Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2024, 01:23

General

  • Target

    c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe

  • Size

    4.2MB

  • MD5

    e8de534d36938bb16d424001824ba955

  • SHA1

    24ba41919aff326fc46d33a2e5a14efb4f443a33

  • SHA256

    c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317

  • SHA512

    c4d995e3646f93f428e26106d8a10a18d760542f5029c46f7c5ffffa80c3c709eb654315e019c82cba0cafe883808a312565112998eaa5183a47e622913f6f2a

  • SSDEEP

    98304:Jv0T1XT8Tbl9EdJLPOp4i7E1Yl4G/M6pSEC/z40cZl:doBQTbl9ETLOp1p4G/lSEMz4L

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 21 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 6 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe
    "C:\Users\Admin\AppData\Local\Temp\c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1568
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3256
    • C:\Users\Admin\AppData\Local\Temp\c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe
      "C:\Users\Admin\AppData\Local\Temp\c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4144
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3280
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2340
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:3692
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Modifies data under HKEY_USERS
        PID:376
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4280
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Manipulates WinMonFS driver.
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5076
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1740
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:4384
          • C:\Windows\System32\Conhost.exe
            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            5⤵
              PID:376
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /delete /tn ScheduledUpdate /f
            4⤵
              PID:4780
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              4⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4316
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              4⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2744
            • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
              C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:1460
            • C:\Windows\SYSTEM32\schtasks.exe
              schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
              4⤵
              • Creates scheduled task(s)
              PID:1624
            • C:\Windows\windefender.exe
              "C:\Windows\windefender.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:644
              • C:\Windows\SysWOW64\cmd.exe
                cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:2144
                • C:\Windows\SysWOW64\sc.exe
                  sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                  6⤵
                  • Launches sc.exe
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5096
      • C:\Windows\windefender.exe
        C:\Windows\windefender.exe
        1⤵
        • Executes dropped EXE
        • Modifies data under HKEY_USERS
        PID:2324

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

        Filesize

        216KB

        MD5

        0e3eec74556edc0638b28a515d9fd67d

        SHA1

        2421abe39842e78b39ba15e5dfb7c63a8b58eabb

        SHA256

        5e0ce22c28e9b85c54711fb01a0ac33005ec3e6d185ea1327d15584756cf17f7

        SHA512

        6b5a328a638164999b95cc979a0cff2b9aa14e941672fdd9db72c83552050b1253585b81c6a3bf9c5c713649c1766e03e77280312b08572987df6b49ae3e8b1c

      • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

        Filesize

        220KB

        MD5

        aad02a22d14cefd34b9991cd4266ccf4

        SHA1

        40c93deaa65f74549e049a2cdf43156acd146a0d

        SHA256

        b742869526e9a076cfc2b7ecb3c886c506b7737df78918d5762ba906363c7e97

        SHA512

        7592837a98384b13e17c3f12a8b0a8b009db735cec75e5e7b48cb64bb7695ba41e768975c3a96cd4cedde8fc5a5a10b314136a8bcda7a3d184ec53bb7f313f08

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        e38cf80ccd733d12acd8ed657fa76a0f

        SHA1

        580e49e1b482dcf0480cefe6d5bf8f0331732296

        SHA256

        47996c1354ee704ef75a94ae2217033da52695ca164573023cda951bdec728be

        SHA512

        ed7056b56d6cd0fd42f9bb716c647ed21f988231aa0817f28be7fceab199a274a479af4e7b77b86ed298b6734b39c2e6714d46bd6bd408d9862a77d97013bc12

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        9e316bc7217ad8fe4fc992e29a7c0f4f

        SHA1

        8e2e6ced44800cea6d8e9e102b8b7e3bf304cd27

        SHA256

        93531a73da618eb9139c51dc69e59ca913c239b802515ef15c95688d033b1945

        SHA512

        9f4514b3e55ae2d1900b50d062b4924728a2f7d5d8340376af12ff5298acfbc4db61fd433627f9eac71d2ea34a8a84d51650d0fbe1a97d3e2b8897fef6b8232c

