Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240412-en
  • resource tags

    arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19-04-2024 15:53

General

  • Target

    9fa45bbe1b4cd25678f3f1dbccc3d0d3136846db3c1c31f86edb08d53107733b.exe

  • Size

    4.2MB

  • MD5

    80dcd002613d02cf485e511aa3cff427

  • SHA1

    dc10c38af729c9b18b5840a149c28e65fe8f49bf

  • SHA256

    9fa45bbe1b4cd25678f3f1dbccc3d0d3136846db3c1c31f86edb08d53107733b

  • SHA512

    7fb5cd2886932cab4cf764bed7d3de6feabc434faf90a7d2e28dafb5e1034b546ddf7ba8a1998c7265eacb8b3d6d7ac02a4fe8ce038e3c1333d89337ae5388f1

  • SSDEEP

    98304:XoZCtMNcIJm/Wi5iI7vKblq/qDx6472PxO1xv/KiJe/:X3OuIEug7vwUGt7S+nKp

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 19 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9fa45bbe1b4cd25678f3f1dbccc3d0d3136846db3c1c31f86edb08d53107733b.exe
    "C:\Users\Admin\AppData\Local\Temp\9fa45bbe1b4cd25678f3f1dbccc3d0d3136846db3c1c31f86edb08d53107733b.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2548
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4792
    • C:\Users\Admin\AppData\Local\Temp\9fa45bbe1b4cd25678f3f1dbccc3d0d3136846db3c1c31f86edb08d53107733b.exe
      "C:\Users\Admin\AppData\Local\Temp\9fa45bbe1b4cd25678f3f1dbccc3d0d3136846db3c1c31f86edb08d53107733b.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2484
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1544
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2324
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:3168
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3480
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2904
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Manipulates WinMonFS driver.
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1000
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2560
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:3988
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:5088
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3932
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:416
          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:888
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            4⤵
            • Creates scheduled task(s)
            PID:3180
          • C:\Windows\windefender.exe
            "C:\Windows\windefender.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:396
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:3904
              • C:\Windows\SysWOW64\sc.exe
                sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                6⤵
                • Launches sc.exe
                • Suspicious use of AdjustPrivilegeToken
                PID:128
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 1012
        2⤵
        • Program crash
        PID:3828
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2548 -ip 2548
      1⤵
        PID:276
      • C:\Windows\windefender.exe
        C:\Windows\windefender.exe
        1⤵
        • Executes dropped EXE
        • Modifies data under HKEY_USERS
        PID:3528

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ixrlalys.wcm.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

        Filesize

        281KB

        MD5

        d98e33b66343e7c96158444127a117f6

        SHA1

        bb716c5509a2bf345c6c1152f6e3e1452d39d50d

        SHA256

        5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

        SHA512

        705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        ac4917a885cf6050b1a483e4bc4d2ea5

        SHA1

        b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f

        SHA256

        e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9

        SHA512

        092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        d175d886e0e98be2f99342392553543c

        SHA1

        281c8d0a295e530c089d7c4782a0828fe4bac7c7

        SHA256

        da18e55917f75b116e52fb5fbbdf36e14b6446d2ed8d2a774ddddc65cf2b1b92

        SHA512

        3f80844c1f863c19312136e12df3f39dcc2322b60137d431fd41bda447fba385d8db9713cd023d884d9254336901d875a0cb3ea7201cc6f16a450101281dd8f5

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        4d78b5199474149b97ac83b212e4c6f8

        SHA1

        103ae937602e973b545d1125b54e47f628de21aa

        SHA256

        f3d19e27d9ce15ab53ab4f624537220bb9c01673e820c5c2e6f606120b091a7b

        SHA512

        889f9ce3606578488c8fb1cf359cc1829a269fa67362a80b05794bc441b45fba8cfb3082b1b92a3166404e845fd25bbe9bff27d040bcb70c53f4f2795e797a71

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        a50971112df228510b2494f319ca1ef3

