A000-memory.dmp

      Filesize

      6.5MB

    • memory/4464-27-0x00000000071C0000-0x00000000071DA000-memory.dmp

      Filesize

      104KB

    • memory/4464-42-0x0000000004C20000-0x0000000004C30000-memory.dmp

      Filesize

      64KB

    • memory/4464-28-0x000000007F810000-0x000000007F820000-memory.dmp

      Filesize

      64KB

    • memory/4464-29-0x0000000007380000-0x00000000073B2000-memory.dmp

      Filesize

      200KB

    • memory/4912-76-0x0000000070390000-0x00000000706E4000-memory.dmp

      Filesize

      3.3MB

    • memory/4912-61-0x0000000004F00000-0x0000000004F10000-memory.dmp

      Filesize

      64KB

    • memory/4912-60-0x0000000074370000-0x0000000074B20000-memory.dmp

      Filesize

      7.7MB

    • memory/4912-62-0x0000000004F00000-0x0000000004F10000-memory.dmp

      Filesize

      64KB

    • memory/4912-72-0x0000000006010000-0x0000000006364000-memory.dmp

      Filesize

      3.3MB

    • memory/4912-75-0x0000000070210000-0x000000007025C000-memory.dmp

      Filesize

      304KB

    • memory/4912-74-0x000000007F870000-0x000000007F880000-memory.dmp

      Filesize

      64KB

    • memory/4912-87-0x0000000004F00000-0x0000000004F10000-memory.dmp

      Filesize

      64KB

    • memory/4912-86-0x0000000007660000-0x0000000007703000-memory.dmp

      Filesize

      652KB

    • memory/4912-88-0x0000000007970000-0x0000000007981000-memory.dmp

      Filesize

      68KB

    • memory/4912-92-0x0000000074370000-0x0000000074B20000-memory.dmp

      Filesize

      7.7MB

    • memory/4912-89-0x00000000079C0000-0x00000000079D4000-memory.dmp

      Filesize

      80KB

    • memory/4968-120-0x00000000046D0000-0x00000000046E0000-memory.dmp

      Filesize

      64KB

    • memory/4968-95-0x00000000046D0000-0x00000000046E0000-memory.dmp

      Filesize

      64KB

    • memory/4968-96-0x00000000046D0000-0x00000000046E0000-memory.dmp

      Filesize

      64KB

    • memory/4968-97-0x00000000054A0000-0x00000000057F4000-memory.dmp

      Filesize

      3.3MB

    • memory/4968-109-0x0000000070210000-0x000000007025C000-memory.dmp

      Filesize

      304KB

    • memory/4968-94-0x0000000074370000-0x0000000074B20000-memory.dmp

      Filesize

      7.7MB

    • memory/4968-108-0x000000007F090000-0x000000007F0A0000-memory.dmp

      Filesize

      64KB

    • memory/4968-110-0x0000000070990000-0x0000000070CE4000-memory.dmp

      Filesize

      3.3MB

    • memory/4968-122-0x0000000074370000-0x0000000074B20000-memory.dmp

      Filesize

      7.7MB

    • memory/5004-255-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/5004-268-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/5004-272-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/5004-276-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/5004-265-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/5004-281-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/5004-285-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/5004-288-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/5004-292-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/5004-298-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/5004-301-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB