Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    10/05/2024, 12:49

General

  • Target

    ec4167777540b70413abb52b68f385f1566b72b4a4d8f9b67fe59fe339bf32ff.exe

  • Size

    4.1MB

  • MD5

    a3834f83074aca980bcc6a01a92e23d2

  • SHA1

    32ebd65ca8a92202c7e6ff84f219b37590f48ef7

  • SHA256

    ec4167777540b70413abb52b68f385f1566b72b4a4d8f9b67fe59fe339bf32ff

  • SHA512

    f1d9725d3522abeb498aa8caf1e868e0357c4c3535caf9346c3ee21f379a8a1f2e579360bda22926d3f584be4d446e2a1b774d428d3785d96bbacc2eb128b979

  • SSDEEP

    98304:M0nFxzGbvSbUZowRHyzjgsKaXndWLtFoCNOvzXZY6X40:NzzGbv97yvo5ObXM0

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 19 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Using powershell.exe command.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec4167777540b70413abb52b68f385f1566b72b4a4d8f9b67fe59fe339bf32ff.exe
    "C:\Users\Admin\AppData\Local\Temp\ec4167777540b70413abb52b68f385f1566b72b4a4d8f9b67fe59fe339bf32ff.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:72
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4268
    • C:\Users\Admin\AppData\Local\Temp\ec4167777540b70413abb52b68f385f1566b72b4a4d8f9b67fe59fe339bf32ff.exe
      "C:\Users\Admin\AppData\Local\Temp\ec4167777540b70413abb52b68f385f1566b72b4a4d8f9b67fe59fe339bf32ff.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2720
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1820
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2040
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:2484
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2364
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4816
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Manipulates WinMonFS driver.
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1872
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Command and Scripting Interpreter: PowerShell
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4476
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:3152
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:3160
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3616
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3016
          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:3456
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            4⤵
            • Creates scheduled task(s)
            PID:5068
          • C:\Windows\windefender.exe
            "C:\Windows\windefender.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2040
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:3384
              • C:\Windows\SysWOW64\sc.exe
                sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                6⤵
                • Launches sc.exe
                • Suspicious use of AdjustPrivilegeToken
                PID:4340
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 720
          3⤵
          • Program crash
          PID:3532
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 72 -s 844
        2⤵
        • Program crash
        PID:1332
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 72 -ip 72
      1⤵
        PID:660
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2720 -ip 2720
        1⤵
          PID:1128
        • C:\Windows\windefender.exe
          C:\Windows\windefender.exe
          1⤵
          • Executes dropped EXE
          • Modifies data under HKEY_USERS
          PID:3936

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_nxehvy5g.oha.ps1

                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                Filesize

                281KB

                MD5

                d98e33b66343e7c96158444127a117f6

                SHA1

                bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                SHA256

                5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                SHA512

                705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                Filesize

                2KB

                MD5

                ac4917a885cf6050b1a483e4bc4d2ea5

                SHA1

                b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f

                SHA256

                e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9

                SHA512

                092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d

              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                19KB

                MD5

                74014ef35a47109c86d39c451c2df94e

                SHA1

                ca7f66e2b92d0549784b4117c964406dcd70cca9

                SHA256

                3a368f62a9c3ccf0c8ca20745fb52ad04d59530da0a4d51aaae548d6d94ef1d9

                SHA512

                fc05de49c5cf630ae162fb259dddf8ef037d7bdc7e10f13ae16d80cc1f7e90260a87e0d10dc410f542fd68d6174a2aab91ab330b800813e47211d3793cdf1b08

              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                19KB

                MD5

                d2543addcc2347cd659d0df15e331950

                SHA1

                1b1919c8861668d7c40e790005a01ab178673650

                SHA256

                0730c8b008faccdbdf033759c36b289f415fca327bbb620311b3895c499b9d72

                SHA512

                05ed46c63910fe26ba5f1e6ca5bf25dc2a24d923d52c8b94deaa67b013e56f55339ee43306d074dfde54eca002d4fa83f6e2e02771d0684f73def0fd11012a31

