Analysis

  • max time kernel
    149s
  • max time network
    131s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240412-en
  • resource tags

    arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    21-04-2024 16:24

General

  • Target

    255881d91feaa39f880abfa0eb21a4887114717ea8227e9936b4d6e0fdf44e5c.exe

  • Size

    4.1MB

  • MD5

    29b8d9b05d7d9c0128afc77efb7d7d64

  • SHA1

    85d59cb3c7af73f00ac427e964ae0c8ace60e58d

  • SHA256

    255881d91feaa39f880abfa0eb21a4887114717ea8227e9936b4d6e0fdf44e5c

  • SHA512

    4095ede2480565a61dfdae7481816c3bb8f5b3e966d132576156e31be2ef89451d4628c34ba36381225ec14fa233aa020a058fc37a27d220de68558e95e02bdf

  • SSDEEP

    98304:8wAze/FNZMWTI4IerOgms7GjcZA7/RTa+EmUQAtw:+S/DzMv1si4yTElQZ

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 17 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\255881d91feaa39f880abfa0eb21a4887114717ea8227e9936b4d6e0fdf44e5c.exe
    "C:\Users\Admin\AppData\Local\Temp\255881d91feaa39f880abfa0eb21a4887114717ea8227e9936b4d6e0fdf44e5c.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4796
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4056
    • C:\Users\Admin\AppData\Local\Temp\255881d91feaa39f880abfa0eb21a4887114717ea8227e9936b4d6e0fdf44e5c.exe
      "C:\Users\Admin\AppData\Local\Temp\255881d91feaa39f880abfa0eb21a4887114717ea8227e9936b4d6e0fdf44e5c.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1760
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2328
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1132
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:2932
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1460
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3612
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Manipulates WinMonFS driver.
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2284
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3848
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:248
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:252
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:436
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:484
          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:2848
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            4⤵
            • Creates scheduled task(s)
            PID:3948
          • C:\Windows\windefender.exe
            "C:\Windows\windefender.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:736
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1148
              • C:\Windows\SysWOW64\sc.exe
                sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                6⤵
                • Launches sc.exe
                • Suspicious use of AdjustPrivilegeToken
                PID:1668
    • C:\Windows\windefender.exe
      C:\Windows\windefender.exe
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:2144

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4xqzflx2.1qt.ps1
      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
      Filesize

      281KB

      MD5

      d98e33b66343e7c96158444127a117f6

      SHA1

      bb716c5509a2bf345c6c1152f6e3e1452d39d50d

      SHA256

      5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

      SHA512

      705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
      Filesize

      2KB

      MD5

      d0c46cad6c0778401e21910bd6b56b70

      SHA1

      7be418951ea96326aca445b8dfe449b2bfa0dca6

      SHA256

      9600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02

      SHA512

      057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
      Filesize

      19KB

      MD5

      2a65e6f098b09e96b8a10d09ab4c93c4

      SHA1

      ef0fb0fb18036e915adbc4772877d5906d90d6e1

      SHA256

      2ea2da23a5da08f5f16b9eec3fc2010567fa65cb7971d585681a0043a6e23f29

      SHA512

      13eae621c2142554f85f570f5be13c1dc5d4f696767d07b9d3ce5f2f74dbb7d6dabc65e9dc7cbd1ee96427d124abc4d54de323c90849be7ea6407c2dab63a43a

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
      Filesize

      19KB

      MD5

      10af409a9cc37160e79174253f0dcc60

      SHA1

      f7cc79fec4f098d09b37764bf69c571e83ef4f0d

      SHA256

      0d9e8c9816e3a04547832f248bf662aae842bc2936837c9582874f1475123fe2

      SHA512

      cc048bdf3da9b4750948277b28c4dae728281db4833475030400850cce946492ea2ece4075080b1380a49ca67b5ea870e0e5ba68bcc780578cc44344183235ca

