Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19-05-2024 05:40

General

  • Target

    e76b0d442257b858b6fa9cf9359aee81baffd2e3caa64f00b62a3eefda826167.exe

  • Size

    4.1MB

  • MD5

    13c93e83e0c88b132e67fb0a2785cb36

  • SHA1

    dbd0ba5e97752a2be3f4c4a0ddbb446d5bc4476f

  • SHA256

    e76b0d442257b858b6fa9cf9359aee81baffd2e3caa64f00b62a3eefda826167

  • SHA512

    e26588221f737aa86b5c946cc658add9645fa819b733baf9fd2a8296051dbdcb0a43b82bd92a4b0ec0a6b33b6ed1889d51a00b1db8e3691020e78d9c41ecfd98

  • SSDEEP

    98304:kWlQWNKQPwrulMpohZQjk4lnBk2/sgseYryCqOgI7KD2bsOvJZ+2+YZ:kW16ulMesXlnBp/sjruCqmtIOvaq

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 20 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Using powershell.exe command.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e76b0d442257b858b6fa9cf9359aee81baffd2e3caa64f00b62a3eefda826167.exe
    "C:\Users\Admin\AppData\Local\Temp\e76b0d442257b858b6fa9cf9359aee81baffd2e3caa64f00b62a3eefda826167.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:752
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4896
    • C:\Users\Admin\AppData\Local\Temp\e76b0d442257b858b6fa9cf9359aee81baffd2e3caa64f00b62a3eefda826167.exe
      "C:\Users\Admin\AppData\Local\Temp\e76b0d442257b858b6fa9cf9359aee81baffd2e3caa64f00b62a3eefda826167.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:984
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2504
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5076
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:3812
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3772
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4404
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Manipulates WinMonFS driver.
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4608
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Command and Scripting Interpreter: PowerShell
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4824
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:3584
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:4572
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4936
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2436
          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:2804
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            4⤵
            • Creates scheduled task(s)
            PID:3932
          • C:\Windows\windefender.exe
            "C:\Windows\windefender.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1288
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:4052
              • C:\Windows\SysWOW64\sc.exe
                sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                6⤵
                • Launches sc.exe
                • Suspicious use of AdjustPrivilegeToken
                PID:2792
    • C:\Windows\windefender.exe
      C:\Windows\windefender.exe
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:1808

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dqjegey2.ycm.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

      Filesize

      281KB

      MD5

      d98e33b66343e7c96158444127a117f6

      SHA1

      bb716c5509a2bf345c6c1152f6e3e1452d39d50d

      SHA256

      5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

      SHA512

      705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      ac4917a885cf6050b1a483e4bc4d2ea5

      SHA1

      b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f

      SHA256

      e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9

      SHA512

      092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      48b1e52c43cf731e3a5f41b5a522f76c

      SHA1

      9a6c729f971dab87e9003e72b76d2b62881d2a11

      SHA256

      2d535ce809b008e42cccd921e57c9cde2e832fc3a47b9a6da9f55113f8ec3c61

      SHA512

      17ccc9a0745c2004abeb6bb15ffe5f75cf5dfe2ab39932c7b128e3040d24d2190a7598c8e968d0bf4ca903fb15c8fe9a429d3d9eb352a1919662c8cb9615b08b

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      c39ac496130963b7472b1b075e5b7a40

      SHA1

      44ff242f9d091b51925ad8fef90aa876070f77e1

      SHA256

      2c7476fcbb344bbe1545e7482c1aa86c5435bd72e537d97597bdcf8156b43ed2

      SHA512

      bc6eeacc6541c1d617e415261a9207b1dfbed9de04ccd20fc3728c71dd1475484a65fb05fc578a5ec1636f0f1cb1474000160dc1cc2e3d1b9d3ef3a3352ec711

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      3c70454e3e3038b6cd0fb9ee662a55b6

