Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19-05-2024 01:31

General

  • Target

    4a729addd8ee4afc1f9491749a663806ccb077f53deda184c6eed21bda5ccaf4.exe

  • Size

    4.1MB

  • MD5

    79c4b7b79965a19b16a9dc7371644238

  • SHA1

    17771e84fba4c0f9097bec8c3f93b2ea43795ddd

  • SHA256

    4a729addd8ee4afc1f9491749a663806ccb077f53deda184c6eed21bda5ccaf4

  • SHA512

    99bc7718b9d492b1a22023586ac7facbd2385d0b85d723efdf045d5b6ba336058c1cc414ab812bf042034faf0c5bf9743093426cdc0eeb68b27628083135542a

  • SSDEEP

    98304:yf+oTi6061rsx4yGF2uQjPQS21lHMnsqkLrDDcuTdH2a0g7PF8:Bos8riuQnYS21lsngzdH/0g6

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 18 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Using powershell.exe command.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a729addd8ee4afc1f9491749a663806ccb077f53deda184c6eed21bda5ccaf4.exe
    "C:\Users\Admin\AppData\Local\Temp\4a729addd8ee4afc1f9491749a663806ccb077f53deda184c6eed21bda5ccaf4.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3272
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3516
    • C:\Users\Admin\AppData\Local\Temp\4a729addd8ee4afc1f9491749a663806ccb077f53deda184c6eed21bda5ccaf4.exe
      "C:\Users\Admin\AppData\Local\Temp\4a729addd8ee4afc1f9491749a663806ccb077f53deda184c6eed21bda5ccaf4.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2384
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4772
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2412
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:3440
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1392
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1532
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Manipulates WinMonFS driver.
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2924
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Command and Scripting Interpreter: PowerShell
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3564
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:3176
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:1964
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:884
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1032
          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:1528
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            4⤵
            • Creates scheduled task(s)
            PID:4540
          • C:\Windows\windefender.exe
            "C:\Windows\windefender.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4476
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:4520
              • C:\Windows\SysWOW64\sc.exe
                sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                6⤵
                • Launches sc.exe
                • Suspicious use of AdjustPrivilegeToken
                PID:656
    • C:\Windows\windefender.exe
      C:\Windows\windefender.exe
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:2108

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_p24pevwe.hdl.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

      Filesize

      281KB

      MD5

      d98e33b66343e7c96158444127a117f6

      SHA1

      bb716c5509a2bf345c6c1152f6e3e1452d39d50d

      SHA256

      5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

      SHA512

      705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      d0c46cad6c0778401e21910bd6b56b70

      SHA1

      7be418951ea96326aca445b8dfe449b2bfa0dca6

      SHA256

      9600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02

      SHA512

      057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      a41f223c087bcdc4bb7b85c0e2b483d6

      SHA1

      7c0e83c113e1e6437c88a6e8f46ffb3911cd9606

      SHA256

      619dc2ef6c7494d6f43e5b71f7a228a661d1c4fb6b46667488ee72c124507cec

      SHA512

      42ee3ada54905ae227131eb28d3f72717668d3225f0a499b26e87f64ffa46735ba3357ac0f8ce8029905027d1c4c6d459d3e099a05f57c242172ee76c1af51a4

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      9ec835b513630129eb86083811f39078

      SHA1

      2d593326481caee034bff986aaf9fb1d04db50aa

      SHA256

      a580d4ab57fd27d9e8909191db19afcea2548cc98593819f4d5f44ad8c1d820b

      SHA512

      29f84f9f95fa56f34d3c99273434bd5cdc28610065e1ffcadea86c3ba5959753cc86d82834bf52fb97454424702e6483d05eefef56fa73e4ca2fe7de389be6d3

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      b10fe66910616ae5ff7167114ee75be2

      SHA1

      c0eda7cd1c055cbc6e5f2171b16b013b9faf7e24

      SHA256

      8467def13f0575f49ade2a481d9890b1fef3546ef30d29bbb61d0ec90f1b88d8

      SHA512

      7439ff3e582fc867a8355face48cb4c1cfd412f222eee4b5f7acea019c89119ef6ba6f10943b8abc4b93dd70280c492e95b22531ffc47e0b7a6dd2baa04f16d3

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      ddae080e43d7807f150bded337483bd4

      SHA1

      ca91518c0bc9061d9f2305623f08fc9f42210f0f

      SHA256

      be4208a71eea5f470b2eea73ad7790caabfc1996b147b8b66ae0ab3ba91c8965

      SHA512

      556445a18853f1f8897171d5bf6f27fbadbac12689904e9ef05523a30ab40d8fdb2b9404a98b589abeb4a9a4b5371848da441fea33e275956d8be4acd36a36e1

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      90c91de44222686e57ddbe57af977717

