Analysis

  • max time kernel
    175s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/03/2024, 10:43

General

  • Target

    625d09aad19ac66f10e3b091366af269ac26a7ed939f99da56dc538f55e39cae.exe

  • Size

    4.1MB

  • MD5

    32d647017be06180fe09f5c213831028

  • SHA1

    cd4283f5d15c74102ff1bf123f03a85030a27e66

  • SHA256

    625d09aad19ac66f10e3b091366af269ac26a7ed939f99da56dc538f55e39cae

  • SHA512

    0494d33b173ea2bbf8e17f01c0b3dc9715ff25fa7e9a730127e4ce956d517720ce2ee4875c89345914455d241d2906aff66e623368d2b4826951d23a82ec5e2a

  • SSDEEP

    98304:GPRhe74u5eUEX/Z5gMRJz/uHUsCs+QnQ1aM+LC9PtGW9zrjv4:2RI74a1S/UMLzvsTecM+LotF9zvg

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 18 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\625d09aad19ac66f10e3b091366af269ac26a7ed939f99da56dc538f55e39cae.exe
    "C:\Users\Admin\AppData\Local\Temp\625d09aad19ac66f10e3b091366af269ac26a7ed939f99da56dc538f55e39cae.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:856
    • C:\Users\Admin\AppData\Local\Temp\625d09aad19ac66f10e3b091366af269ac26a7ed939f99da56dc538f55e39cae.exe
      "C:\Users\Admin\AppData\Local\Temp\625d09aad19ac66f10e3b091366af269ac26a7ed939f99da56dc538f55e39cae.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1476
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4524
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2332
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:2212
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4464
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2544
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Manipulates WinMonFS driver.
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1468
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3284
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:2440
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:716
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2268
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1836
          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:2596
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            4⤵
            • Creates scheduled task(s)
            PID:648
          • C:\Windows\windefender.exe
            "C:\Windows\windefender.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:996
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:380
              • C:\Windows\SysWOW64\sc.exe
                sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                6⤵
                • Launches sc.exe
                • Suspicious use of AdjustPrivilegeToken
                PID:3760
    • C:\Windows\windefender.exe
      C:\Windows\windefender.exe
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:1932

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wafk54eq.sjz.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

            Filesize

            281KB

            MD5

            d98e33b66343e7c96158444127a117f6

            SHA1

            bb716c5509a2bf345c6c1152f6e3e1452d39d50d

            SHA256

            5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

            SHA512

            705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

            Filesize

            2KB

            MD5

            968cb9309758126772781b83adb8a28f

            SHA1

            8da30e71accf186b2ba11da1797cf67f8f78b47c

            SHA256

            92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

            SHA512

            4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            19KB

            MD5

            30058fe7ed73f5ae51ae6071ed9711fa

            SHA1

            064821c0244832d1f4260b3c38a06c90901453a8

            SHA256

            75bfdb4b6c0ff55db21bc176148ed1b477148e794aed9043d95a30623e8f6afc

            SHA512

            9a2bf5375348df0395f9ab0a8f1b3320c32d25fd2768f9911622cff407c5644f2cf2c18b948f6d5cece629a8ffb583d284ac17f34fced12d4373c3dbad8b1c36

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            19KB

            MD5

            6043d92cd953e656ff78d88b791752e4

            SHA1

            dcdfef9d53a84d0f83dd6024230b0e06809814e2

            SHA256

            ef4cf265033b054941b7d48438824a2a732e83a21b630e603b5c0e55425f8d80

            SHA512

            fd44ed5e89a0635f5836a256d4b2b309fd4ffb1c9ae9c3f039bc9028c507a8bc35a4da8204ca004bb18b22f7263ead26d75db98c042c88f9712ff16227f88874

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            19KB

            MD5

            1ae1570501bb1d91e85f52d44db08034

            SHA1

            706a7106556021cc8085dcf570358e0feb34b6cb

            SHA256

            7c8e60160a1d7ecd0a84ed98656954f5fde0c9d6e02e071bc6d715e3f30c85ad

            SHA512

            a3942f9e4a2f1e802d65bda9c8be24ba27eae296eff73c97ad9178b6830e17e012b63d4c0b36fd26953485d1202090cb853b8f5c46e1c0b106763164b93f4dec

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            19KB

            MD5

            12dde0f44861b58d2f1c4ae2d380dcaf

            SHA1

            a8ae60fdeeadd301aaab00ab185a3dfca130cc93

            SHA256

            f811991ca01d0622c8280f6d6a8b58cea4f130508b0bf3017875907e57570eb5

            SHA512

            ae6edac3f4c9a6820d5c570e2a540c209255c71e0bd94d1e38f7e321c7cf981720eef44a8127e9d082a7e441e01364add00c688a39de0b57ec45fee98a3ac51f

