Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/04/2024, 04:23

General

  • Target

    10808cd4ce3e4858a04f6202b3914645f9ff948937f1af771f3925dfe51a8bc0.exe

  • Size

    4.2MB

  • MD5

    5f31ce6c161b46cf02e6c7e2764959a5

  • SHA1

    24ade1ee0ea8dfc8fc1ebcfb96f052a9ac7ffeb1

  • SHA256

    10808cd4ce3e4858a04f6202b3914645f9ff948937f1af771f3925dfe51a8bc0

  • SHA512

    8c73617fa0de647ccfde351f8396be1f620b0002684a6223b0f107be052f421ceac8d99392242528fe3f10b28332005931c8383b22a01c4a70a6c18bbd88e9e0

  • SSDEEP

    98304:MRUBmLZ3rmtSop/fcfKtwQG3TQtt4oKMJO6VS6U7CKzh7w:UxKEC/fcfKt9ykOWRUGoh7w

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 21 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\10808cd4ce3e4858a04f6202b3914645f9ff948937f1af771f3925dfe51a8bc0.exe
    "C:\Users\Admin\AppData\Local\Temp\10808cd4ce3e4858a04f6202b3914645f9ff948937f1af771f3925dfe51a8bc0.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4272
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3168
    • C:\Users\Admin\AppData\Local\Temp\10808cd4ce3e4858a04f6202b3914645f9ff948937f1af771f3925dfe51a8bc0.exe
      "C:\Users\Admin\AppData\Local\Temp\10808cd4ce3e4858a04f6202b3914645f9ff948937f1af771f3925dfe51a8bc0.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4464
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2608
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1716
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:1912
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4656
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4188
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Manipulates WinMonFS driver.
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3220
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2360
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:4468
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:1948
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1148
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4776
          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:4508
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            4⤵
            • Creates scheduled task(s)
            PID:960
          • C:\Windows\windefender.exe
            "C:\Windows\windefender.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4780
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2892
              • C:\Windows\SysWOW64\sc.exe
                sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                6⤵
                • Launches sc.exe
                • Suspicious use of AdjustPrivilegeToken
                PID:2148
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 884
          3⤵
          • Program crash
          PID:2932
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 940
        2⤵
        • Program crash
        PID:4040
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4272 -ip 4272
      1⤵
        PID:1316
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4464 -ip 4464
        1⤵
          PID:1540
        • C:\Windows\windefender.exe
          C:\Windows\windefender.exe
          1⤵
          • Executes dropped EXE
          • Modifies data under HKEY_USERS
          PID:2560

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_f4nupxbm.5bf.ps1

                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                Filesize

                281KB

                MD5

                d98e33b66343e7c96158444127a117f6

                SHA1

                bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                SHA256

                5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                SHA512

                705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                Filesize

                2KB

                MD5

                968cb9309758126772781b83adb8a28f

                SHA1

                8da30e71accf186b2ba11da1797cf67f8f78b47c

                SHA256

                92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                SHA512

                4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                19KB

                MD5

                285aebc31089a83dd709af2580da558f

                SHA1

                faa8b2c5b43ebe047305d6365ca59bc96aa27a4c

                SHA256

                e747cd580f374895e9c41bb5065a6514beac34f409bfd313fc1c7c877fc170e9

                SHA512

                99d86f1dbd72ca997663612fcbedb75157b006e9d9da55ec96159c52a336a6397d87de2ee271d8348ac40ff91f164b9b7678d99350ab9670260bceb8cb68f2ba

              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                19KB

                MD5

                92f623213f77aacd83b0473a3c14d265

                SHA1

                600bcface89a1eb450c4ec79bdbe034963301968

                SHA256

                713220f908bada782597c19b3c2a6b27794e3ea12c87893f6e0bf33581f8c85b

                SHA512

                6dc7e1e5b69e6f4d3d8e3399093c14c2ef40730ee344c2e8e4c4839a71d4bd61ef2d21bcb28cf312f60d9d811368163b49b9036ee0a061a9a12e6b2eec1181c2