      SHA1

      83d7bfd209706610ce9fd91c6e9b60ec58a17921

      SHA256

      0e6cfef0114a30a6a708eef8aab3fbd2ae64abac1204837274fadc3388f5409b

      SHA512

      6801053e493c1b3bf7945ef54334fcd053bfa3cdccbee63eb2a6072daec3a30463e9ac490452938594e3bf457f0a3b1b7075c6b0b4183a97d7755af0e5e70756

    • C:\Windows\rss\csrss.exe

      Filesize

      4.1MB

      MD5

      79c4b7b79965a19b16a9dc7371644238

      SHA1

      17771e84fba4c0f9097bec8c3f93b2ea43795ddd

      SHA256

      4a729addd8ee4afc1f9491749a663806ccb077f53deda184c6eed21bda5ccaf4

      SHA512

      99bc7718b9d492b1a22023586ac7facbd2385d0b85d723efdf045d5b6ba336058c1cc414ab812bf042034faf0c5bf9743093426cdc0eeb68b27628083135542a

    • C:\Windows\windefender.exe

      Filesize

      2.0MB

      MD5

      8e67f58837092385dcf01e8a2b4f5783

      SHA1

      012c49cfd8c5d06795a6f67ea2baf2a082cf8625

      SHA256

      166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

      SHA512

      40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

    • memory/884-160-0x0000000071010000-0x0000000071367000-memory.dmp

      Filesize

      3.3MB

    • memory/884-169-0x00000000070E0000-0x0000000007184000-memory.dmp

      Filesize

      656KB

    • memory/884-159-0x0000000070E70000-0x0000000070EBC000-memory.dmp

      Filesize

      304KB

    • memory/884-158-0x00000000062C0000-0x000000000630C000-memory.dmp

      Filesize

      304KB

    • memory/884-170-0x0000000007420000-0x0000000007431000-memory.dmp

      Filesize

      68KB

    • memory/884-156-0x0000000005940000-0x0000000005C97000-memory.dmp

      Filesize

      3.3MB

    • memory/884-171-0x0000000005900000-0x0000000005915000-memory.dmp

      Filesize

      84KB

    • memory/1032-181-0x0000000005E50000-0x00000000061A7000-memory.dmp

      Filesize

      3.3MB

    • memory/1032-183-0x0000000070E70000-0x0000000070EBC000-memory.dmp

      Filesize

      304KB

    • memory/1032-184-0x00000000717B0000-0x0000000071B07000-memory.dmp

      Filesize

      3.3MB

    • memory/1392-89-0x00000000711A0000-0x00000000714F7000-memory.dmp

      Filesize

      3.3MB

    • memory/1392-88-0x0000000070F50000-0x0000000070F9C000-memory.dmp

      Filesize

      304KB

    • memory/1392-83-0x0000000006350000-0x00000000066A7000-memory.dmp

      Filesize

      3.3MB

    • memory/1532-111-0x00000000710D0000-0x0000000071427000-memory.dmp

      Filesize

      3.3MB

    • memory/1532-110-0x0000000070F50000-0x0000000070F9C000-memory.dmp

      Filesize

      304KB

    • memory/2108-208-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/2108-218-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/2108-212-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/2108-227-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/2384-124-0x0000000000400000-0x0000000002732000-memory.dmp

      Filesize

      35.2MB

    • memory/2924-237-0x0000000000400000-0x0000000002732000-memory.dmp

      Filesize

      35.2MB

    • memory/2924-228-0x0000000000400000-0x0000000002732000-memory.dmp

      Filesize

      35.2MB

    • memory/2924-200-0x0000000000400000-0x0000000002732000-memory.dmp

      Filesize

      35.2MB

    • memory/2924-243-0x0000000000400000-0x0000000002732000-memory.dmp

      Filesize

      35.2MB

    • memory/2924-240-0x0000000000400000-0x0000000002732000-memory.dmp

      Filesize

      35.2MB

    • memory/2924-225-0x0000000000400000-0x0000000002732000-memory.dmp

      Filesize

      35.2MB

    • memory/2924-234-0x0000000000400000-0x0000000002732000-memory.dmp

      Filesize

      35.2MB

    • memory/2924-231-0x0000000000400000-0x0000000002732000-memory.dmp

      Filesize

      35.2MB

    • memory/2924-222-0x0000000000400000-0x0000000002732000-memory.dmp

      Filesize

      35.2MB

    • memory/2924-219-0x0000000000400000-0x0000000002732000-memory.dmp

      Filesize

      35.2MB

    • memory/2924-216-0x0000000000400000-0x0000000002732000-memory.dmp

      Filesize

      35.2MB

    • memory/2924-210-0x0000000000400000-0x0000000002732000-memory.dmp

      Filesize

      35.2MB

    • memory/2924-213-0x0000000000400000-0x0000000002732000-memory.dmp

      Filesize

      35.2MB

    • memory/3272-155-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/3272-1-0x0000000004470000-0x0000000004872000-memory.dmp