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
      Filesize

      19KB

      MD5

      b813b352dec5cf3083c4dc9167791dfe

      SHA1

      f9bb228946cfe8dcafdeb39dfd79e8f31b6d9e55

      SHA256

      de55c73dd6c6d241b2eb53daaf807aea4395dcb3c26118468908e7abc75bd375

      SHA512

      a1526c6a921c402db04336e7a4b0adc3f69a30c00ab968f0418269f1dbffacfb6877fc19f47b059535033225d28d7c03b9e5650de2d32ebbc7fd6fe7e0141e0d

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
      Filesize

      19KB

      MD5

      d6f34f6e992db723cc36db9dc2ea144c

      SHA1

      c2ef328e82ccd42412b5ce501ba0f27d5b5298d5

      SHA256

      db720d41ee71af80b5278df0b73319d3c42a531abe273642ec660a1880f25621

      SHA512

      551f4e27fa580864c0201022e0793b072ec077c0048c46dead747131a4301a0a428c0494a9354afcd0ca7abb97e43660bd195181b25ed49d99a45de7828e56d8

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
      Filesize

      19KB

      MD5

      cfdfba6ffe0fe2ea5a3e2d49fdd31a93

      SHA1

      454d9fd5deb021b419e38c0b888d91181e95651f

      SHA256

      727b161c2e5785fee9125842fc3fe959bc02438136951f410fd1881162fb5407

      SHA512

      a1de97e321f76aa9d28213bcee19e97beaab3ffc5104e7e27c32d974e15a6291bafa1e9e56d21e7f805c8c419a76be5507037e88fe74499dd630e4d73fe8a01b

    • C:\Windows\rss\csrss.exe
      Filesize

      4.1MB

      MD5

      29b8d9b05d7d9c0128afc77efb7d7d64

      SHA1

      85d59cb3c7af73f00ac427e964ae0c8ace60e58d

      SHA256

      255881d91feaa39f880abfa0eb21a4887114717ea8227e9936b4d6e0fdf44e5c

      SHA512

      4095ede2480565a61dfdae7481816c3bb8f5b3e966d132576156e31be2ef89451d4628c34ba36381225ec14fa233aa020a058fc37a27d220de68558e95e02bdf

    • C:\Windows\windefender.exe
      Filesize

      2.0MB

      MD5

      8e67f58837092385dcf01e8a2b4f5783

      SHA1

      012c49cfd8c5d06795a6f67ea2baf2a082cf8625

      SHA256

      166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

      SHA512

      40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

    • memory/736-243-0x0000000000400000-0x00000000008DF000-memory.dmp
      Filesize

      4.9MB

    • memory/1460-110-0x00000000045F0000-0x0000000004600000-memory.dmp
      Filesize

      64KB

    • memory/1460-95-0x00000000045F0000-0x0000000004600000-memory.dmp
      Filesize

      64KB

    • memory/1460-112-0x0000000074670000-0x0000000074E21000-memory.dmp
      Filesize

      7.7MB

    • memory/1460-85-0x0000000074670000-0x0000000074E21000-memory.dmp
      Filesize

      7.7MB

    • memory/1460-86-0x00000000045F0000-0x0000000004600000-memory.dmp
      Filesize

      64KB

    • memory/1460-96-0x0000000005610000-0x0000000005967000-memory.dmp
      Filesize

      3.3MB

    • memory/1460-101-0x00000000045F0000-0x0000000004600000-memory.dmp
      Filesize

      64KB

    • memory/1460-100-0x0000000070A80000-0x0000000070DD7000-memory.dmp
      Filesize

      3.3MB

    • memory/1460-98-0x000000007EED0000-0x000000007EEE0000-memory.dmp
      Filesize

      64KB

    • memory/1460-99-0x00000000708E0000-0x000000007092C000-memory.dmp
      Filesize

      304KB

    • memory/1760-114-0x0000000006280000-0x0000000006682000-memory.dmp
      Filesize

      4.0MB

    • memory/1760-50-0x0000000006280000-0x0000000006682000-memory.dmp
      Filesize

      4.0MB

    • memory/1760-144-0x0000000000400000-0x0000000004417000-memory.dmp
      Filesize

      64.1MB

    • memory/2144-255-0x0000000000400000-0x00000000008DF000-memory.dmp
      Filesize