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            19KB

            MD5

            3628ad50590cc764fd3a4e5864b8704f

            SHA1

            38479c6d052828f0d19d18d33300faa9705a44a7

            SHA256

            7e15ce00bb4aa96b8215c3801a328564d8a3d8d170d54d2dadd4e502420ec7ef

            SHA512

            56cd1340c5406e991434be8d1b570f7b422bee546c7f43c01275d3797cb19c51a79955a496913cebdbac31232f0af1cd210fafe7a7dc10c86f47eebe5754ec38

          • C:\Windows\rss\csrss.exe

            Filesize

            4.1MB

            MD5

            32d647017be06180fe09f5c213831028

            SHA1

            cd4283f5d15c74102ff1bf123f03a85030a27e66

            SHA256

            625d09aad19ac66f10e3b091366af269ac26a7ed939f99da56dc538f55e39cae

            SHA512

            0494d33b173ea2bbf8e17f01c0b3dc9715ff25fa7e9a730127e4ce956d517720ce2ee4875c89345914455d241d2906aff66e623368d2b4826951d23a82ec5e2a

          • C:\Windows\windefender.exe

            Filesize

            2.0MB

            MD5

            8e67f58837092385dcf01e8a2b4f5783

            SHA1

            012c49cfd8c5d06795a6f67ea2baf2a082cf8625

            SHA256

            166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

            SHA512

            40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

          • memory/856-34-0x0000000004EF0000-0x0000000004F00000-memory.dmp

            Filesize

            64KB

          • memory/856-39-0x0000000070D00000-0x0000000071054000-memory.dmp

            Filesize

            3.3MB

          • memory/856-21-0x0000000005D40000-0x0000000006094000-memory.dmp

            Filesize

            3.3MB

          • memory/856-5-0x0000000074CE0000-0x0000000075490000-memory.dmp

            Filesize

            7.7MB

          • memory/856-23-0x0000000004F50000-0x0000000004F6E000-memory.dmp

            Filesize

            120KB

          • memory/856-24-0x0000000006260000-0x00000000062AC000-memory.dmp

            Filesize

            304KB

          • memory/856-15-0x0000000005480000-0x00000000054E6000-memory.dmp

            Filesize

            408KB

          • memory/856-6-0x0000000004EF0000-0x0000000004F00000-memory.dmp

            Filesize

            64KB

          • memory/856-28-0x00000000066D0000-0x0000000006714000-memory.dmp

            Filesize

            272KB

          • memory/856-29-0x0000000074CE0000-0x0000000075490000-memory.dmp

            Filesize

            7.7MB

          • memory/856-30-0x0000000004EF0000-0x0000000004F00000-memory.dmp

            Filesize

            64KB

          • memory/856-31-0x00000000074E0000-0x0000000007556000-memory.dmp

            Filesize

            472KB

          • memory/856-32-0x0000000007BE0000-0x000000000825A000-memory.dmp

            Filesize

            6.5MB

          • memory/856-33-0x0000000007580000-0x000000000759A000-memory.dmp

            Filesize

            104KB

          • memory/856-9-0x00000000051E0000-0x0000000005202000-memory.dmp

            Filesize

            136KB

          • memory/856-35-0x000000007F8B0000-0x000000007F8C0000-memory.dmp

            Filesize

            64KB

          • memory/856-8-0x0000000005530000-0x0000000005B58000-memory.dmp

            Filesize

            6.2MB

          • memory/856-37-0x0000000007170000-0x00000000071A2000-memory.dmp

            Filesize

            200KB

          • memory/856-38-0x0000000070B80000-0x0000000070BCC000-memory.dmp

            Filesize

            304KB

          • memory/856-19-0x0000000005CD0000-0x0000000005D36000-memory.dmp

            Filesize

            408KB

          • memory/856-49-0x0000000007780000-0x000000000779E000-memory.dmp

            Filesize

            120KB

          • memory/856-50-0x00000000077A0000-0x0000000007843000-memory.dmp

            Filesize

            652KB

          • memory/856-51-0x0000000007890000-0x000000000789A000-memory.dmp

            Filesize

            40KB

          • memory/856-54-0x0000000007940000-0x00000000079D6000-memory.dmp

            Filesize

            600KB

          • memory/856-55-0x0000000004EF0000-0x0000000004F00000-memory.dmp

            Filesize

            64KB

          • memory/856-56-0x0000000007700000-0x0000000007711000-memory.dmp

            Filesize

            68KB

          • memory/856-58-0x000000007F8B0000-0x000000007F8C0000-memory.dmp

            Filesize

            64KB

          • memory/856-59-0x0000000007730000-0x000000000773E000-memory.dmp

            Filesize

            56KB

          • memory/856-60-0x0000000007920000-0x0000000007934000-memory.dmp

            Filesize

            80KB

          • memory/856-61-0x0000000007A00000-0x0000000007A1A000-memory.dmp

            Filesize

            104KB

          • memory/856-62-0x00000000079F0000-0x00000000079F8000-memory.dmp

