Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    29/03/2024, 16:35

General

  • Target

    e296d656c7c95d81341cfb8c55171cd20347a6eac2811fc281bcaea1b8309dd5.exe

  • Size

    4.1MB

  • MD5

    4517cadc3f88aef607d3418b31932e2e

  • SHA1

    a4b8c3507eecea8b282d9f3d37c278c19d9b6e9e

  • SHA256

    e296d656c7c95d81341cfb8c55171cd20347a6eac2811fc281bcaea1b8309dd5

  • SHA512

    5c127c365812f9e9e0ad822dd4b36b82a5d33babdc7c63bf963130412de3a3623fda27e635620cb66eb826b2f71c99ca138b375ebb8510119446d9bbd3cf94b3

  • SSDEEP

    98304:xcVSpTFm+RXM0iH/U+zPR1spIvd9YBG0+h/JRTkf:mVSp5miMNMcPLsa9YBj+fRgf

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 20 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e296d656c7c95d81341cfb8c55171cd20347a6eac2811fc281bcaea1b8309dd5.exe
    "C:\Users\Admin\AppData\Local\Temp\e296d656c7c95d81341cfb8c55171cd20347a6eac2811fc281bcaea1b8309dd5.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4880
    • C:\Users\Admin\AppData\Local\Temp\e296d656c7c95d81341cfb8c55171cd20347a6eac2811fc281bcaea1b8309dd5.exe
      "C:\Users\Admin\AppData\Local\Temp\e296d656c7c95d81341cfb8c55171cd20347a6eac2811fc281bcaea1b8309dd5.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4732
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2264
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1888
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:1000
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2044
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4428
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Manipulates WinMonFS driver.
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2948
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2764
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:2852
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:1308
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4752
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2728
          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:3440
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            4⤵
            • Creates scheduled task(s)
            PID:2768
          • C:\Windows\windefender.exe
            "C:\Windows\windefender.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2280
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:4000
              • C:\Windows\SysWOW64\sc.exe
                sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                6⤵
                • Launches sc.exe
                • Suspicious use of AdjustPrivilegeToken
                PID:1440
    • C:\Windows\windefender.exe
      C:\Windows\windefender.exe
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:4540

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fkk55ddg.xnn.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

      Filesize

      281KB

      MD5

      d98e33b66343e7c96158444127a117f6

      SHA1

      bb716c5509a2bf345c6c1152f6e3e1452d39d50d

      SHA256

      5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

      SHA512

      705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      d0c46cad6c0778401e21910bd6b56b70

      SHA1

      7be418951ea96326aca445b8dfe449b2bfa0dca6

      SHA256

      9600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02

      SHA512

      057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      3cbef8bab0c615d37f31d97db7e45a26

      SHA1

      ca0fa2ae486a9a5c21b5f3977a112d570ea56d21

      SHA256

      54a338cd2e9bf6cecd086591e326668fa9c2543653f4142d0261cff13c1abe5d

      SHA512

      c4cb2e6f8b7bce1e6f43145cc1c523ff554274bdad6d3ba668d71c732a828cb2e6efaa21af6219a6787e234022f8f36f3fe126932dc1358c97a0ab353d2c5d83

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      5b87034dd32724136f4fced5070ecb3f

      SHA1

      9326baa612a029c48865f2567298185060c204af

      SHA256

      9e2756d703eb9576a28f579b8405a1e306167ad87f0532e4498f58d3e2f2abb6

      SHA512

      29881e172b91ba29638d6060c59513a5eef341e34775f664dcdc0883bae3f3d8830569953ec38c8b24049d1e6e14651a12efa850cdaede6d9e44a21aafa81f48

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      993170cccf94906a08fcd2a95f09f511

      SHA1

      939ae73966e4bc391858aa21a43fb0a1b24062cb

      SHA256

      2554c1010fdd742b92f26b76ef648d22f9b404c8bf9fc6daac08fc02cf583349

      SHA512

      0b231ffa464ecd906695e3c484412f830ce8384283160042b48818d93791a8cea22cdcfc988133256de070904780596e984f56d625dc74da03498ec5a0151a5c

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      3bf3c2ca84b93c1725cc5221694bde8c

      SHA1

      76eff617c343a541b3fab1cbdf160463ec084c78

      SHA256

      2dd6ed83896191b5db4f5f02bf9e27e0550f4262203600ce0875a15e95acc470

      SHA512

      0620d26a759bfd84102e0f5ca48a2a9ad24a85fba38e657bd607afc74e6a7de8ba0e560c98b920dd42da73efeeae1ea2be87c29d00030c27ea62e9d16c69bdcc

