Analysis

  • max time kernel
    13s
  • max time network
    148s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    17-05-2024 21:44

General

  • Target

    0270710d1bc2ed8036351f8fd17b953c20d470e93206590b1664ad799d1e21bd.exe

  • Size

    4.1MB

  • MD5

    832d41d0d9ea4f0d9e6b4c2d4475bd5b

  • SHA1

    e74805a2b55e51ac185358861cf18be2e9f55f93

  • SHA256

    0270710d1bc2ed8036351f8fd17b953c20d470e93206590b1664ad799d1e21bd

  • SHA512

    e904bb83d9770c38db8496b4c25c275e429397e6af361476802cbb1221c3ecbb2d306f57429cc8cd6332d69aa1be1034762af9aca58260c6a4a2982a56a8a5f3

  • SSDEEP

    98304:t/1aS45wg9wCj95WS7Tld+z+RCAmv1nHALSIp:t/oSJg9H959pd0eCv1HALS6

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 14 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 6 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Using powershell.exe command.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0270710d1bc2ed8036351f8fd17b953c20d470e93206590b1664ad799d1e21bd.exe
    "C:\Users\Admin\AppData\Local\Temp\0270710d1bc2ed8036351f8fd17b953c20d470e93206590b1664ad799d1e21bd.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2620
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2588
    • C:\Users\Admin\AppData\Local\Temp\0270710d1bc2ed8036351f8fd17b953c20d470e93206590b1664ad799d1e21bd.exe
      "C:\Users\Admin\AppData\Local\Temp\0270710d1bc2ed8036351f8fd17b953c20d470e93206590b1664ad799d1e21bd.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2448
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3752
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1932
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:5028
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3032
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3144
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1668
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Command and Scripting Interpreter: PowerShell
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:692
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:1828
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:2080
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1784
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4672
          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
            4⤵
              PID:720
            • C:\Windows\SYSTEM32\schtasks.exe
              schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
              4⤵
              • Creates scheduled task(s)
              PID:3860
            • C:\Windows\windefender.exe
              "C:\Windows\windefender.exe"
              4⤵
                PID:2104
                • C:\Windows\SysWOW64\cmd.exe
                  cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                  5⤵
                    PID:2664
                    • C:\Windows\SysWOW64\sc.exe
                      sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                      6⤵
                      • Launches sc.exe
                      PID:232
          • C:\Windows\windefender.exe
            C:\Windows\windefender.exe
            1⤵
              PID:2356

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xhhgsj35.rvt.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

              Filesize

              281KB

              MD5

              d98e33b66343e7c96158444127a117f6

              SHA1

              bb716c5509a2bf345c6c1152f6e3e1452d39d50d

              SHA256

              5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

              SHA512

              705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

              Filesize

              2KB

              MD5

              d0c46cad6c0778401e21910bd6b56b70

              SHA1

              7be418951ea96326aca445b8dfe449b2bfa0dca6

              SHA256

              9600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02

              SHA512

              057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949

            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

              Filesize

              19KB

              MD5

              5a967c94b5dc9cd5234ff6994383ad7e

              SHA1

              bd41c1fcef1aab3a591534896e4efa97edd7c48b

              SHA256

              0b52f413876cff2070eaad5af0e458e5ba79b8e4ed6da6e216b966ffdc10672c

              SHA512

              8b421bba3961ad1261e6b91d58239e3ff0b568591b974069de3ee5fb5aaef6dc6b832b9535cd6ad7d3cdc6601b0db4dc829dc9b11747903e171296e2aba02cf0

            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

              Filesize

              19KB

              MD5

              3faa1beffa7d466f8658b56113b41da4

              SHA1

              33f5989ef9f34e9918b97dc13d79cbd7c3607e9e

              SHA256

              83ddfa5017357e21d424e520180c99362a45f7433450a8b44420d573b193ef14

              SHA512

              8ae6658f26ba1a064a72e5805ce972623db76cccb511cbdfe83bddbdbc2b42779602ce9bd8e1dd99ad58c5edc413bcd647e2c830d3e4ffcc8c60197827571d10

            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

              Filesize

              19KB

              MD5

              961bdd3b2a93e3a72a2df16fb23e4380

              SHA1

              a7738d1005e8463f05efec092746858ca9d88b43

              SHA256

              6e8cc5e8805f8a8e89731ab64cc091efc898a430290b56c896cf66ed6a9dfb8d

              SHA512

              877c76627d39115dfd169f7db838ba091e8b6e35f81b9ca6cc18676799fb1c06b881d1d87752fbc262d9de5fa43d0429c8d246e6d7be4e1ec42178a9b1ecac9e

            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

              Filesize

              19KB

              MD5

              00631341e6cde08264496ec996d1c618

              SHA1

              b33c8ef3b760e84718ee96b67727840f9726a37a

              SHA256

              c08d140a0bbbe420666bc94782c2059679fd66399afa66829de1a97945976e12

              SHA512

              d8bacb575965db22da549aedebee43108a969a1f56387b45d6ef709766f352d301afa4e1399cbc912b33e7e22fa44103abf8797185827ccc8549e95dc8062965

            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

              Filesize

              19KB

              MD5

              495a758882e391fa832cf5648c3fd09f

              SHA1

              b08382c32b620da1cf8214c928d0338f276b3c89

              SHA256

              d8601ac9d674e356d6c0922e1b94da20224217bd64049bd8bc3147c393af77cc

              SHA512

              4d23ed65ec228e4f4d8fc139871aee50c015cd682ad32a70e69a8396fe6504d198c8d4f4ad6feb1eb70959f979edf6898176f6a3b940596c88ecd0e5b45ecb6c

            • C:\Windows\rss\csrss.exe

              Filesize

              4.1MB

              MD5

              832d41d0d9ea4f0d9e6b4c2d4475bd5b

              SHA1

              e74805a2b55e51ac185358861cf18be2e9f55f93

              SHA256

              0270710d1bc2ed8036351f8fd17b953c20d470e93206590b1664ad799d1e21bd

              SHA512

              e904bb83d9770c38db8496b4c25c275e429397e6af361476802cbb1221c3ecbb2d306f57429cc8cd6332d69aa1be1034762af9aca58260c6a4a2982a56a8a5f3

            • C:\Windows\windefender.exe

              Filesize

              2.0MB

              MD5

              8e67f58837092385dcf01e8a2b4f5783

              SHA1

              012c49cfd8c5d06795a6f67ea2baf2a082cf8625

              SHA256

              166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

              SHA512

              40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

            • memory/692-136-0x0000000070950000-0x0000000070CA7000-memory.dmp

              Filesize

              3.3MB

            • memory/692-135-0x0000000070700000-0x000000007074C000-memory.dmp

              Filesize

              304KB

            • memory/1668-199-0x0000000000400000-0x0000000002B08000-memory.dmp

              Filesize

              39.0MB

            • memory/1668-229-0x0000000000400000-0x0000000002B08000-memory.dmp

              Filesize

              39.0MB

            • memory/1668-226-0x0000000000400000-0x0000000002B08000-memory.dmp

              Filesize

              39.0MB

            • memory/1668-222-0x0000000000400000-0x0000000002B08000-memory.dmp

              Filesize

              39.0MB

            • memory/1668-254-0x0000000000400000-0x0000000002B08000-memory.dmp

              Filesize

              39.0MB

            • memory/1668-234-0x0000000000400000-0x0000000002B08000-memory.dmp

              Filesize

              39.0MB

            • memory/1668-238-0x0000000000400000-0x0000000002B08000-memory.dmp

              Filesize

              39.0MB

            • memory/1668-209-0x0000000000400000-0x0000000002B08000-memory.dmp

              Filesize

              39.0MB

            • memory/1668-213-0x0000000000400000-0x0000000002B08000-memory.dmp

              Filesize

              39.0MB

            • memory/1668-218-0x0000000000400000-0x0000000002B08000-memory.dmp

              Filesize

              39.0MB

            • memory/1668-242-0x0000000000400000-0x0000000002B08000-memory.dmp

              Filesize

              39.0MB

            • memory/1668-246-0x0000000000400000-0x0000000002B08000-memory.dmp

              Filesize

              39.0MB

            • memory/1668-249-0x0000000000400000-0x0000000002B08000-memory.dmp

              Filesize

              39.0MB

            • memory/1784-158-0x00000000707C0000-0x0000000070B17000-memory.dmp

              Filesize

              3.3MB

            • memory/1784-154-0x0000000006300000-0x0000000006657000-memory.dmp

              Filesize

              3.3MB

            • memory/1784-169-0x0000000006250000-0x0000000006265000-memory.dmp

              Filesize

              84KB

            • memory/1784-168-0x0000000007D50000-0x0000000007D61000-memory.dmp

              Filesize

              68KB

            • memory/1784-157-0x0000000070620000-0x000000007066C000-memory.dmp

              Filesize

              304KB

            • memory/1784-167-0x0000000007A30000-0x0000000007AD4000-memory.dmp

              Filesize

              656KB

            • memory/1784-156-0x0000000006D20000-0x0000000006D6C000-memory.dmp

              Filesize

              304KB

            • memory/2104-206-0x0000000000400000-0x00000000008DF000-memory.dmp

              Filesize

              4.9MB

            • memory/2104-204-0x0000000000400000-0x00000000008DF000-memory.dmp

              Filesize

              4.9MB

            • memory/2356-212-0x0000000000400000-0x00000000008DF000-memory.dmp

              Filesize

              4.9MB

            • memory/2356-207-0x0000000000400000-0x00000000008DF000-memory.dmp

              Filesize

              4.9MB

            • memory/2356-219-0x0000000000400000-0x00000000008DF000-memory.dmp

              Filesize

              4.9MB

            • memory/2448-196-0x0000000000400000-0x0000000002B08000-memory.dmp

              Filesize

              39.0MB

            • memory/2588-23-0x0000000005FF0000-0x0000000006036000-memory.dmp

              Filesize

              280KB

            • memory/2588-22-0x0000000005C10000-0x0000000005C5C000-memory.dmp

              Filesize

              304KB

            • memory/2588-4-0x000000007449E000-0x000000007449F000-memory.dmp

              Filesize

              4KB

            • memory/2588-5-0x0000000002710000-0x0000000002746000-memory.dmp

              Filesize

              216KB

            • memory/2588-39-0x00000000077E0000-0x0000000007E5A000-memory.dmp

              Filesize

              6.5MB

            • memory/2588-41-0x00000000071D0000-0x00000000071DA000-memory.dmp

              Filesize

              40KB

            • memory/2588-40-0x0000000007190000-0x00000000071AA000-memory.dmp

              Filesize

              104KB

            • memory/2588-38-0x0000000074490000-0x0000000074C41000-memory.dmp

              Filesize

              7.7MB

            • memory/2588-36-0x0000000074490000-0x0000000074C41000-memory.dmp