            Filesize

            32KB

          • memory/856-65-0x0000000074CE0000-0x0000000075490000-memory.dmp

            Filesize

            7.7MB

          • memory/856-7-0x0000000002BC0000-0x0000000002BF6000-memory.dmp

            Filesize

            216KB

          • memory/996-281-0x0000000000400000-0x00000000008DF000-memory.dmp

            Filesize

            4.9MB

          • memory/1468-237-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/1468-274-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/1468-283-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/1468-286-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/1468-289-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/1476-69-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/1476-67-0x0000000002A70000-0x0000000002E77000-memory.dmp

            Filesize

            4.0MB

          • memory/1476-150-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/1476-169-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/1476-121-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/1476-68-0x0000000002E80000-0x000000000376B000-memory.dmp

            Filesize

            8.9MB

          • memory/1476-105-0x0000000002A70000-0x0000000002E77000-memory.dmp

            Filesize

            4.0MB

          • memory/1476-103-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/1516-22-0x0000000002BC0000-0x0000000002FBE000-memory.dmp

            Filesize

            4.0MB

          • memory/1516-4-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/1516-25-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/1516-26-0x0000000002FC0000-0x00000000038AB000-memory.dmp

            Filesize

            8.9MB

          • memory/1516-36-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/1516-1-0x0000000002BC0000-0x0000000002FBE000-memory.dmp

            Filesize

            4.0MB

          • memory/1516-70-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/1516-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/1516-2-0x0000000002FC0000-0x00000000038AB000-memory.dmp

            Filesize

            8.9MB

          • memory/1932-284-0x0000000000400000-0x00000000008DF000-memory.dmp

            Filesize

            4.9MB

          • memory/1932-290-0x0000000000400000-0x00000000008DF000-memory.dmp

            Filesize

            4.9MB

          • memory/2544-136-0x0000000074CE0000-0x0000000075490000-memory.dmp

            Filesize

            7.7MB

          • memory/4464-124-0x0000000071300000-0x0000000071654000-memory.dmp

            Filesize

            3.3MB

          • memory/4464-108-0x0000000003370000-0x0000000003380000-memory.dmp

            Filesize

            64KB

          • memory/4464-123-0x000000007FDC0000-0x000000007FDD0000-memory.dmp

            Filesize

            64KB

          • memory/4464-107-0x0000000074CE0000-0x0000000075490000-memory.dmp

            Filesize

            7.7MB

          • memory/4464-109-0x0000000003370000-0x0000000003380000-memory.dmp

            Filesize

            64KB

          • memory/4464-135-0x0000000074CE0000-0x0000000075490000-memory.dmp

            Filesize

            7.7MB

          • memory/4464-122-0x0000000070B80000-0x0000000070BCC000-memory.dmp

            Filesize

            304KB

          • memory/4464-120-0x0000000003370000-0x0000000003380000-memory.dmp

            Filesize

            64KB

          • memory/4524-71-0x0000000074CE0000-0x0000000075490000-memory.dmp

            Filesize

            7.7MB

          • memory/4524-73-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

            Filesize

            64KB

          • memory/4524-84-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

            Filesize

            64KB

          • memory/4524-72-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

            Filesize

            64KB

          • memory/4524-83-0x0000000005E60000-0x00000000061B4000-memory.dmp

            Filesize

            3.3MB

          • memory/4524-104-0x0000000074CE0000-0x0000000075490000-memory.dmp

            Filesize

            7.7MB

          • memory/4524-99-0x0000000007A20000-0x0000000007A34000-memory.dmp

            Filesize

            80KB

          • memory/4524-98-0x00000000079B0000-0x00000000079C1000-memory.dmp

            Filesize

            68KB

          • memory/4524-97-0x0000000007660000-0x0000000007703000-memory.dmp

            Filesize

            652KB

          • memory/4524-87-0x0000000071300000-0x0000000071654000-memory.dmp

            Filesize

            3.3MB

          • memory/4524-86-0x0000000070B80000-0x0000000070BCC000-memory.dmp

            Filesize

            304KB

          • memory/4524-85-0x000000007FAB0000-0x000000007FAC0000-memory.dmp

            Filesize

            64KB