Analysis

  • max time kernel
    11s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-04-2024 15:29

General

  • Target

    25ec11763bf3bd4a9fbee829a5b5d961a5c317c073e783137a4aad3506705be2.exe

  • Size

    4.1MB

  • MD5

    087659c4a8c681cd17fc11fcbac963e7

  • SHA1

    bba551bfd38929b7b03a6eff67381ea95b05da56

  • SHA256

    25ec11763bf3bd4a9fbee829a5b5d961a5c317c073e783137a4aad3506705be2

  • SHA512

    fa11a3f952ec53b3f55d743480bf80f0d9c4aa0529e67427d80ff3218a505a55727ba01031314fa1446bf8d1cd40c10d3e2212b54e791a2b7ea63a1053cfb471

  • SSDEEP

    98304:b9WmwW6FveY75UnUAoojDc0M6OZ1deiQjLSx7bj:BJwW0vb75UnUAx3YJ1rQix/

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 18 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25ec11763bf3bd4a9fbee829a5b5d961a5c317c073e783137a4aad3506705be2.exe
    "C:\Users\Admin\AppData\Local\Temp\25ec11763bf3bd4a9fbee829a5b5d961a5c317c073e783137a4aad3506705be2.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3124
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2360
    • C:\Users\Admin\AppData\Local\Temp\25ec11763bf3bd4a9fbee829a5b5d961a5c317c073e783137a4aad3506705be2.exe
      "C:\Users\Admin\AppData\Local\Temp\25ec11763bf3bd4a9fbee829a5b5d961a5c317c073e783137a4aad3506705be2.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4164
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1208
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2032
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:732
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1368
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2796
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1936
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4340
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:960
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:2620
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
              PID:2248
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              4⤵
                PID:4324
              • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                4⤵
                  PID:3260
                • C:\Windows\SYSTEM32\schtasks.exe
                  schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                  4⤵
                  • Creates scheduled task(s)
                  PID:5092
                • C:\Windows\windefender.exe
                  "C:\Windows\windefender.exe"
                  4⤵
                    PID:2196
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                      5⤵
                        PID:4396
                        • C:\Windows\SysWOW64\sc.exe
                          sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                          6⤵
                          • Launches sc.exe
                          PID:4060
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 1008
                  2⤵
                  • Program crash
                  PID:2328
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3124 -ip 3124
                1⤵
                  PID:2796
                • C:\Windows\windefender.exe
                  C:\Windows\windefender.exe
                  1⤵
                    PID:932

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2o4kk440.qdu.ps1

                    Filesize

                    60B

                    MD5

                    d17fe0a3f47be24a6453e9ef58c94641

                    SHA1

                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                    SHA256

                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                    SHA512

                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                  • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                    Filesize

                    281KB

                    MD5

                    d98e33b66343e7c96158444127a117f6

                    SHA1

                    bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                    SHA256

                    5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                    SHA512

                    705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                    Filesize

                    2KB

                    MD5

                    968cb9309758126772781b83adb8a28f

                    SHA1

                    8da30e71accf186b2ba11da1797cf67f8f78b47c

                    SHA256

                    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                    SHA512

                    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                    Filesize

                    19KB

                    MD5

                    483800d1563b703ff29b9df1635d1a32

                    SHA1

                    dced169d8112fefc42c22b048da557a97ed8fda3

                    SHA256

                    5367c441d8e01cc8d864e65d00b8090485866b07d3e51c56461593ead4f9635a

                    SHA512

                    e4d4157d397776ac2e53d9f467119ce0194626f46cd39760e5cfa6cd73481cd9a54c888815dec35344b5ebede34158d17797f60d4b7be513bea7383d3a87f2a3

                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                    Filesize