              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                19KB

                MD5

                b2363b95868ca6b5ebb3bc7ea9139bb0

                SHA1

                344f5a3e35e7fe241a9e95868040ca47eb30c0c8

                SHA256

                f874660ddd3946f44a1bc815094f88073d5a2c8ca01c58e946f86c572a623c86

                SHA512

                bf2a8a8c9e83a9d9bcfb96a80aa26f113cf6b1a96d3e6f333708f85ab7d630f7a5a5c2400cf5a0a109de550802a7eccee996c50126edc617ae04993fdd854402

              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                19KB

                MD5

                a52e180cdf0fba809dca1819e6c78364

                SHA1

                f2fd6d1eed7d185d77abef16ad27401f416b328c

                SHA256

                3fd5095d53b1758b36d423cf081fb4a210110585b6f22a9add297de4d3a990e5

                SHA512

                ba9d095057a4a3e52ddbb30fc6dc2ab1ec92f77edf6ffd2bf8673bb6a54b9b75718e1161205199c577f5675d0441ca74b892d1a9581e3d34b1a3cad05b48bd20

              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                19KB

                MD5

                2e759e18b50174da2f3ecb8af59ddd19

                SHA1

                5bf0fb03b7727d128195f3264d6978a8e560e62c

                SHA256

                e895e83f18b125547d0a0aa8e0de655554c85952de6b2263075479b75dadd334

                SHA512

                c2c630de96568ecb5a157c7bf77f69095f3a0285b6bf027ab521f6f519ad90f1f930ac5b00631f3b7f0b41f3e0df5d00519fa4f219e33c8355ddba3332706767

              • C:\Windows\rss\csrss.exe

                Filesize

                4.2MB

                MD5

                5f31ce6c161b46cf02e6c7e2764959a5

                SHA1

                24ade1ee0ea8dfc8fc1ebcfb96f052a9ac7ffeb1

                SHA256

                10808cd4ce3e4858a04f6202b3914645f9ff948937f1af771f3925dfe51a8bc0

                SHA512

                8c73617fa0de647ccfde351f8396be1f620b0002684a6223b0f107be052f421ceac8d99392242528fe3f10b28332005931c8383b22a01c4a70a6c18bbd88e9e0