      Filesize

      4.0MB

    • memory/3272-99-0x0000000004880000-0x000000000516B000-memory.dmp

      Filesize

      8.9MB

    • memory/3272-98-0x0000000000400000-0x0000000002732000-memory.dmp

      Filesize

      35.2MB

    • memory/3272-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/3272-2-0x0000000004880000-0x000000000516B000-memory.dmp

      Filesize

      8.9MB

    • memory/3272-73-0x0000000004470000-0x0000000004872000-memory.dmp

      Filesize

      4.0MB

    • memory/3516-24-0x0000000007510000-0x0000000007544000-memory.dmp

      Filesize

      208KB

    • memory/3516-6-0x0000000074CE0000-0x0000000075491000-memory.dmp

      Filesize

      7.7MB

    • memory/3516-25-0x0000000070F50000-0x0000000070F9C000-memory.dmp

      Filesize

      304KB

    • memory/3516-38-0x0000000074CE0000-0x0000000075491000-memory.dmp

      Filesize

      7.7MB

    • memory/3516-39-0x0000000007CF0000-0x000000000836A000-memory.dmp

      Filesize

      6.5MB

    • memory/3516-23-0x0000000006500000-0x0000000006546000-memory.dmp

      Filesize

      280KB

    • memory/3516-35-0x0000000007570000-0x000000000758E000-memory.dmp

      Filesize

      120KB

    • memory/3516-22-0x0000000006140000-0x000000000618C000-memory.dmp

      Filesize

      304KB

    • memory/3516-21-0x0000000006100000-0x000000000611E000-memory.dmp

      Filesize

      120KB

    • memory/3516-20-0x0000000005C00000-0x0000000005F57000-memory.dmp

      Filesize

      3.3MB

    • memory/3516-11-0x0000000005B90000-0x0000000005BF6000-memory.dmp

      Filesize

      408KB

    • memory/3516-10-0x0000000005B20000-0x0000000005B86000-memory.dmp

      Filesize

      408KB

    • memory/3516-9-0x0000000005350000-0x0000000005372000-memory.dmp

      Filesize

      136KB

    • memory/3516-8-0x0000000005480000-0x0000000005AAA000-memory.dmp

      Filesize

      6.2MB

    • memory/3516-7-0x0000000074CE0000-0x0000000075491000-memory.dmp

      Filesize

      7.7MB

    • memory/3516-36-0x0000000074CE0000-0x0000000075491000-memory.dmp

      Filesize

      7.7MB

    • memory/3516-5-0x0000000002C80000-0x0000000002CB6000-memory.dmp

      Filesize

      216KB

    • memory/3516-4-0x0000000074CEE000-0x0000000074CEF000-memory.dmp

      Filesize

      4KB

    • memory/3516-26-0x00000000710D0000-0x0000000071427000-memory.dmp

      Filesize

      3.3MB

    • memory/3516-50-0x0000000074CE0000-0x0000000075491000-memory.dmp

      Filesize

      7.7MB

    • memory/3516-47-0x00000000077E0000-0x00000000077E8000-memory.dmp

      Filesize

      32KB

    • memory/3516-37-0x0000000007590000-0x0000000007634000-memory.dmp

      Filesize

      656KB

    • memory/3516-46-0x00000000077C0000-0x00000000077DA000-memory.dmp

      Filesize

      104KB

    • memory/3516-45-0x0000000007770000-0x0000000007785000-memory.dmp

      Filesize

      84KB

    • memory/3516-44-0x0000000007760000-0x000000000776E000-memory.dmp

      Filesize

      56KB

    • memory/3516-43-0x0000000007710000-0x0000000007721000-memory.dmp

      Filesize

      68KB

    • memory/3516-42-0x0000000007800000-0x0000000007896000-memory.dmp

      Filesize

      600KB

    • memory/3516-41-0x00000000076F0000-0x00000000076FA000-memory.dmp

      Filesize

      40KB

    • memory/3516-40-0x00000000076B0000-0x00000000076CA000-memory.dmp

      Filesize

      104KB

    • memory/3564-137-0x00000000710D0000-0x0000000071427000-memory.dmp

      Filesize

      3.3MB

    • memory/3564-136-0x0000000070F50000-0x0000000070F9C000-memory.dmp

      Filesize

      304KB

    • memory/4476-206-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/4476-209-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/4772-74-0x0000000007CE0000-0x0000000007CF5000-memory.dmp

      Filesize

      84KB

    • memory/4772-72-0x0000000007C90000-0x0000000007CA1000-memory.dmp

      Filesize

      68KB

    • memory/4772-71-0x0000000007950000-0x00000000079F4000-memory.dmp

      Filesize

      656KB

    • memory/4772-62-0x0000000071180000-0x00000000714D7000-memory.dmp

      Filesize

      3.3MB

    • memory/4772-61-0x0000000070F50000-0x0000000070F9C000-memory.dmp

      Filesize

      304KB

    • memory/4772-60-0x0000000006140000-0x0000000006497000-memory.dmp

      Filesize

      3.3MB