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        b4819d6e722a6c487ec7912f5ff77388

        SHA1

        8c17a55780168c3bac3cd58db94b15cd444eaeb6

        SHA256

        ac5bbe74712c4d1ffd014999b2ffc20db829748da934636627c791a2db059078

        SHA512

        5f558441bc10e6bbb68e85d50347f6352468763a80b8d7a9728cc958ad628b4db6619c3a1066d928d1a5ecc41a4a6a58dcaf04d4ba0afdd520ca7ba463836dd8

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        3ea3b336026f8f4dea2f81f39753d397

        SHA1

        598016b0dd11cb23aa72a178a2685301f1e3164c

        SHA256

        5046c02d6897ba84a01bdd8f15a1009c65dcc745806933ae9295baf21e0ef925

        SHA512

        bfcd96d4a6394208c735c7af9e7c246b60216c6b74b703d763150b855b8f18de2c015667da2f7b3a9f96305bb6212898dbea6a59d330db60470a57ad9f59aa29

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        802b990ae482dd22dcd1c44cac71f08c

        SHA1

        d1f6201c02ac10e64c2cbe32c48643f77750a65f

        SHA256

        24b0c58c98f186e50558275fd0124a33c4be89609cf334afe885cbe52887f5a1

        SHA512

        f7e788d1e06a76cd88364b530fa6ceaf94005b9cd3c8300537181c61a4fc5bb895d2b02d4e705037c43e5d6c507a0855a58284f07b6db9c48ee9e4094bf0bb1e

      • C:\Windows\rss\csrss.exe

        Filesize

        189KB

        MD5

        1979823654f7b4340018a78221bcae49

        SHA1

        fce03f97b192e48ea6824aeecd880e15bfe4cafb

        SHA256

        c2f5bbc1fcdb6cf3ee44f565c0d1223620626ff17db362ee422f4874605e27d9

        SHA512

        b7f7af93cafc211c8ff801516a08cc9658859b20450e70cb12d3b1c78da30653b735bd1ed16d485c1629472061eb767396132e42b88695c1d93e2a59b9ed745d

      • C:\Windows\rss\csrss.exe

        Filesize

        291KB

        MD5

        17ef8fdf91e867b0d42e14ddeb3dd0e9

        SHA1

        1777a59382365c8c7c9190ddd83cfee7013a2f3c

        SHA256

        3bc922452b386df60fbdaf7362915a75459c83ba119eb1d722686366ef993a6d

        SHA512

        912694add62a2966349f2ec26f6500375d8ba44206e42ed3ddd11f57788f94e430008c1da4c8626395eb1e95e0c47bd2f462cfce5000db37647bc442d37b8ceb

      • C:\Windows\windefender.exe

        Filesize

        469KB

        MD5

        f6d28bcb3c34aea6d16d1a4331869e52

        SHA1

        87e0699187dc6e52b9b7cc988dd71b7601e003d2

        SHA256

        f86fb1d80c7ff9d096740b5b7fcbbca668a1761bfe158379ba185e5fc308adb0

        SHA512

        da48b4af0519a592896b9b334899facca1f9303296f2afbf4313da16d0224e82792b8ec3d3baa63e784c67131c6b4815c3c84d7649912f7dae4c8561b07a118c

      • C:\Windows\windefender.exe

        Filesize

        419KB

        MD5

        01db2f6792b216c69ef13611082e0b13

        SHA1

        7a2c61dc0a93e3e22d858ebbc14f30bdc8ec705b

        SHA256

        2b1c1120744fa90b18344d445ceb4f264abca116fee54b9ed6a30c12b7b17780

        SHA512

        e7cc0aea0cee743793664d5d188a81b98e08e1995d2c7f995cd2f7fa737d34159b2a6c51581d79a1651df5f6b35a89a2b6643a77b53e030ba3cb156d703bf133