              • C:\Windows\windefender.exe

                Filesize

                2.0MB

                MD5

                8e67f58837092385dcf01e8a2b4f5783

                SHA1

                012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                SHA256

                166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                SHA512

                40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

              • memory/2560-277-0x0000000000400000-0x00000000008DF000-memory.dmp

                Filesize

                4.9MB

              • memory/2560-273-0x0000000000400000-0x00000000008DF000-memory.dmp

                Filesize

                4.9MB

              • memory/2608-87-0x0000000007AD0000-0x0000000007AE1000-memory.dmp

                Filesize

                68KB

              • memory/2608-91-0x0000000074550000-0x0000000074D00000-memory.dmp

                Filesize

                7.7MB

              • memory/2608-88-0x0000000007B20000-0x0000000007B34000-memory.dmp

                Filesize

                80KB

              • memory/2608-60-0x0000000074550000-0x0000000074D00000-memory.dmp

                Filesize

                7.7MB

              • memory/2608-86-0x00000000077B0000-0x0000000007853000-memory.dmp

                Filesize

                652KB

              • memory/2608-76-0x0000000070C10000-0x0000000070F64000-memory.dmp

                Filesize

                3.3MB

              • memory/2608-75-0x0000000070450000-0x000000007049C000-memory.dmp

                Filesize

                304KB

              • memory/2608-74-0x000000007F4D0000-0x000000007F4E0000-memory.dmp

                Filesize

                64KB

              • memory/2608-73-0x0000000006820000-0x000000000686C000-memory.dmp

                Filesize

                304KB

              • memory/2608-63-0x0000000005F40000-0x0000000006294000-memory.dmp

                Filesize

                3.3MB

              • memory/2608-62-0x0000000002F30000-0x0000000002F40000-memory.dmp

                Filesize

                64KB

              • memory/2608-61-0x0000000002F30000-0x0000000002F40000-memory.dmp

                Filesize

                64KB

              • memory/3168-41-0x00000000070E0000-0x00000000070FE000-memory.dmp

                Filesize

                120KB

              • memory/3168-4-0x0000000002530000-0x0000000002566000-memory.dmp

                Filesize

                216KB

              • memory/3168-44-0x0000000004670000-0x0000000004680000-memory.dmp

                Filesize

                64KB

              • memory/3168-45-0x0000000007300000-0x0000000007396000-memory.dmp

                Filesize

                600KB

              • memory/3168-46-0x0000000007200000-0x0000000007211000-memory.dmp

                Filesize

                68KB

              • memory/3168-47-0x0000000007240000-0x000000000724E000-memory.dmp

                Filesize

                56KB

              • memory/3168-48-0x0000000007260000-0x0000000007274000-memory.dmp

                Filesize

                80KB

              • memory/3168-49-0x00000000072B0000-0x00000000072CA000-memory.dmp

                Filesize

                104KB

              • memory/3168-50-0x00000000072A0000-0x00000000072A8000-memory.dmp

                Filesize

                32KB

              • memory/3168-53-0x00000000744B0000-0x0000000074C60000-memory.dmp

                Filesize

                7.7MB

              • memory/3168-43-0x00000000071F0000-0x00000000071FA000-memory.dmp

                Filesize

                40KB

              • memory/3168-5-0x00000000744B0000-0x0000000074C60000-memory.dmp

                Filesize

                7.7MB

              • memory/3168-6-0x0000000004670000-0x0000000004680000-memory.dmp

                Filesize

                64KB

              • memory/3168-8-0x0000000004670000-0x0000000004680000-memory.dmp

                Filesize

                64KB

              • memory/3168-7-0x0000000004CB0000-0x00000000052D8000-memory.dmp

                Filesize

                6.2MB

              • memory/3168-42-0x0000000007100000-0x00000000071A3000-memory.dmp

                Filesize

                652KB

              • memory/3168-9-0x0000000004B30000-0x0000000004B52000-memory.dmp

                Filesize

                136KB

              • memory/3168-31-0x00000000704D0000-0x0000000070824000-memory.dmp

                Filesize

                3.3MB

              • memory/3168-30-0x0000000070350000-0x000000007039C000-memory.dmp

                Filesize

                304KB

              • memory/3168-28-0x00000000070A0000-0x00000000070D2000-memory.dmp

                Filesize

                200KB

              • memory/3168-29-0x000000007FB80000-0x000000007FB90000-memory.dmp

                Filesize

                64KB

              • memory/3168-27-0x0000000006EF0000-0x0000000006F0A000-memory.dmp

                Filesize

                104KB

              • memory/3168-26-0x0000000007550000-0x0000000007BCA000-memory.dmp

                Filesize

                6.5MB

              • memory/3168-25-0x0000000006E50000-0x0000000006EC6000-memory.dmp

                Filesize

                472KB

              • memory/3168-24-0x0000000006080000-0x00000000060C4000-memory.dmp

                Filesize

                272KB

              • memory/3168-23-0x0000000005B70000-0x0000000005BBC000-memory.dmp

                Filesize

                304KB