        SHA1

        ec2ea0059a2a9c3abdf4d110b77e43d4231d365a

        SHA256

        eccbdb9ef54fffbe5259e1ac858ffef3bc5ca420d7c7a1fe18290b79491d137c

        SHA512

        dfcaeb38e33c44b943e0dd61f6453a950ecc67e41eb420636c426152e3e87e7ffaff87a67b730563f7b4bb1ad4bc3d35e89960964cf93cf05df64e8beca82666

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        a15797de742c73d1fac432444931b7ad

        SHA1

        fd08be1b267a759971213cd27dce6e7dd2811259

        SHA256

        50810943378d2908f7e92829b015d7b908e134b9d530cf104e871cd604979f26

        SHA512

        48653f633bd52e12b83e224b0c82d4ce239d329a96929c3c277d3f0b1b2018b4ae86f5c789c44531f176cf15eeeeeddaddc1af4fc78060f96f9f848595629ed5

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        19KB

        MD5

        d9aa34fc3046d3677128483aab12d5c0

        SHA1

        3b8b4e24784b0b34dd40131ab46762a985813a97

        SHA256

        0acdd363e3a4fdfd753a7b33dbb7b0283a2425ff5eb0875594800b79b8934d10

        SHA512

        7247275e7fa5d3949f866e3e7079dd07ad6fc5e1c57250e7ceb137950f54c01d94a9bcf4eb73559f2663c2d664a6d460d4615972399a542377dd1b77a5ff5c8c

      • C:\Windows\rss\csrss.exe

        Filesize

        4.2MB

        MD5

        80dcd002613d02cf485e511aa3cff427

        SHA1

        dc10c38af729c9b18b5840a149c28e65fe8f49bf

        SHA256

        9fa45bbe1b4cd25678f3f1dbccc3d0d3136846db3c1c31f86edb08d53107733b

        SHA512

        7fb5cd2886932cab4cf764bed7d3de6feabc434faf90a7d2e28dafb5e1034b546ddf7ba8a1998c7265eacb8b3d6d7ac02a4fe8ce038e3c1333d89337ae5388f1

      • C:\Windows\windefender.exe

        Filesize

        2.0MB

        MD5

        8e67f58837092385dcf01e8a2b4f5783

        SHA1

        012c49cfd8c5d06795a6f67ea2baf2a082cf8625

        SHA256

        166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

        SHA512

        40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

      • memory/396-251-0x0000000000400000-0x00000000008DF000-memory.dmp

        Filesize

        4.9MB

      • memory/1000-258-0x0000000000400000-0x0000000001DFD000-memory.dmp

        Filesize

        26.0MB

      • memory/1000-274-0x0000000000400000-0x0000000001DFD000-memory.dmp

        Filesize

        26.0MB

      • memory/1000-252-0x0000000000400000-0x0000000001DFD000-memory.dmp

        Filesize

        26.0MB

      • memory/1000-256-0x0000000000400000-0x0000000001DFD000-memory.dmp

        Filesize

        26.0MB

      • memory/1000-254-0x0000000000400000-0x0000000001DFD000-memory.dmp

        Filesize

        26.0MB

      • memory/1000-243-0x0000000000400000-0x0000000001DFD000-memory.dmp

        Filesize

        26.0MB

      • memory/1000-260-0x0000000000400000-0x0000000001DFD000-memory.dmp

        Filesize

        26.0MB

      • memory/1000-262-0x0000000000400000-0x0000000001DFD000-memory.dmp

        Filesize

        26.0MB

      • memory/1000-264-0x0000000000400000-0x0000000001DFD000-memory.dmp

        Filesize

        26.0MB

      • memory/1000-266-0x0000000000400000-0x0000000001DFD000-memory.dmp

        Filesize

        26.0MB

      • memory/1000-268-0x0000000000400000-0x0000000001DFD000-memory.dmp

        Filesize

        26.0MB

      • memory/1000-270-0x0000000000400000-0x0000000001DFD000-memory.dmp

        Filesize

        26.0MB

      • memory/1000-272-0x0000000000400000-0x0000000001DFD000-memory.dmp

        Filesize

        26.0MB

      • memory/1544-71-0x0000000070CC0000-0x0000000070D0C000-memory.dmp

        Filesize

        304KB

      • memory/1544-87-0x00000000749E0000-0x0000000075191000-memory.dmp

        Filesize

        7.7MB

      • memory/1544-84-0x0000000007290000-0x00000000072A5000-memory.dmp

        Filesize

        84KB

      • memory/1544-83-0x0000000007240000-0x0000000007251000-memory.dmp

        Filesize

        68KB

      • memory/1544-82-0x0000000004800000-0x0000000004810000-memory.dmp

        Filesize

        64KB

      • memory/1544-81-0x0000000006F00000-0x0000000006FA4000-memory.dmp

        Filesize

        656KB

      • memory/1544-57-0x00000000749E0000-0x0000000075191000-memory.dmp

        Filesize

        7.7MB

      • memory/1544-72-0x0000000070E40000-0x0000000071197000-memory.dmp

        Filesize

        3.3MB

      • memory/1544-70-0x000000007F2C0000-0x000000007F2D0000-memory.dmp

        Filesize

        64KB

      • memory/1544-69-0x00000000061D0000-0x000000000621C000-memory.dmp

        Filesize

        304KB

      • memory/1544-68-0x0000000005850000-0x0000000005BA7000-memory.dmp

        Filesize

        3.3MB

      • memory/1544-59-0x0000000004800000-0x0000000004810000-memory.dmp

        Filesize

        64KB

      • memory/1544-58-0x0000000004800000-0x0000000004810000-memory.dmp

        Filesize

        64KB

      • memory/2484-147-0x0000000000400000-0x0000000001DFD000-memory.dmp

        Filesize

        26.0MB

      • memory/2484-53-0x0000000003BA0000-0x0000000003FA0000-memory.dmp

        Filesize

        4.0MB

      • memory/2484-116-0x0000000003BA0000-0x0000000003FA0000-memory.dmp

        Filesize

        4.0MB

      • memory/2484-56-0x0000000000400000-0x0000000001DFD000-memory.dmp

        Filesize

        26.0MB

      • memory/2548-3-0x0000000000400000-0x0000000001DFD000-memory.dmp

        Filesize

        26.0MB

      • memory/2548-52-0x0000000000400000-0x0000000001DFD000-memory.dmp

        Filesize

        26.0MB

      • memory/2548-2-0x0000000004050000-0x000000000493B000-memory.dmp

        Filesize

        8.9MB

      • memory/2548-55-0x0000000004050000-0x000000000493B000-memory.dmp

        Filesize

        8.9MB

      • memory/2548-1-0x0000000003C40000-0x0000000004047000-memory.dmp

        Filesize

        4.0MB

      • memory/2548-54-0x0000000003C40000-0x0000000004047000-memory.dmp

        Filesize

        4.0MB

      • memory/2904-118-0x0000000002D80000-0x0000000002D90000-memory.dmp

        Filesize

        64KB

      • memory/2904-117-0x00000000749E0000-0x0000000075191000-memory.dmp

        Filesize

        7.7MB

      • memory/2904-128-0x000000007FB10000-0x000000007FB20000-memory.dmp

        Filesize

        64KB

      • memory/2904-130-0x0000000070F10000-0x0000000071267000-memory.dmp

        Filesize

        3.3MB

      • memory/2904-129-0x0000000070CC0000-0x0000000070D0C000-memory.dmp

        Filesize

        304KB

      • memory/3480-89-0x00000000749E0000-0x0000000075191000-memory.dmp

        Filesize

        7.7MB

      • memory/3480-90-0x0000000002A60000-0x0000000002A70000-memory.dmp

        Filesize

        64KB

      • memory/3480-91-0x0000000002A60000-0x0000000002A70000-memory.dmp

        Filesize

        64KB

      • memory/3480-92-0x00000000058C0000-0x0000000005C17000-memory.dmp

        Filesize

        3.3MB

      • memory/3480-104-0x0000000070F10000-0x0000000071267000-memory.dmp

        Filesize

        3.3MB

      • memory/3480-103-0x0000000070CC0000-0x0000000070D0C000-memory.dmp

        Filesize

        304KB

      • memory/3480-102-0x000000007FD60000-0x000000007FD70000-memory.dmp

        Filesize

        64KB

      • memory/3480-113-0x0000000002A60000-0x0000000002A70000-memory.dmp

        Filesize

        64KB

      • memory/3480-115-0x00000000749E0000-0x0000000075191000-memory.dmp

        Filesize

        7.7MB

      • memory/3528-253-0x0000000000400000-0x00000000008DF000-memory.dmp

        Filesize

        4.9MB

      • memory/3528-257-0x0000000000400000-0x00000000008DF000-memory.dmp

        Filesize

        4.9MB

      • memory/4792-41-0x0000000007900000-0x000000000790A000-memory.dmp

        Filesize

        40KB

      • memory/4792-21-0x0000000006280000-0x000000000629E000-memory.dmp

        Filesize

        120KB

      • memory/4792-38-0x0000000007790000-0x0000000007834000-memory.dmp

        Filesize

        656KB

      • memory/4792-40-0x00000000078C0000-0x00000000078DA000-memory.dmp

        Filesize

        104KB

      • memory/4792-42-0x0000000007A10000-0x0000000007AA6000-memory.dmp

        Filesize

        600KB

      • memory/4792-43-0x0000000007920000-0x0000000007931000-memory.dmp

        Filesize

        68KB

      • memory/4792-37-0x0000000002B10000-0x0000000002B20000-memory.dmp

        Filesize

        64KB

      • memory/4792-44-0x0000000007970000-0x000000000797E000-memory.dmp

        Filesize

        56KB

      • memory/4792-36-0x0000000007770000-0x000000000778E000-memory.dmp

        Filesize

        120KB

      • memory/4792-27-0x0000000070D30000-0x0000000071087000-memory.dmp

        Filesize

        3.3MB

      • memory/4792-26-0x0000000070BB0000-0x0000000070BFC000-memory.dmp

        Filesize

        304KB

      • memory/4792-25-0x0000000007730000-0x0000000007764000-memory.dmp

        Filesize

        208KB

      • memory/4792-24-0x000000007F8A0000-0x000000007F8B0000-memory.dmp

        Filesize

        64KB

      • memory/4792-23-0x00000000066C0000-0x0000000006706000-memory.dmp

        Filesize

        280KB

      • memory/4792-22-0x0000000006430000-0x000000000647C000-memory.dmp

        Filesize

        304KB

      • memory/4792-39-0x0000000007F00000-0x000000000857A000-memory.dmp

        Filesize

        6.5MB

      • memory/4792-45-0x0000000007980000-0x0000000007995000-memory.dmp

        Filesize

        84KB

      • memory/4792-20-0x0000000005DE0000-0x0000000006137000-memory.dmp

        Filesize

        3.3MB

      • memory/4792-11-0x0000000005540000-0x00000000055A6000-memory.dmp

        Filesize

        408KB

      • memory/4792-46-0x00000000079D0000-0x00000000079EA000-memory.dmp

        Filesize

        104KB

      • memory/4792-10-0x0000000005460000-0x00000000054C6000-memory.dmp

        Filesize

        408KB

      • memory/4792-9-0x00000000053C0000-0x00000000053E2000-memory.dmp

        Filesize

        136KB

      • memory/4792-7-0x00000000056B0000-0x0000000005CDA000-memory.dmp

        Filesize

        6.2MB

      • memory/4792-8-0x0000000002B10000-0x0000000002B20000-memory.dmp

        Filesize

        64KB

      • memory/4792-6-0x0000000002B10000-0x0000000002B20000-memory.dmp

        Filesize

        64KB

      • memory/4792-5-0x0000000074940000-0x00000000750F1000-memory.dmp

        Filesize

        7.7MB

      • memory/4792-4-0x0000000002A90000-0x0000000002AC6000-memory.dmp

        Filesize

        216KB

      • memory/4792-47-0x00000000079F0000-0x00000000079F8000-memory.dmp

        Filesize

        32KB

      • memory/4792-50-0x0000000074940000-0x00000000750F1000-memory.dmp

        Filesize

        7.7MB