      • C:\Windows\windefender.exe

        Filesize

        433KB

        MD5

        96a025e7a1fe27a1e36a3cd618d34702

        SHA1

        34c655ff3e25415ed0ebc1f0f04706ee306241b8

        SHA256

        55ccf1f572e46889f34afdfec06b85237c238468d0784e47c3decc5ba7ae52d6

        SHA512

        7f2b9588dcf86bf9405616223b2ceca3ce6bed6816f085361b45eb11410f2241946dd4d4fc9f199d86501bb18278e9d4437d05fd389cffe46514209cd3e88f5a

      • memory/644-238-0x0000000000400000-0x00000000008DF000-memory.dmp

        Filesize

        4.9MB

      • memory/1568-3-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/1568-1-0x0000000002CF0000-0x00000000030EE000-memory.dmp

        Filesize

        4.0MB

      • memory/1568-2-0x00000000030F0000-0x00000000039DB000-memory.dmp

        Filesize

        8.9MB

      • memory/1568-85-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/1568-58-0x00000000030F0000-0x00000000039DB000-memory.dmp

        Filesize

        8.9MB

      • memory/1568-56-0x0000000002CF0000-0x00000000030EE000-memory.dmp

        Filesize

        4.0MB

      • memory/1740-133-0x0000000074EF0000-0x00000000756A0000-memory.dmp

        Filesize

        7.7MB

      • memory/2324-251-0x0000000000400000-0x00000000008DF000-memory.dmp

        Filesize

        4.9MB

      • memory/2324-243-0x0000000000400000-0x00000000008DF000-memory.dmp

        Filesize

        4.9MB

      • memory/3256-45-0x00000000073B0000-0x0000000007446000-memory.dmp

        Filesize

        600KB

      • memory/3256-26-0x0000000007610000-0x0000000007C8A000-memory.dmp

        Filesize

        6.5MB

      • memory/3256-46-0x00000000072B0000-0x00000000072C1000-memory.dmp

        Filesize

        68KB

      • memory/3256-30-0x0000000070D90000-0x0000000070DDC000-memory.dmp

        Filesize

        304KB

      • memory/3256-29-0x0000000007150000-0x0000000007182000-memory.dmp

        Filesize

        200KB

      • memory/3256-28-0x000000007F5D0000-0x000000007F5E0000-memory.dmp

        Filesize

        64KB

      • memory/3256-47-0x00000000072F0000-0x00000000072FE000-memory.dmp

        Filesize

        56KB

      • memory/3256-48-0x0000000007310000-0x0000000007324000-memory.dmp

        Filesize

        80KB

      • memory/3256-49-0x0000000007350000-0x000000000736A000-memory.dmp

        Filesize

        104KB

      • memory/3256-50-0x0000000007340000-0x0000000007348000-memory.dmp

        Filesize

        32KB

      • memory/3256-53-0x0000000074EF0000-0x00000000756A0000-memory.dmp

        Filesize

        7.7MB

      • memory/3256-5-0x0000000074EF0000-0x00000000756A0000-memory.dmp

        Filesize

        7.7MB

      • memory/3256-44-0x00000000072A0000-0x00000000072AA000-memory.dmp

        Filesize

        40KB

      • memory/3256-7-0x00000000022A0000-0x00000000022B0000-memory.dmp

        Filesize

        64KB

      • memory/3256-42-0x00000000022A0000-0x00000000022B0000-memory.dmp

        Filesize

        64KB

      • memory/3256-8-0x0000000004D30000-0x0000000005358000-memory.dmp

        Filesize

        6.2MB

      • memory/3256-6-0x00000000022A0000-0x00000000022B0000-memory.dmp

        Filesize

        64KB

      • memory/3256-4-0x00000000022F0000-0x0000000002326000-memory.dmp

        Filesize

        216KB

      • memory/3256-41-0x0000000007190000-0x00000000071AE000-memory.dmp

        Filesize

        120KB

      • memory/3256-11-0x00000000053D0000-0x0000000005436000-memory.dmp

        Filesize

        408KB

      • memory/3256-21-0x0000000005600000-0x0000000005954000-memory.dmp

        Filesize

        3.3MB

      • memory/3256-43-0x00000000071B0000-0x0000000007253000-memory.dmp

        Filesize

        652KB

      • memory/3256-10-0x0000000004C90000-0x0000000004CF6000-memory.dmp

        Filesize

        408KB

      • memory/3256-9-0x0000000004BF0000-0x0000000004C12000-memory.dmp

        Filesize

        136KB

      • memory/3256-22-0x0000000005BE0000-0x0000000005BFE000-memory.dmp

        Filesize

        120KB

      • memory/3256-23-0x0000000005C10000-0x0000000005C5C000-memory.dmp