                    19KB

                    MD5

                    253eec1c0fbfb704b0de7f6f3d9c094a

                    SHA1

                    165b20b6806978451105eeed90185dd6375d2773

                    SHA256

                    d866f77c00ac089a23cd8cd50e40db0823259e49504551a426f5479f0f3b2a81

                    SHA512

                    3fc934ed3cf2c4f890a3a0dc500700102a0b6351cf8115bc6a566d31c7a3fb2fc4d995af47d1d30a9951edfc8b6536babfa68cdfde84fd773777e78e809bbcfa

                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                    Filesize

                    19KB

                    MD5

                    900cabd1ec5112582b7251410ed0eea4

                    SHA1

                    8828e5d1a0f9d440d7753fd2bfc0073f35d9b872

                    SHA256

                    4c5549383d1ec933c9b77b706908612cfe60e63a551ef9db21398755339f346f

                    SHA512

                    e26cb70b541d4af9e72a1418ac5a21589a49aaee63af58c2cfb0cc7c34b1f7d69df57c6ebcc9e80711186d29678376d40f3c17e2f1e3aa080ddd000a253d2423

                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                    Filesize

                    19KB

                    MD5

                    3afd79cab9b4ade9e45698333c31b143

                    SHA1

                    d68dcdadf317362f982312c1df6fca66d056c168

                    SHA256

                    d7aaf016187e8d8bbf233eb31966140dadc0c140aa60d9951591f415de8c719e

                    SHA512

                    76245df402429cc74ab193bb6b9a59544bf787e227068a9591ff95163b5bd3f5c08784306b22d05fa4b58959f02f4b17d48ef43a1e5e0b1f47fd19e16db38449

                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                    Filesize

                    19KB

                    MD5

                    0f17616bcc0e3e3f888ccfb269de0829

                    SHA1

                    80ce2a84856c2c5e4b129c87a74d657d419a4793

                    SHA256

                    6df155beebc58d9a2b4cec93626602c030eba391a1b63f7b4377402bc1dd850c

                    SHA512

                    bd58eeefb6740e4bf3870d0bdd49c8f357c2f1f79df512fa6e53512c21e11ea9cc36ff399c40184db683b0175500ea820a5481a2aac3920c686a6382fe963d12

                  • C:\Windows\rss\csrss.exe

                    Filesize

                    4.1MB

                    MD5

                    087659c4a8c681cd17fc11fcbac963e7

                    SHA1

                    bba551bfd38929b7b03a6eff67381ea95b05da56

                    SHA256

                    25ec11763bf3bd4a9fbee829a5b5d961a5c317c073e783137a4aad3506705be2

                    SHA512

                    fa11a3f952ec53b3f55d743480bf80f0d9c4aa0529e67427d80ff3218a505a55727ba01031314fa1446bf8d1cd40c10d3e2212b54e791a2b7ea63a1053cfb471

                  • C:\Windows\windefender.exe

                    Filesize

                    2.0MB

                    MD5

                    8e67f58837092385dcf01e8a2b4f5783

                    SHA1

                    012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                    SHA256

                    166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                    SHA512

                    40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                  • memory/932-262-0x0000000000400000-0x00000000008DF000-memory.dmp

                    Filesize

                    4.9MB

                  • memory/932-258-0x0000000000400000-0x00000000008DF000-memory.dmp

                    Filesize

                    4.9MB

                  • memory/1208-73-0x0000000070970000-0x0000000070CC4000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/1208-71-0x000000007EE70000-0x000000007EE80000-memory.dmp

                    Filesize

                    64KB

                  • memory/1208-85-0x0000000007CE0000-0x0000000007CF1000-memory.dmp

                    Filesize

                    68KB

                  • memory/1208-83-0x00000000079C0000-0x0000000007A63000-memory.dmp

                    Filesize

                    652KB

                  • memory/1208-84-0x00000000052C0000-0x00000000052D0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1208-86-0x0000000007D30000-0x0000000007D44000-memory.dmp