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      5a9e7b7a0df32ff839a622ade8b53725

      SHA1

      23bc91a0afb81969b7eabcf0697fcfc92b17d72f

      SHA256

      5ceea6be7a26ec85ee6920469947a724151b1a3f381ec8593acdad7e9e02fdbc

      SHA512

      b5da7b9f529708f700ee0713a836bf2aa51405daa976436e758aa86d973fb0178c93af919ddbce2af857e7238408a38b1ca64847f9a5893e9796ac98260f937f

    • C:\Windows\rss\csrss.exe

      Filesize

      4.1MB

      MD5

      4517cadc3f88aef607d3418b31932e2e

      SHA1

      a4b8c3507eecea8b282d9f3d37c278c19d9b6e9e

      SHA256

      e296d656c7c95d81341cfb8c55171cd20347a6eac2811fc281bcaea1b8309dd5

      SHA512

      5c127c365812f9e9e0ad822dd4b36b82a5d33babdc7c63bf963130412de3a3623fda27e635620cb66eb826b2f71c99ca138b375ebb8510119446d9bbd3cf94b3

    • C:\Windows\windefender.exe

      Filesize

      2.0MB

      MD5

      8e67f58837092385dcf01e8a2b4f5783

      SHA1

      012c49cfd8c5d06795a6f67ea2baf2a082cf8625

      SHA256

      166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

      SHA512

      40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

    • memory/1628-43-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/1628-44-0x0000000002D60000-0x0000000003167000-memory.dmp

      Filesize

      4.0MB

    • memory/1628-1-0x0000000002D60000-0x0000000003167000-memory.dmp

      Filesize

      4.0MB

    • memory/1628-46-0x0000000003170000-0x0000000003A5B000-memory.dmp

      Filesize

      8.9MB

    • memory/1628-55-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/1628-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/1628-2-0x0000000003170000-0x0000000003A5B000-memory.dmp

      Filesize

      8.9MB

    • memory/2044-90-0x0000000005420000-0x0000000005430000-memory.dmp

      Filesize

      64KB

    • memory/2044-89-0x0000000074830000-0x0000000074FE1000-memory.dmp

      Filesize

      7.7MB

    • memory/2044-99-0x0000000005420000-0x0000000005430000-memory.dmp

      Filesize

      64KB

    • memory/2044-102-0x000000007F470000-0x000000007F480000-memory.dmp

      Filesize

      64KB

    • memory/2044-103-0x0000000070AA0000-0x0000000070AEC000-memory.dmp

      Filesize

      304KB

    • memory/2044-104-0x0000000070C20000-0x0000000070F77000-memory.dmp

      Filesize

      3.3MB

    • memory/2044-114-0x0000000074830000-0x0000000074FE1000-memory.dmp

      Filesize

      7.7MB

    • memory/2264-83-0x00000000077D0000-0x00000000077E5000-memory.dmp

      Filesize

      84KB

    • memory/2264-81-0x0000000007450000-0x00000000074F4000-memory.dmp

      Filesize

      656KB

    • memory/2264-72-0x0000000070C20000-0x0000000070F77000-memory.dmp

      Filesize

      3.3MB

    • memory/2264-71-0x0000000070AA0000-0x0000000070AEC000-memory.dmp

      Filesize

      304KB

    • memory/2264-70-0x000000007F0B0000-0x000000007F0C0000-memory.dmp

      Filesize

      64KB

    • memory/2264-69-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

      Filesize

      64KB

    • memory/2264-59-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

      Filesize

      64KB

    • memory/2264-58-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

      Filesize

      64KB

    • memory/2264-82-0x0000000007780000-0x0000000007791000-memory.dmp

      Filesize

      68KB

    • memory/2264-57-0x0000000074830000-0x0000000074FE1000-memory.dmp

      Filesize

      7.7MB

    • memory/2264-86-0x0000000074830000-0x0000000074FE1000-memory.dmp

      Filesize

      7.7MB

    • memory/2280-253-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/2948-269-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/2948-283-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/2948-279-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/2948-211-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/2948-244-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/2948-273-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/2948-257-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/2948-265-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/2948-261-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/2948-254-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/4428-131-0x0000000070AA0000-0x0000000070AEC000-memory.dmp