        Filesize

        304KB

      • memory/3256-24-0x0000000006120000-0x0000000006164000-memory.dmp

        Filesize

        272KB

      • memory/3256-31-0x0000000070F30000-0x0000000071284000-memory.dmp

        Filesize

        3.3MB

      • memory/3256-25-0x0000000006F10000-0x0000000006F86000-memory.dmp

        Filesize

        472KB

      • memory/3256-27-0x0000000006F90000-0x0000000006FAA000-memory.dmp

        Filesize

        104KB

      • memory/3280-68-0x0000000074EF0000-0x00000000756A0000-memory.dmp

        Filesize

        7.7MB

      • memory/3280-90-0x0000000074EF0000-0x00000000756A0000-memory.dmp

        Filesize

        7.7MB

      • memory/3280-70-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

        Filesize

        64KB

      • memory/3280-71-0x0000000005D20000-0x0000000006074000-memory.dmp

        Filesize

        3.3MB

      • memory/3280-69-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

        Filesize

        64KB

      • memory/3280-72-0x000000007EF40000-0x000000007EF50000-memory.dmp

        Filesize

        64KB

      • memory/3280-84-0x0000000007290000-0x0000000007333000-memory.dmp

        Filesize

        652KB

      • memory/3280-74-0x0000000070E00000-0x0000000071154000-memory.dmp

        Filesize

        3.3MB

      • memory/3280-73-0x0000000070D90000-0x0000000070DDC000-memory.dmp

        Filesize

        304KB

      • memory/3280-86-0x00000000075C0000-0x00000000075D1000-memory.dmp

        Filesize

        68KB

      • memory/3280-87-0x0000000007610000-0x0000000007624000-memory.dmp

        Filesize

        80KB

      • memory/4144-55-0x0000000002B90000-0x0000000002F8E000-memory.dmp

        Filesize

        4.0MB

      • memory/4144-193-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/4144-132-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/4144-57-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/4144-107-0x0000000002B90000-0x0000000002F8E000-memory.dmp

        Filesize

        4.0MB

      • memory/4280-93-0x0000000074EF0000-0x00000000756A0000-memory.dmp

        Filesize

        7.7MB

      • memory/4280-123-0x0000000074EF0000-0x00000000756A0000-memory.dmp

        Filesize

        7.7MB

      • memory/4280-102-0x0000000006200000-0x0000000006554000-memory.dmp

        Filesize

        3.3MB

      • memory/4280-108-0x000000007F0D0000-0x000000007F0E0000-memory.dmp

        Filesize

        64KB

      • memory/4280-109-0x0000000070D90000-0x0000000070DDC000-memory.dmp

        Filesize

        304KB

      • memory/4280-121-0x0000000005320000-0x0000000005330000-memory.dmp

        Filesize

        64KB

      • memory/4280-94-0x0000000005320000-0x0000000005330000-memory.dmp

        Filesize

        64KB

      • memory/4280-120-0x0000000005320000-0x0000000005330000-memory.dmp

        Filesize

        64KB

      • memory/4280-110-0x0000000071510000-0x0000000071864000-memory.dmp

        Filesize

        3.3MB

      • memory/4280-95-0x0000000005320000-0x0000000005330000-memory.dmp

        Filesize

        64KB

      • memory/5076-245-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5076-257-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5076-131-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5076-130-0x0000000003200000-0x0000000003600000-memory.dmp

        Filesize

        4.0MB

      • memory/5076-249-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5076-230-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5076-253-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5076-241-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5076-261-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5076-265-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5076-269-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5076-273-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5076-277-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5076-281-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5076-285-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB