Analysis

  • max time kernel
    106s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-06-2023 10:10

General

  • Target

    e2d8a7f8249fdeea95eda9c3d6aec8ca79c59c8fe5bfddddb36f2bd884b24e3d.exe

  • Size

    4.2MB

  • MD5

    07acba094cf037cfe89734a47f89d72e

  • SHA1

    f1ac7ebe847da84fe51e7e7d6f04760a177bec6b

  • SHA256

    e2d8a7f8249fdeea95eda9c3d6aec8ca79c59c8fe5bfddddb36f2bd884b24e3d

  • SHA512

    81da913255b222217d41e63b059bfb875e3e85cde6406ddfd5d824a1efb30a9f073514c7ff6b49d15a05a11f9480b8bf514264a9a9de011d8ee01b073c1c5467

  • SSDEEP

    98304:fg/fHGwoT4fFLmj0g2m02naWzP2+PqzRP4VQn5X3QlY9N+h6ak9N:CPP/tLpge2aWzP2AcaWnZKk9N

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 11 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Executes dropped EXE 5 IoCs
  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 3 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2d8a7f8249fdeea95eda9c3d6aec8ca79c59c8fe5bfddddb36f2bd884b24e3d.exe
    "C:\Users\Admin\AppData\Local\Temp\e2d8a7f8249fdeea95eda9c3d6aec8ca79c59c8fe5bfddddb36f2bd884b24e3d.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3164
    • C:\Users\Admin\AppData\Local\Temp\e2d8a7f8249fdeea95eda9c3d6aec8ca79c59c8fe5bfddddb36f2bd884b24e3d.exe
      "C:\Users\Admin\AppData\Local\Temp\e2d8a7f8249fdeea95eda9c3d6aec8ca79c59c8fe5bfddddb36f2bd884b24e3d.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:5096
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:916
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:64
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:2352
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1240
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4624
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Manipulates WinMonFS driver.
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3576
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4632
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:3188
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:2684
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4492
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4788
          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:3740
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            4⤵
            • Creates scheduled task(s)
            PID:4468
          • C:\Windows\windefender.exe
            "C:\Windows\windefender.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2680
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:396
              • C:\Windows\SysWOW64\sc.exe
                sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                6⤵
                • Launches sc.exe
                • Suspicious use of AdjustPrivilegeToken
                PID:3204
          • C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe
            4⤵
            • Executes dropped EXE
            PID:3392
            • C:\Windows\SYSTEM32\schtasks.exe
              schtasks /delete /tn "csrss" /f
              5⤵
                PID:2464
              • C:\Windows\SYSTEM32\schtasks.exe
                schtasks /delete /tn "ScheduledUpdate" /f
                5⤵
                  PID:4808
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 752
                4⤵
                • Program crash
                PID:3668
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 712
              3⤵
              • Program crash
              PID:1616
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 652
            2⤵
            • Program crash
            PID:4736
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2120 -ip 2120
          1⤵
            PID:4036
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 5096 -ip 5096
            1⤵
              PID:2744
            • C:\Windows\windefender.exe
              C:\Windows\windefender.exe
              1⤵
              • Executes dropped EXE
              • Modifies data under HKEY_USERS
              PID:3352
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3576 -ip 3576
              1⤵
                PID:1588

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Execution

              Scheduled Task

              1
              T1053

              Persistence

              Modify Existing Service

              1
              T1031

              Registry Run Keys / Startup Folder

              1
              T1060

              Scheduled Task

              1
              T1053

              Privilege Escalation

              Scheduled Task

              1
              T1053

              Defense Evasion

              Modify Registry

              1
              T1112

              Discovery

              Query Registry

              2
              T1012

              System Information Discovery

              1
              T1082

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1vea2hdn.thd.ps1
                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe
                Filesize

                3.2MB

                MD5

                f801950a962ddba14caaa44bf084b55c

                SHA1

                7cadc9076121297428442785536ba0df2d4ae996

                SHA256

                c3946ec89e15b24b743c46f9acacb58cff47da63f3ce2799d71ed90496b8891f

                SHA512

                4183bc76bdc84fb779e2e573d9a63d7de47096b63b945f9e335bee95ae28eb208f5ee15f6501ac59623b97c5b77f3455ca313512e7d9803e1704ae22a52459c5

              • C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe
                Filesize

                3.2MB

                MD5

                f801950a962ddba14caaa44bf084b55c

                SHA1

                7cadc9076121297428442785536ba0df2d4ae996

                SHA256

                c3946ec89e15b24b743c46f9acacb58cff47da63f3ce2799d71ed90496b8891f

                SHA512

                4183bc76bdc84fb779e2e573d9a63d7de47096b63b945f9e335bee95ae28eb208f5ee15f6501ac59623b97c5b77f3455ca313512e7d9803e1704ae22a52459c5