      SHA1

      ed72012186d49604e6fbe2e576b88a19c5aa59d8

      SHA256

      2407313a255372c4047bbed1bd9a981ba804b06b0d2cfef8e26990228f927383

      SHA512

      5bb7c434e057b66651ddb1c897f0b7493d185b8efc48714165ef782eaa01b338b36ecbeb269bda7cc7431bbf7ccd5914e888f7982a6474acdd9b47671a9d3a51

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      efa20b6046a3a637c24e2b52c7707369

      SHA1

      9953d34eb0660563959d0a4891cd825963511511

      SHA256

      7fcdfefd2ecad508e3233ce00fda3a9acae093d5705dda9b1db445798e6d0898

      SHA512

      9039b10ec78235de532e7d228f0556a5a2f65d3868f82c5df33fe7e2668eae1b916e90c3d347fcc97e1b17315c67e45893b53f17b510b799cf6e7eef8688c95f

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      19KB

      MD5

      f3e0afcab0adc50c63f832462b5e1138

      SHA1

      587048de42194b60e9158759345f6f9287fcff69

      SHA256

      c27adc4d2158b7952dd1db70783123500959db36c6d29a15fbd624de5a37d506

      SHA512

      147413acd932e96df15891366ad871074520d6941792d2d245f6097db8655a45b32fc0f9b17d56b63b1bb2e1005b6c6fca1df81328bc0c84e3f4e05abb466a4f

    • C:\Windows\rss\csrss.exe

      Filesize

      4.1MB

      MD5

      13c93e83e0c88b132e67fb0a2785cb36

      SHA1

      dbd0ba5e97752a2be3f4c4a0ddbb446d5bc4476f

      SHA256

      e76b0d442257b858b6fa9cf9359aee81baffd2e3caa64f00b62a3eefda826167

      SHA512

      e26588221f737aa86b5c946cc658add9645fa819b733baf9fd2a8296051dbdcb0a43b82bd92a4b0ec0a6b33b6ed1889d51a00b1db8e3691020e78d9c41ecfd98

    • C:\Windows\windefender.exe

      Filesize

      2.0MB

      MD5

      8e67f58837092385dcf01e8a2b4f5783

      SHA1

      012c49cfd8c5d06795a6f67ea2baf2a082cf8625

      SHA256

      166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

      SHA512

      40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

    • memory/752-1-0x0000000004210000-0x0000000004613000-memory.dmp

      Filesize

      4.0MB

    • memory/752-51-0x0000000000400000-0x0000000002362000-memory.dmp

      Filesize

      31.4MB

    • memory/752-53-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/752-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/752-54-0x0000000004620000-0x0000000004F0B000-memory.dmp

      Filesize

      8.9MB

    • memory/752-2-0x0000000004620000-0x0000000004F0B000-memory.dmp

      Filesize

      8.9MB

    • memory/984-121-0x0000000000400000-0x0000000002362000-memory.dmp

      Filesize

      31.4MB

    • memory/984-126-0x0000000000400000-0x0000000002362000-memory.dmp

      Filesize

      31.4MB

    • memory/1288-214-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/1288-209-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/1808-212-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/1808-217-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/1808-220-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/2436-182-0x0000000005590000-0x00000000058E7000-memory.dmp