              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                19KB

                MD5

                0b410b06e416f408e2e80cd2d313fc77

                SHA1

                168f988b5ab15c10b2c42bf0a354838059876830

                SHA256

                da53371d10b4cca44ad014b591dbc96c9c6d5d02261afd8d8c286a54ca211010

                SHA512

                ddb56c4de0affb3d9cdffd20299ad1c01d6ab50b94fbbd13d03c30e3c58cadc11e973b4f3a83db111807e3d7e3c1b9a6134b1e92702c5fa2380b244709fbe7d9

              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                19KB

                MD5

                6245d5d430f2d94c5f5e2e8d58511db0

                SHA1

                59615771866cbd8857c68750217a71ab4257cb83

                SHA256

                014c516df93769bd4c83ada49a2bf62ff754c857705237308707ef8feb986bfc

                SHA512

                b37f56af4c2ff5eff59f29aee82538c3a6286a237e1d6d57817d571179da0113af2b492eb1f0a1a5b7d5e6a0b7f5bd55a914aed5e5e98f921e47d57dbe31186f

              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                19KB

                MD5

                cba3d2a527669deda1fb6ea3594ef034

                SHA1

                c90e709bae4d5e582104bd3d531c56f3b5c681f7

                SHA256

                ede6b778d2a7df0aa4683d598e2502d667b6c2d77795bf5374abc79513572d26

                SHA512

                48be4c4f8d8f3423e1eaeeec5451af16b21a9ebc9d07fccc8e5802f9be402b910108e88ee69a378db14462f2dc66a3eef3b906a94d509ae88996a4f82a0f4d12

              • C:\Windows\rss\csrss.exe

                Filesize

                4.1MB

                MD5

                a3834f83074aca980bcc6a01a92e23d2

                SHA1

                32ebd65ca8a92202c7e6ff84f219b37590f48ef7

                SHA256

                ec4167777540b70413abb52b68f385f1566b72b4a4d8f9b67fe59fe339bf32ff

                SHA512

                f1d9725d3522abeb498aa8caf1e868e0357c4c3535caf9346c3ee21f379a8a1f2e579360bda22926d3f584be4d446e2a1b774d428d3785d96bbacc2eb128b979

              • C:\Windows\windefender.exe

                Filesize

                2.0MB

                MD5

                8e67f58837092385dcf01e8a2b4f5783

                SHA1

                012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                SHA256

                166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                SHA512

                40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

              • memory/72-51-0x0000000000400000-0x0000000002959000-memory.dmp

                Filesize

                37.3MB

              • memory/72-1-0x0000000004660000-0x0000000004A5B000-memory.dmp

                Filesize

                4.0MB

              • memory/72-2-0x0000000004A60000-0x000000000534B000-memory.dmp

                Filesize

                8.9MB

              • memory/72-54-0x0000000004A60000-0x000000000534B000-memory.dmp

                Filesize

                8.9MB

              • memory/72-53-0x0000000000400000-0x0000000000D1C000-memory.dmp

                Filesize

                9.1MB

              • memory/72-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

                Filesize

                9.1MB

              • memory/1820-78-0x0000000007D00000-0x0000000007D15000-memory.dmp

                Filesize

                84KB

              • memory/1820-77-0x0000000007CB0000-0x0000000007CC1000-memory.dmp

                Filesize

                68KB

              • memory/1820-76-0x0000000007970000-0x0000000007A14000-memory.dmp

                Filesize

                656KB

              • memory/1820-67-0x0000000070720000-0x0000000070A77000-memory.dmp

                Filesize

                3.3MB

              • memory/1820-66-0x00000000705A0000-0x00000000705EC000-memory.dmp

                Filesize

                304KB

              • memory/1820-65-0x00000000067B0000-0x00000000067FC000-memory.dmp

                Filesize

                304KB

              • memory/1820-64-0x0000000006400000-0x0000000006757000-memory.dmp

                Filesize

                3.3MB

              • memory/1872-200-0x0000000000400000-0x0000000002959000-memory.dmp

                Filesize

                37.3MB

              • memory/1872-223-0x0000000000400000-0x0000000002959000-memory.dmp

                Filesize

                37.3MB

              • memory/1872-229-0x0000000000400000-0x0000000002959000-memory.dmp

                Filesize

                37.3MB

              • memory/1872-231-0x0000000000400000-0x0000000002959000-memory.dmp

                Filesize

                37.3MB

              • memory/1872-219-0x0000000000400000-0x0000000002959000-memory.dmp

                Filesize

                37.3MB

              • memory/1872-233-0x0000000000400000-0x0000000002959000-memory.dmp

                Filesize

                37.3MB

              • memory/1872-235-0x0000000000400000-0x0000000002959000-memory.dmp

                Filesize

                37.3MB

              • memory/1872-217-0x0000000000400000-0x0000000002959000-memory.dmp

                Filesize

                37.3MB

              • memory/1872-207-0x0000000000400000-0x0000000002959000-memory.dmp

                Filesize

                37.3MB

              • memory/1872-225-0x0000000000400000-0x0000000002959000-memory.dmp

                Filesize

                37.3MB

              • memory/1872-227-0x0000000000400000-0x0000000002959000-memory.dmp

                Filesize

                37.3MB

              • memory/1872-221-0x0000000000400000-0x0000000002959000-memory.dmp

                Filesize

                37.3MB

              • memory/2040-211-0x0000000000400000-0x00000000008DF000-memory.dmp

                Filesize

                4.9MB

              • memory/2040-216-0x0000000000400000-0x00000000008DF000-memory.dmp

                Filesize

                4.9MB

              • memory/2364-92-0x0000000070720000-0x0000000070A77000-memory.dmp

                Filesize

                3.3MB

              • memory/2364-91-0x00000000705A0000-0x00000000705EC000-memory.dmp

                Filesize

                304KB

              • memory/2720-101-0x0000000000400000-0x0000000002959000-memory.dmp

                Filesize

                37.3MB

              • memory/2720-128-0x0000000000400000-0x0000000002959000-memory.dmp

                Filesize

                37.3MB

              • memory/3016-191-0x0000000070670000-0x00000000709C7000-memory.dmp

                Filesize

                3.3MB

              • memory/3016-190-0x0000000070420000-0x000000007046C000-memory.dmp

                Filesize

                304KB

              • memory/3016-188-0x0000000005650000-0x00000000059A7000-memory.dmp

                Filesize

                3.3MB

              • memory/3616-177-0x0000000007920000-0x0000000007931000-memory.dmp

                Filesize

                68KB

              • memory/3616-163-0x0000000005E80000-0x00000000061D7000-memory.dmp

                Filesize

                3.3MB

              • memory/3616-178-0x0000000005CD0000-0x0000000005CE5000-memory.dmp

                Filesize

                84KB

              • memory/3616-176-0x00000000075B0000-0x0000000007654000-memory.dmp

                Filesize

                656KB

              • memory/3616-167-0x00000000705A0000-0x00000000708F7000-memory.dmp

                Filesize

                3.3MB

              • memory/3616-166-0x0000000070420000-0x000000007046C000-memory.dmp

                Filesize

                304KB

              • memory/3616-165-0x0000000006350000-0x000000000639C000-memory.dmp

                Filesize

                304KB

              • memory/3936-222-0x0000000000400000-0x00000000008DF000-memory.dmp

                Filesize

                4.9MB

              • memory/3936-218-0x0000000000400000-0x00000000008DF000-memory.dmp

                Filesize

                4.9MB

              • memory/3936-214-0x0000000000400000-0x00000000008DF000-memory.dmp

                Filesize

                4.9MB

              • memory/4268-21-0x0000000005CE0000-0x0000000005CFE000-memory.dmp

                Filesize

                120KB

              • memory/4268-37-0x0000000007180000-0x0000000007224000-memory.dmp

                Filesize

                656KB

              • memory/4268-4-0x000000007422E000-0x000000007422F000-memory.dmp

                Filesize

                4KB

              • memory/4268-5-0x00000000024C0000-0x00000000024F6000-memory.dmp

                Filesize

                216KB

              • memory/4268-7-0x00000000050A0000-0x00000000056CA000-memory.dmp

                Filesize

                6.2MB

              • memory/4268-6-0x0000000074220000-0x00000000749D1000-memory.dmp

                Filesize

                7.7MB

              • memory/4268-8-0x0000000004D30000-0x0000000004D52000-memory.dmp

                Filesize

                136KB

              • memory/4268-9-0x0000000005740000-0x00000000057A6000-memory.dmp

                Filesize

                408KB

              • memory/4268-10-0x00000000057B0000-0x0000000005816000-memory.dmp

                Filesize

                408KB

              • memory/4268-41-0x00000000072F0000-0x00000000072FA000-memory.dmp

                Filesize

                40KB

              • memory/4268-43-0x0000000007310000-0x0000000007321000-memory.dmp

                Filesize

                68KB

              • memory/4268-44-0x0000000007360000-0x000000000736E000-memory.dmp

                Filesize

                56KB

              • memory/4268-47-0x00000000073E0000-0x00000000073E8000-memory.dmp

                Filesize

                32KB

              • memory/4268-16-0x0000000074220000-0x00000000749D1000-memory.dmp

                Filesize

                7.7MB

              • memory/4268-39-0x00000000078F0000-0x0000000007F6A000-memory.dmp

                Filesize

                6.5MB

              • memory/4268-45-0x0000000007370000-0x0000000007385000-memory.dmp

                Filesize

                84KB

              • memory/4268-40-0x00000000072B0000-0x00000000072CA000-memory.dmp

                Filesize

                104KB

              • memory/4268-38-0x0000000074220000-0x00000000749D1000-memory.dmp

                Filesize

                7.7MB

              • memory/4268-26-0x0000000074220000-0x00000000749D1000-memory.dmp

                Filesize

                7.7MB

              • memory/4268-42-0x0000000007400000-0x0000000007496000-memory.dmp

                Filesize

                600KB

              • memory/4268-36-0x0000000007160000-0x000000000717E000-memory.dmp

                Filesize

                120KB

              • memory/4268-27-0x00000000706A0000-0x00000000709F7000-memory.dmp

                Filesize

                3.3MB

              • memory/4268-25-0x0000000070490000-0x00000000704DC000-memory.dmp

                Filesize

                304KB

              • memory/4268-24-0x0000000007100000-0x0000000007134000-memory.dmp

                Filesize

                208KB

              • memory/4268-23-0x00000000062B0000-0x00000000062F6000-memory.dmp

                Filesize

                280KB

              • memory/4268-20-0x0000000005820000-0x0000000005B77000-memory.dmp

                Filesize

                3.3MB

              • memory/4268-22-0x0000000005D40000-0x0000000005D8C000-memory.dmp

                Filesize

                304KB

              • memory/4268-50-0x0000000074220000-0x00000000749D1000-memory.dmp

                Filesize

                7.7MB

              • memory/4268-46-0x00000000073C0000-0x00000000073DA000-memory.dmp

                Filesize

                104KB

              • memory/4476-130-0x00000000061E0000-0x0000000006537000-memory.dmp

                Filesize

                3.3MB

              • memory/4476-153-0x0000000006560000-0x0000000006575000-memory.dmp

                Filesize

                84KB

              • memory/4476-152-0x0000000007D20000-0x0000000007D31000-memory.dmp

                Filesize

                68KB

              • memory/4476-151-0x00000000079A0000-0x0000000007A44000-memory.dmp

                Filesize

                656KB

              • memory/4476-142-0x0000000070750000-0x0000000070AA7000-memory.dmp

                Filesize

                3.3MB

              • memory/4476-141-0x0000000070500000-0x000000007054C000-memory.dmp

                Filesize

                304KB

              • memory/4476-140-0x0000000006CC0000-0x0000000006D0C000-memory.dmp

                Filesize

                304KB

              • memory/4816-111-0x0000000005520000-0x0000000005877000-memory.dmp

                Filesize

                3.3MB

              • memory/4816-113-0x00000000705A0000-0x00000000705EC000-memory.dmp

                Filesize

                304KB

              • memory/4816-114-0x0000000070740000-0x0000000070A97000-memory.dmp

                Filesize

                3.3MB