                    Filesize

                    80KB

                  • memory/1208-72-0x00000000701D0000-0x000000007021C000-memory.dmp

                    Filesize

                    304KB

                  • memory/1208-70-0x0000000006820000-0x000000000686C000-memory.dmp

                    Filesize

                    304KB

                  • memory/1208-60-0x00000000061C0000-0x0000000006514000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/1208-58-0x00000000052C0000-0x00000000052D0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1208-59-0x00000000052C0000-0x00000000052D0000-memory.dmp

                    Filesize

                    64KB

                  • memory/1208-57-0x0000000074230000-0x00000000749E0000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/1208-89-0x0000000074230000-0x00000000749E0000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/1368-104-0x00000000701D0000-0x000000007021C000-memory.dmp

                    Filesize

                    304KB

                  • memory/1368-101-0x0000000005FA0000-0x00000000062F4000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/1368-116-0x0000000074230000-0x00000000749E0000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/1368-103-0x000000007F360000-0x000000007F370000-memory.dmp

                    Filesize

                    64KB

                  • memory/1368-91-0x0000000074230000-0x00000000749E0000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/1368-105-0x0000000070350000-0x00000000706A4000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/1936-150-0x00000000069A0000-0x000000000728B000-memory.dmp

                    Filesize

                    8.9MB

                  • memory/1936-269-0x0000000000400000-0x0000000004416000-memory.dmp

                    Filesize

                    64.1MB

                  • memory/1936-273-0x0000000000400000-0x0000000004416000-memory.dmp

                    Filesize

                    64.1MB

                  • memory/1936-279-0x0000000000400000-0x0000000004416000-memory.dmp

                    Filesize

                    64.1MB

                  • memory/1936-149-0x0000000004E00000-0x0000000005200000-memory.dmp

                    Filesize

                    4.0MB

                  • memory/1936-275-0x0000000000400000-0x0000000004416000-memory.dmp

                    Filesize

                    64.1MB

                  • memory/1936-271-0x0000000000400000-0x0000000004416000-memory.dmp

                    Filesize

                    64.1MB

                  • memory/1936-277-0x0000000000400000-0x0000000004416000-memory.dmp

                    Filesize

                    64.1MB

                  • memory/1936-267-0x0000000000400000-0x0000000004416000-memory.dmp

                    Filesize

                    64.1MB

                  • memory/1936-265-0x0000000000400000-0x0000000004416000-memory.dmp

                    Filesize

                    64.1MB

                  • memory/1936-248-0x0000000000400000-0x0000000004416000-memory.dmp

                    Filesize

                    64.1MB

                  • memory/1936-263-0x0000000000400000-0x0000000004416000-memory.dmp

                    Filesize

                    64.1MB

                  • memory/1936-261-0x0000000000400000-0x0000000004416000-memory.dmp

                    Filesize

                    64.1MB

                  • memory/1936-257-0x0000000000400000-0x0000000004416000-memory.dmp

                    Filesize

                    64.1MB

                  • memory/1936-259-0x0000000000400000-0x0000000004416000-memory.dmp

                    Filesize

                    64.1MB

                  • memory/2196-255-0x0000000000400000-0x00000000008DF000-memory.dmp

                    Filesize

                    4.9MB

                  • memory/2360-43-0x0000000008030000-0x000000000803A000-memory.dmp

                    Filesize

                    40KB

                  • memory/2360-9-0x0000000005B30000-0x0000000005B96000-memory.dmp

                    Filesize

                    408KB

                  • memory/2360-3-0x0000000003040000-0x0000000003076000-memory.dmp

                    Filesize

                    216KB

                  • memory/2360-5-0x00000000057B0000-0x00000000057C0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2360-52-0x0000000074230000-0x00000000749E0000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/2360-48-0x00000000080F0000-0x000000000810A000-memory.dmp

                    Filesize

                    104KB

                  • memory/2360-49-0x00000000080E0000-0x00000000080E8000-memory.dmp

                    Filesize

                    32KB

                  • memory/2360-46-0x0000000008080000-0x000000000808E000-memory.dmp

                    Filesize

                    56KB

                  • memory/2360-47-0x00000000080A0000-0x00000000080B4000-memory.dmp

                    Filesize

                    80KB

                  • memory/2360-45-0x0000000008040000-0x0000000008051000-memory.dmp

                    Filesize

                    68KB

                  • memory/2360-6-0x00000000057B0000-0x00000000057C0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2360-44-0x0000000008140000-0x00000000081D6000-memory.dmp