      4.9MB

    • memory/2144-247-0x0000000000400000-0x00000000008DF000-memory.dmp
      Filesize

      4.9MB

    • memory/2284-258-0x0000000000400000-0x0000000004417000-memory.dmp
      Filesize

      64.1MB

    • memory/2284-278-0x0000000000400000-0x0000000004417000-memory.dmp
      Filesize

      64.1MB

    • memory/2284-274-0x0000000000400000-0x0000000004417000-memory.dmp
      Filesize

      64.1MB

    • memory/2284-145-0x0000000006800000-0x0000000006C00000-memory.dmp
      Filesize

      4.0MB

    • memory/2284-282-0x0000000000400000-0x0000000004417000-memory.dmp
      Filesize

      64.1MB

    • memory/2284-270-0x0000000000400000-0x0000000004417000-memory.dmp
      Filesize

      64.1MB

    • memory/2284-266-0x0000000000400000-0x0000000004417000-memory.dmp
      Filesize

      64.1MB

    • memory/2284-262-0x0000000000400000-0x0000000004417000-memory.dmp
      Filesize

      64.1MB

    • memory/2284-250-0x0000000000400000-0x0000000004417000-memory.dmp
      Filesize

      64.1MB

    • memory/2284-286-0x0000000000400000-0x0000000004417000-memory.dmp
      Filesize

      64.1MB

    • memory/2284-232-0x0000000000400000-0x0000000004417000-memory.dmp
      Filesize

      64.1MB

    • memory/2284-239-0x0000000000400000-0x0000000004417000-memory.dmp
      Filesize

      64.1MB

    • memory/2284-254-0x0000000000400000-0x0000000004417000-memory.dmp
      Filesize

      64.1MB

    • memory/2284-246-0x0000000000400000-0x0000000004417000-memory.dmp
      Filesize

      64.1MB

    • memory/2328-82-0x0000000074670000-0x0000000074E21000-memory.dmp
      Filesize

      7.7MB

    • memory/2328-54-0x0000000005200000-0x0000000005210000-memory.dmp
      Filesize

      64KB

    • memory/2328-75-0x00000000076A0000-0x0000000007744000-memory.dmp
      Filesize

      656KB

    • memory/2328-78-0x00000000079F0000-0x0000000007A01000-memory.dmp
      Filesize

      68KB

    • memory/2328-79-0x0000000007A40000-0x0000000007A55000-memory.dmp
      Filesize

      84KB

    • memory/2328-77-0x0000000005200000-0x0000000005210000-memory.dmp
      Filesize

      64KB

    • memory/2328-51-0x0000000074670000-0x0000000074E21000-memory.dmp
      Filesize

      7.7MB

    • memory/2328-53-0x0000000005F70000-0x00000000062C7000-memory.dmp
      Filesize

      3.3MB

    • memory/2328-66-0x0000000070B30000-0x0000000070E87000-memory.dmp
      Filesize

      3.3MB

    • memory/2328-65-0x00000000708E0000-0x000000007092C000-memory.dmp
      Filesize

      304KB

    • memory/2328-64-0x000000007FC90000-0x000000007FCA0000-memory.dmp
      Filesize

      64KB

    • memory/2328-55-0x0000000005200000-0x0000000005210000-memory.dmp
      Filesize

      64KB

    • memory/3612-127-0x00000000708E0000-0x000000007092C000-memory.dmp
      Filesize

      304KB

    • memory/3612-113-0x0000000074670000-0x0000000074E21000-memory.dmp
      Filesize

      7.7MB

    • memory/3612-138-0x0000000074670000-0x0000000074E21000-memory.dmp
      Filesize

      7.7MB

    • memory/3612-126-0x000000007F770000-0x000000007F780000-memory.dmp
      Filesize

      64KB

    • memory/3612-128-0x0000000070B30000-0x0000000070E87000-memory.dmp
      Filesize

      3.3MB

    • memory/3612-124-0x0000000004F50000-0x0000000004F60000-memory.dmp
      Filesize

      64KB

    • memory/3612-115-0x0000000004F50000-0x0000000004F60000-memory.dmp
      Filesize

      64KB

    • memory/4056-38-0x0000000007D60000-0x0000000007D7A000-memory.dmp
      Filesize

      104KB

    • memory/4056-25-0x0000000070A60000-0x0000000070DB7000-memory.dmp
      Filesize

      3.3MB

    • memory/4056-44-0x0000000007F20000-0x0000000007F3A000-memory.dmp
      Filesize

      104KB

    • memory/4056-45-0x0000000007F00000-0x0000000007F08000-memory.dmp
      Filesize

      32KB

    • memory/4056-42-0x0000000007E10000-0x0000000007E1E000-memory.dmp
      Filesize

      56KB

    • memory/4056-48-0x0000000074670000-0x0000000074E21000-memory.dmp
      Filesize

      7.7MB

    • memory/4056-3-0x0000000003320000-0x0000000003356000-memory.dmp
      Filesize

      216KB

    • memory/4056-4-0x0000000074670000-0x0000000074E21000-memory.dmp
      Filesize

      7.7MB

    • memory/4056-5-0x0000000003310000-0x0000000003320000-memory.dmp
      Filesize

      64KB

    • memory/4056-41-0x0000000007DD0000-0x0000000007DE1000-memory.dmp
      Filesize

      68KB

    • memory/4056-40-0x0000000007E60000-0x0000000007EF6000-memory.dmp
      Filesize

      600KB

    • memory/4056-39-0x0000000007DA0000-0x0000000007DAA000-memory.dmp
      Filesize

      40KB

    • memory/4056-6-0x0000000005AB0000-0x00000000060DA000-memory.dmp
      Filesize

      6.2MB

    • memory/4056-37-0x00000000083A0000-0x0000000008A1A000-memory.dmp
      Filesize

      6.5MB

    • memory/4056-35-0x0000000003310000-0x0000000003320000-memory.dmp
      Filesize

      64KB

    • memory/4056-36-0x0000000007C40000-0x0000000007CE4000-memory.dmp
      Filesize

      656KB

    • memory/4056-34-0x0000000007C20000-0x0000000007C3E000-memory.dmp
      Filesize

      120KB

    • memory/4056-43-0x0000000007E20000-0x0000000007E35000-memory.dmp
      Filesize

      84KB

    • memory/4056-24-0x00000000708E0000-0x000000007092C000-memory.dmp
      Filesize

      304KB

    • memory/4056-23-0x0000000007BE0000-0x0000000007C14000-memory.dmp
      Filesize

      208KB

    • memory/4056-22-0x000000007F1B0000-0x000000007F1C0000-memory.dmp
      Filesize

      64KB

    • memory/4056-21-0x0000000006D20000-0x0000000006D66000-memory.dmp
      Filesize

      280KB

    • memory/4056-20-0x0000000006800000-0x000000000684C000-memory.dmp
      Filesize

      304KB

    • memory/4056-19-0x0000000006790000-0x00000000067AE000-memory.dmp
      Filesize

      120KB

    • memory/4056-18-0x0000000006360000-0x00000000066B7000-memory.dmp
      Filesize

      3.3MB

    • memory/4056-9-0x00000000060E0000-0x0000000006146000-memory.dmp
      Filesize

      408KB

    • memory/4056-8-0x0000000005990000-0x00000000059F6000-memory.dmp
      Filesize

      408KB

    • memory/4056-7-0x00000000058F0000-0x0000000005912000-memory.dmp
      Filesize

      136KB

    • memory/4796-52-0x00000000063C0000-0x00000000067C0000-memory.dmp
      Filesize

      4.0MB

    • memory/4796-84-0x0000000000400000-0x0000000004417000-memory.dmp
      Filesize

      64.1MB

    • memory/4796-76-0x00000000067C0000-0x00000000070AB000-memory.dmp
      Filesize

      8.9MB

    • memory/4796-1-0x00000000063C0000-0x00000000067C0000-memory.dmp
      Filesize

      4.0MB

    • memory/4796-2-0x00000000067C0000-0x00000000070AB000-memory.dmp
      Filesize

      8.9MB