      Filesize

      304KB

    • memory/4428-132-0x0000000070C20000-0x0000000070F77000-memory.dmp

      Filesize

      3.3MB

    • memory/4428-118-0x0000000004AF0000-0x0000000004B00000-memory.dmp

      Filesize

      64KB

    • memory/4428-117-0x0000000004AF0000-0x0000000004B00000-memory.dmp

      Filesize

      64KB

    • memory/4428-116-0x0000000074830000-0x0000000074FE1000-memory.dmp

      Filesize

      7.7MB

    • memory/4428-129-0x0000000004AF0000-0x0000000004B00000-memory.dmp

      Filesize

      64KB

    • memory/4428-130-0x000000007FCE0000-0x000000007FCF0000-memory.dmp

      Filesize

      64KB

    • memory/4428-143-0x0000000074830000-0x0000000074FE1000-memory.dmp

      Filesize

      7.7MB

    • memory/4540-258-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/4540-266-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/4732-101-0x0000000002AC0000-0x0000000002EBF000-memory.dmp

      Filesize

      4.0MB

    • memory/4732-141-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/4732-192-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/4732-56-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/4732-128-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/4732-88-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/4732-54-0x0000000002AC0000-0x0000000002EBF000-memory.dmp

      Filesize

      4.0MB

    • memory/4880-40-0x0000000007DF0000-0x0000000007DFA000-memory.dmp

      Filesize

      40KB

    • memory/4880-24-0x000000007F080000-0x000000007F090000-memory.dmp

      Filesize

      64KB

    • memory/4880-39-0x0000000007DB0000-0x0000000007DCA000-memory.dmp

      Filesize

      104KB

    • memory/4880-37-0x0000000007C80000-0x0000000007D24000-memory.dmp

      Filesize

      656KB

    • memory/4880-41-0x0000000007F00000-0x0000000007F96000-memory.dmp

      Filesize

      600KB

    • memory/4880-42-0x0000000007E10000-0x0000000007E21000-memory.dmp

      Filesize

      68KB

    • memory/4880-45-0x0000000007E60000-0x0000000007E6E000-memory.dmp

      Filesize

      56KB

    • memory/4880-47-0x0000000007E70000-0x0000000007E85000-memory.dmp

      Filesize

      84KB

    • memory/4880-36-0x0000000007C20000-0x0000000007C3E000-memory.dmp

      Filesize

      120KB

    • memory/4880-27-0x0000000070C20000-0x0000000070F77000-memory.dmp

      Filesize

      3.3MB

    • memory/4880-26-0x0000000070AA0000-0x0000000070AEC000-memory.dmp

      Filesize

      304KB

    • memory/4880-48-0x0000000007EC0000-0x0000000007EDA000-memory.dmp

      Filesize

      104KB

    • memory/4880-25-0x0000000007C40000-0x0000000007C74000-memory.dmp

      Filesize

      208KB

    • memory/4880-38-0x00000000083F0000-0x0000000008A6A000-memory.dmp

      Filesize

      6.5MB

    • memory/4880-23-0x0000000003320000-0x0000000003330000-memory.dmp

      Filesize

      64KB

    • memory/4880-22-0x0000000006CF0000-0x0000000006D36000-memory.dmp

      Filesize

      280KB

    • memory/4880-21-0x0000000006840000-0x000000000688C000-memory.dmp

      Filesize

      304KB

    • memory/4880-20-0x0000000006810000-0x000000000682E000-memory.dmp

      Filesize

      120KB

    • memory/4880-19-0x00000000062D0000-0x0000000006627000-memory.dmp

      Filesize

      3.3MB

    • memory/4880-10-0x0000000006160000-0x00000000061C6000-memory.dmp

      Filesize

      408KB

    • memory/4880-49-0x0000000007EB0000-0x0000000007EB8000-memory.dmp

      Filesize

      32KB

    • memory/4880-9-0x0000000006080000-0x00000000060E6000-memory.dmp

      Filesize

      408KB

    • memory/4880-8-0x0000000005990000-0x00000000059B2000-memory.dmp

      Filesize

      136KB

    • memory/4880-52-0x0000000074830000-0x0000000074FE1000-memory.dmp

      Filesize

      7.7MB

    • memory/4880-7-0x00000000059E0000-0x000000000600A000-memory.dmp

      Filesize

      6.2MB

    • memory/4880-6-0x0000000003320000-0x0000000003330000-memory.dmp

      Filesize

      64KB

    • memory/4880-5-0x0000000074830000-0x0000000074FE1000-memory.dmp

      Filesize

      7.7MB

    • memory/4880-4-0x0000000003280000-0x00000000032B6000-memory.dmp

      Filesize

      216KB