              • memory/3168-22-0x0000000005B20000-0x0000000005B3E000-memory.dmp

                Filesize

                120KB

              • memory/3168-21-0x0000000005620000-0x0000000005974000-memory.dmp

                Filesize

                3.3MB

              • memory/3168-10-0x0000000005350000-0x00000000053B6000-memory.dmp

                Filesize

                408KB

              • memory/3168-11-0x00000000054B0000-0x0000000005516000-memory.dmp

                Filesize

                408KB

              • memory/3220-263-0x0000000000400000-0x000000000310F000-memory.dmp

                Filesize

                45.1MB

              • memory/3220-294-0x0000000000400000-0x000000000310F000-memory.dmp

                Filesize

                45.1MB

              • memory/3220-292-0x0000000000400000-0x000000000310F000-memory.dmp

                Filesize

                45.1MB

              • memory/3220-290-0x0000000000400000-0x000000000310F000-memory.dmp

                Filesize

                45.1MB

              • memory/3220-288-0x0000000000400000-0x000000000310F000-memory.dmp

                Filesize

                45.1MB

              • memory/3220-286-0x0000000000400000-0x000000000310F000-memory.dmp

                Filesize

                45.1MB

              • memory/3220-284-0x0000000000400000-0x000000000310F000-memory.dmp

                Filesize

                45.1MB

              • memory/3220-282-0x0000000000400000-0x000000000310F000-memory.dmp

                Filesize

                45.1MB

              • memory/3220-280-0x0000000000400000-0x000000000310F000-memory.dmp

                Filesize

                45.1MB

              • memory/3220-278-0x0000000000400000-0x000000000310F000-memory.dmp

                Filesize

                45.1MB

              • memory/3220-276-0x0000000000400000-0x000000000310F000-memory.dmp

                Filesize

                45.1MB

              • memory/3220-274-0x0000000000400000-0x000000000310F000-memory.dmp

                Filesize

                45.1MB

              • memory/3220-272-0x0000000000400000-0x000000000310F000-memory.dmp

                Filesize

                45.1MB

              • memory/4188-123-0x00000000028F0000-0x0000000002900000-memory.dmp

                Filesize

                64KB

              • memory/4188-122-0x0000000074550000-0x0000000074D00000-memory.dmp

                Filesize

                7.7MB

              • memory/4188-125-0x00000000028F0000-0x0000000002900000-memory.dmp

                Filesize

                64KB

              • memory/4188-138-0x0000000070450000-0x000000007049C000-memory.dmp

                Filesize

                304KB

              • memory/4188-135-0x0000000005A50000-0x0000000005DA4000-memory.dmp

                Filesize

                3.3MB

              • memory/4272-55-0x0000000000400000-0x000000000310F000-memory.dmp

                Filesize

                45.1MB

              • memory/4272-1-0x0000000004E50000-0x0000000005257000-memory.dmp

                Filesize

                4.0MB

              • memory/4272-2-0x0000000005260000-0x0000000005B4B000-memory.dmp

                Filesize

                8.9MB

              • memory/4272-57-0x0000000005260000-0x0000000005B4B000-memory.dmp

                Filesize

                8.9MB

              • memory/4272-3-0x0000000000400000-0x000000000310F000-memory.dmp

                Filesize

                45.1MB

              • memory/4464-58-0x00000000051D0000-0x0000000005ABB000-memory.dmp

                Filesize

                8.9MB

              • memory/4464-159-0x0000000000400000-0x000000000310F000-memory.dmp

                Filesize

                45.1MB

              • memory/4464-137-0x0000000000400000-0x000000000310F000-memory.dmp

                Filesize

                45.1MB

              • memory/4464-56-0x0000000004DD0000-0x00000000051CD000-memory.dmp

                Filesize

                4.0MB

              • memory/4464-59-0x0000000000400000-0x000000000310F000-memory.dmp

                Filesize

                45.1MB

              • memory/4464-124-0x0000000004DD0000-0x00000000051CD000-memory.dmp

                Filesize

                4.0MB

              • memory/4656-95-0x00000000050A0000-0x00000000050B0000-memory.dmp

                Filesize

                64KB

              • memory/4656-93-0x0000000074550000-0x0000000074D00000-memory.dmp

                Filesize

                7.7MB

              • memory/4656-121-0x0000000074550000-0x0000000074D00000-memory.dmp

                Filesize

                7.7MB

              • memory/4656-119-0x00000000050A0000-0x00000000050B0000-memory.dmp

                Filesize

                64KB

              • memory/4656-107-0x000000007F2F0000-0x000000007F300000-memory.dmp

                Filesize

                64KB

              • memory/4656-109-0x0000000070BF0000-0x0000000070F44000-memory.dmp

                Filesize

                3.3MB

              • memory/4656-108-0x0000000070450000-0x000000007049C000-memory.dmp

                Filesize

                304KB

              • memory/4656-94-0x00000000050A0000-0x00000000050B0000-memory.dmp

                Filesize

                64KB

              • memory/4656-96-0x0000000005EA0000-0x00000000061F4000-memory.dmp

                Filesize

                3.3MB

              • memory/4780-270-0x0000000000400000-0x00000000008DF000-memory.dmp

                Filesize

                4.9MB