                    Filesize

                    600KB

                  • memory/2360-4-0x0000000074230000-0x00000000749E0000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/2360-7-0x0000000005DF0000-0x0000000006418000-memory.dmp

                    Filesize

                    6.2MB

                  • memory/2360-8-0x0000000005A80000-0x0000000005AA2000-memory.dmp

                    Filesize

                    136KB

                  • memory/2360-26-0x0000000007D20000-0x0000000007D3A000-memory.dmp

                    Filesize

                    104KB

                  • memory/2360-15-0x0000000005C10000-0x0000000005C76000-memory.dmp

                    Filesize

                    408KB

                  • memory/2360-27-0x000000007FAD0000-0x000000007FAE0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2360-30-0x0000000070250000-0x00000000705A4000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/2360-20-0x0000000006520000-0x0000000006874000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/2360-21-0x0000000006950000-0x000000000696E000-memory.dmp

                    Filesize

                    120KB

                  • memory/2360-22-0x00000000069A0000-0x00000000069EC000-memory.dmp

                    Filesize

                    304KB

                  • memory/2360-23-0x0000000006EA0000-0x0000000006EE4000-memory.dmp

                    Filesize

                    272KB

                  • memory/2360-24-0x0000000007C80000-0x0000000007CF6000-memory.dmp

                    Filesize

                    472KB

                  • memory/2360-42-0x0000000007F40000-0x0000000007FE3000-memory.dmp

                    Filesize

                    652KB

                  • memory/2360-41-0x0000000007F20000-0x0000000007F3E000-memory.dmp

                    Filesize

                    120KB

                  • memory/2360-40-0x00000000057B0000-0x00000000057C0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2360-28-0x0000000007EE0000-0x0000000007F12000-memory.dmp

                    Filesize

                    200KB

                  • memory/2360-29-0x00000000700D0000-0x000000007011C000-memory.dmp

                    Filesize

                    304KB

                  • memory/2360-25-0x0000000008380000-0x00000000089FA000-memory.dmp

                    Filesize

                    6.5MB

                  • memory/2796-130-0x00000000701D0000-0x000000007021C000-memory.dmp

                    Filesize

                    304KB

                  • memory/2796-142-0x0000000074230000-0x00000000749E0000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/2796-117-0x0000000074230000-0x00000000749E0000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/2796-129-0x000000007EEE0000-0x000000007EEF0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2796-131-0x0000000070970000-0x0000000070CC4000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/3124-55-0x0000000000400000-0x0000000004416000-memory.dmp

                    Filesize

                    64.1MB

                  • memory/3124-1-0x0000000004BB0000-0x0000000004FB1000-memory.dmp

                    Filesize

                    4.0MB

                  • memory/3124-2-0x00000000065D0000-0x0000000006EBB000-memory.dmp

                    Filesize

                    8.9MB

                  • memory/4164-146-0x0000000000400000-0x0000000004416000-memory.dmp

                    Filesize

                    64.1MB

                  • memory/4164-128-0x00000000049B0000-0x0000000004DB3000-memory.dmp

                    Filesize

                    4.0MB

                  • memory/4164-54-0x00000000049B0000-0x0000000004DB3000-memory.dmp

                    Filesize

                    4.0MB

                  • memory/4164-56-0x0000000006560000-0x0000000006E4B000-memory.dmp

                    Filesize

                    8.9MB

                  • memory/4340-152-0x0000000004820000-0x0000000004830000-memory.dmp

                    Filesize

                    64KB

                  • memory/4340-151-0x0000000074230000-0x00000000749E0000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/4340-153-0x0000000004820000-0x0000000004830000-memory.dmp

                    Filesize

                    64KB