              Filesize

              7.7MB

            • memory/2588-37-0x0000000007070000-0x0000000007114000-memory.dmp

              Filesize

              656KB

            • memory/2588-45-0x0000000007250000-0x0000000007265000-memory.dmp

              Filesize

              84KB

            • memory/2588-25-0x0000000070700000-0x000000007074C000-memory.dmp

              Filesize

              304KB

            • memory/2588-7-0x0000000074490000-0x0000000074C41000-memory.dmp

              Filesize

              7.7MB

            • memory/2588-44-0x0000000007240000-0x000000000724E000-memory.dmp

              Filesize

              56KB

            • memory/2588-46-0x00000000072A0000-0x00000000072BA000-memory.dmp

              Filesize

              104KB

            • memory/2588-11-0x00000000056C0000-0x0000000005726000-memory.dmp

              Filesize

              408KB

            • memory/2588-42-0x00000000072E0000-0x0000000007376000-memory.dmp

              Filesize

              600KB

            • memory/2588-43-0x00000000071F0000-0x0000000007201000-memory.dmp

              Filesize

              68KB

            • memory/2588-35-0x0000000007050000-0x000000000706E000-memory.dmp

              Filesize

              120KB

            • memory/2588-26-0x0000000070880000-0x0000000070BD7000-memory.dmp

              Filesize

              3.3MB

            • memory/2588-24-0x0000000007010000-0x0000000007044000-memory.dmp

              Filesize

              208KB

            • memory/2588-47-0x0000000007290000-0x0000000007298000-memory.dmp

              Filesize

              32KB

            • memory/2588-8-0x0000000074490000-0x0000000074C41000-memory.dmp

              Filesize

              7.7MB

            • memory/2588-21-0x0000000005BD0000-0x0000000005BEE000-memory.dmp

              Filesize

              120KB

            • memory/2588-6-0x0000000004EB0000-0x00000000054DA000-memory.dmp

              Filesize

              6.2MB

            • memory/2588-9-0x0000000004D30000-0x0000000004D52000-memory.dmp

              Filesize

              136KB

            • memory/2588-20-0x0000000005730000-0x0000000005A87000-memory.dmp

              Filesize

              3.3MB

            • memory/2588-10-0x0000000005650000-0x00000000056B6000-memory.dmp

              Filesize

              408KB

            • memory/2588-50-0x0000000074490000-0x0000000074C41000-memory.dmp

              Filesize

              7.7MB

            • memory/2620-133-0x00000000049B0000-0x0000000004DB0000-memory.dmp

              Filesize

              4.0MB

            • memory/2620-1-0x00000000049B0000-0x0000000004DB0000-memory.dmp

              Filesize

              4.0MB

            • memory/2620-197-0x0000000000400000-0x0000000000D1C000-memory.dmp

              Filesize

              9.1MB

            • memory/2620-2-0x0000000004DB0000-0x000000000569B000-memory.dmp

              Filesize

              8.9MB

            • memory/2620-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

              Filesize

              9.1MB

            • memory/2620-134-0x0000000004DB0000-0x000000000569B000-memory.dmp

              Filesize

              8.9MB

            • memory/2620-132-0x0000000000400000-0x0000000002B08000-memory.dmp

              Filesize

              39.0MB

            • memory/3032-84-0x00000000061F0000-0x0000000006547000-memory.dmp

              Filesize

              3.3MB

            • memory/3032-86-0x0000000070700000-0x000000007074C000-memory.dmp

              Filesize

              304KB

            • memory/3032-87-0x0000000071040000-0x0000000071397000-memory.dmp

              Filesize

              3.3MB

            • memory/3144-97-0x0000000005790000-0x0000000005AE7000-memory.dmp

              Filesize

              3.3MB

            • memory/3144-107-0x0000000070700000-0x000000007074C000-memory.dmp

              Filesize

              304KB

            • memory/3144-108-0x0000000070950000-0x0000000070CA7000-memory.dmp

              Filesize

              3.3MB

            • memory/3752-72-0x0000000007EC0000-0x0000000007ED5000-memory.dmp

              Filesize

              84KB

            • memory/3752-71-0x0000000007E70000-0x0000000007E81000-memory.dmp

              Filesize

              68KB

            • memory/3752-61-0x0000000070880000-0x0000000070BD7000-memory.dmp

              Filesize

              3.3MB

            • memory/3752-70-0x0000000007B40000-0x0000000007BE4000-memory.dmp

              Filesize

              656KB

            • memory/3752-60-0x0000000070700000-0x000000007074C000-memory.dmp

              Filesize

              304KB

            • memory/4672-180-0x0000000070620000-0x000000007066C000-memory.dmp

              Filesize

              304KB

            • memory/4672-181-0x00000000707C0000-0x0000000070B17000-memory.dmp

              Filesize

              3.3MB