      Filesize

      3.3MB

    • memory/2436-189-0x00000000708E0000-0x000000007092C000-memory.dmp

      Filesize

      304KB

    • memory/2436-190-0x0000000070AF0000-0x0000000070E47000-memory.dmp

      Filesize

      3.3MB

    • memory/2504-76-0x0000000007200000-0x0000000007211000-memory.dmp

      Filesize

      68KB

    • memory/2504-65-0x0000000070A60000-0x0000000070AAC000-memory.dmp

      Filesize

      304KB

    • memory/2504-77-0x0000000007250000-0x0000000007265000-memory.dmp

      Filesize

      84KB

    • memory/2504-75-0x0000000006CE0000-0x0000000006D84000-memory.dmp

      Filesize

      656KB

    • memory/2504-66-0x0000000070CA0000-0x0000000070FF7000-memory.dmp

      Filesize

      3.3MB

    • memory/2504-63-0x00000000057A0000-0x0000000005AF7000-memory.dmp

      Filesize

      3.3MB

    • memory/2504-64-0x0000000005D00000-0x0000000005D4C000-memory.dmp

      Filesize

      304KB

    • memory/3772-91-0x0000000070CA0000-0x0000000070FF7000-memory.dmp

      Filesize

      3.3MB

    • memory/3772-90-0x0000000070A60000-0x0000000070AAC000-memory.dmp

      Filesize

      304KB

    • memory/4404-112-0x0000000070BE0000-0x0000000070F37000-memory.dmp

      Filesize

      3.3MB

    • memory/4404-111-0x0000000070A60000-0x0000000070AAC000-memory.dmp

      Filesize

      304KB

    • memory/4404-109-0x0000000005E20000-0x0000000006177000-memory.dmp

      Filesize

      3.3MB

    • memory/4608-229-0x0000000000400000-0x0000000002362000-memory.dmp

      Filesize

      31.4MB

    • memory/4608-231-0x0000000000400000-0x0000000002362000-memory.dmp

      Filesize

      31.4MB

    • memory/4608-221-0x0000000000400000-0x0000000002362000-memory.dmp

      Filesize

      31.4MB

    • memory/4608-237-0x0000000000400000-0x0000000002362000-memory.dmp

      Filesize

      31.4MB

    • memory/4608-219-0x0000000000400000-0x0000000002362000-memory.dmp

      Filesize

      31.4MB

    • memory/4608-224-0x0000000000400000-0x0000000002362000-memory.dmp

      Filesize

      31.4MB

    • memory/4608-227-0x0000000000400000-0x0000000002362000-memory.dmp

      Filesize

      31.4MB

    • memory/4608-235-0x0000000000400000-0x0000000002362000-memory.dmp

      Filesize

      31.4MB

    • memory/4608-232-0x0000000000400000-0x0000000002362000-memory.dmp

      Filesize

      31.4MB

    • memory/4608-223-0x0000000000400000-0x0000000002362000-memory.dmp

      Filesize

      31.4MB

    • memory/4608-205-0x0000000000400000-0x0000000002362000-memory.dmp

      Filesize

      31.4MB

    • memory/4608-216-0x0000000000400000-0x0000000002362000-memory.dmp

      Filesize

      31.4MB

    • memory/4608-215-0x0000000000400000-0x0000000002362000-memory.dmp

      Filesize

      31.4MB

    • memory/4824-152-0x0000000006520000-0x0000000006535000-memory.dmp

      Filesize

      84KB

    • memory/4824-151-0x00000000064A0000-0x00000000064B1000-memory.dmp

      Filesize

      68KB

    • memory/4824-150-0x00000000078E0000-0x0000000007984000-memory.dmp

      Filesize

      656KB

    • memory/4824-137-0x0000000006100000-0x0000000006457000-memory.dmp

      Filesize

      3.3MB

    • memory/4824-141-0x0000000070C00000-0x0000000070F57000-memory.dmp

      Filesize

      3.3MB

    • memory/4824-139-0x00000000066D0000-0x000000000671C000-memory.dmp

      Filesize

      304KB

    • memory/4824-140-0x00000000709C0000-0x0000000070A0C000-memory.dmp

      Filesize

      304KB

    • memory/4896-40-0x0000000007E40000-0x0000000007E5A000-memory.dmp

      Filesize

      104KB

    • memory/4896-22-0x00000000068D0000-0x000000000691C000-memory.dmp

      Filesize

      304KB

    • memory/4896-47-0x0000000007FF0000-0x0000000007FF8000-memory.dmp

      Filesize

      32KB

    • memory/4896-46-0x0000000008000000-0x000000000801A000-memory.dmp

      Filesize

      104KB

    • memory/4896-4-0x00000000746EE000-0x00000000746EF000-memory.dmp

      Filesize

      4KB

    • memory/4896-45-0x0000000007F00000-0x0000000007F15000-memory.dmp

      Filesize

      84KB

    • memory/4896-5-0x00000000033E0000-0x0000000003416000-memory.dmp

      Filesize

      216KB

    • memory/4896-6-0x0000000005BA0000-0x00000000061CA000-memory.dmp

      Filesize

      6.2MB

    • memory/4896-7-0x00000000746E0000-0x0000000074E91000-memory.dmp

      Filesize

      7.7MB

    • memory/4896-8-0x00000000746E0000-0x0000000074E91000-memory.dmp

      Filesize

      7.7MB

    • memory/4896-9-0x00000000059D0000-0x00000000059F2000-memory.dmp

      Filesize

      136KB

    • memory/4896-11-0x0000000005AE0000-0x0000000005B46000-memory.dmp

      Filesize

      408KB

    • memory/4896-44-0x0000000007EF0000-0x0000000007EFE000-memory.dmp

      Filesize

      56KB

    • memory/4896-43-0x0000000007EC0000-0x0000000007ED1000-memory.dmp

      Filesize

      68KB

    • memory/4896-42-0x0000000007F40000-0x0000000007FD6000-memory.dmp

      Filesize

      600KB

    • memory/4896-41-0x0000000007E80000-0x0000000007E8A000-memory.dmp

      Filesize

      40KB

    • memory/4896-39-0x0000000008490000-0x0000000008B0A000-memory.dmp

      Filesize

      6.5MB

    • memory/4896-38-0x00000000746E0000-0x0000000074E91000-memory.dmp

      Filesize

      7.7MB

    • memory/4896-36-0x00000000746E0000-0x0000000074E91000-memory.dmp

      Filesize

      7.7MB

    • memory/4896-37-0x0000000007D20000-0x0000000007DC4000-memory.dmp

      Filesize

      656KB

    • memory/4896-35-0x0000000007D00000-0x0000000007D1E000-memory.dmp

      Filesize

      120KB

    • memory/4896-25-0x0000000070950000-0x000000007099C000-memory.dmp

      Filesize

      304KB

    • memory/4896-26-0x0000000070AD0000-0x0000000070E27000-memory.dmp

      Filesize

      3.3MB

    • memory/4896-24-0x0000000007CC0000-0x0000000007CF4000-memory.dmp

      Filesize

      208KB

    • memory/4896-23-0x0000000006E40000-0x0000000006E86000-memory.dmp

      Filesize

      280KB

    • memory/4896-50-0x00000000746E0000-0x0000000074E91000-memory.dmp

      Filesize

      7.7MB

    • memory/4896-21-0x00000000068A0000-0x00000000068BE000-memory.dmp

      Filesize

      120KB

    • memory/4896-20-0x0000000006400000-0x0000000006757000-memory.dmp

      Filesize

      3.3MB

    • memory/4896-10-0x0000000005A70000-0x0000000005AD6000-memory.dmp

      Filesize

      408KB

    • memory/4936-177-0x0000000005730000-0x0000000005745000-memory.dmp

      Filesize

      84KB

    • memory/4936-176-0x0000000007260000-0x0000000007271000-memory.dmp

      Filesize

      68KB

    • memory/4936-175-0x0000000006F30000-0x0000000006FD4000-memory.dmp

      Filesize

      656KB

    • memory/4936-165-0x00000000708E0000-0x000000007092C000-memory.dmp

      Filesize

      304KB

    • memory/4936-166-0x0000000070A60000-0x0000000070DB7000-memory.dmp

      Filesize

      3.3MB

    • memory/4936-164-0x0000000006260000-0x00000000062AC000-memory.dmp

      Filesize

      304KB

    • memory/4936-162-0x00000000057E0000-0x0000000005B37000-memory.dmp

      Filesize

      3.3MB