              • C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                Filesize

                99KB

                MD5

                09031a062610d77d685c9934318b4170

                SHA1

                880f744184e7774f3d14c1bb857e21cc7fe89a6d

                SHA256

                778bd69af403df3c4e074c31b3850d71bf0e64524bea4272a802ca9520b379dd

                SHA512

                9a276e1f0f55d35f2bf38eb093464f7065bdd30a660e6d1c62eed5e76d1fb2201567b89d9ae65d2d89dc99b142159e36fb73be8d5e08252a975d50544a7cda27

              • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                Filesize

                281KB

                MD5

                d98e33b66343e7c96158444127a117f6

                SHA1

                bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                SHA256

                5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                SHA512

                705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

              • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                Filesize

                281KB

                MD5

                d98e33b66343e7c96158444127a117f6

                SHA1

                bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                SHA256

                5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                SHA512

                705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
                Filesize

                2KB

                MD5

                968cb9309758126772781b83adb8a28f

                SHA1

                8da30e71accf186b2ba11da1797cf67f8f78b47c

                SHA256

                92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                SHA512

                4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                Filesize

                19KB

                MD5

                588be6f4411647861d5be4ac97afd96a

                SHA1

                ee0b6d6eb9d9bd4f71b1363a2bf11e09396cc027

                SHA256

                c7cf46fc67a506b66f5d4f410658d65f6deda34925ba90a9cbd95f4b7091d51e

                SHA512

                f67e4632a9f9982ef8a06124a9420d5599745797491fdd557c0bef02040d929f088536b728ed25930f99c182f523bf45d89fe34605cafc81923df6be76e53226

              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                Filesize

                19KB

                MD5

                10850fd138545b0a1f473815743fce2c

                SHA1

                7a1c41602e17db70dd66077996cb10977bbd78ff

                SHA256

                7d15556fd3c5b60832256f477e6f582376f7213af4fa370636958c37662ef6af

                SHA512

                f3611bc0043735ccc6187f579b814317ee81e01b1bb2c2ac514d49f27f68791dfaa71e07b94a64db51c2b2208fddc367833b34a0b98e5938942e9fe7a45a15d1

              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                Filesize

                19KB

                MD5

                b15cf5d511c6c0fcc3e33e087a75b7cd

                SHA1

                bfb0824cc2bff5e1b128c1f7ddb7dd8f0e036f2b

                SHA256

                3d5d8b9300fddb579ad5fd90e1ca63046933cf0be80475a07b2e3eb7f1fb4274

                SHA512

                bed65a40a3ad3fdb22baceb2045cca2b99cb4fd06ea839b0e14930cc90bd773d593f0f270e815e68dedb1ce09e8ddda0ab3aa3d2f39e387441a331ea48e82c44

              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                Filesize

                19KB

                MD5

                bfc4c0555e21b5dac0bc4d3e23b69471

                SHA1

                576020e8883aec68966802a59449429ceb6a25f2

                SHA256

                44a43c98da4a681a7b13a20ddf5afce164720a32158cc2f1161002fe9d575108

                SHA512

                96ab41513885af1c40737c61186407eb7e674164ff415c3da6679d43a42622007a53111f5ee3f9aa946fc52db8e0532df0ad1de24a135fbdc70f992b42f15e06

              • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                Filesize

                19KB

                MD5

                90a93b0b80ada2f11dfb0453d4b4332e

                SHA1

                041431181600df14f9f4c43df05ca588a042044a

                SHA256

                9bc67f5003331ac983fe84d62cd8754d9d515490f0feda6515cf50f347311290

                SHA512

                027f3cc0fa51e9bcf01b72cb6de5acae98564e2e2a026c4609c648c55ead87684f6e46501683ee87632a626c77ae05d0731e856338384667d5e0f0412f79849e

              • C:\Windows\rss\csrss.exe
                Filesize

                4.2MB

                MD5

                07acba094cf037cfe89734a47f89d72e

                SHA1

                f1ac7ebe847da84fe51e7e7d6f04760a177bec6b

                SHA256

                e2d8a7f8249fdeea95eda9c3d6aec8ca79c59c8fe5bfddddb36f2bd884b24e3d

                SHA512

                81da913255b222217d41e63b059bfb875e3e85cde6406ddfd5d824a1efb30a9f073514c7ff6b49d15a05a11f9480b8bf514264a9a9de011d8ee01b073c1c5467

              • C:\Windows\rss\csrss.exe
                Filesize

                4.2MB

                MD5

                07acba094cf037cfe89734a47f89d72e

                SHA1

                f1ac7ebe847da84fe51e7e7d6f04760a177bec6b

                SHA256

                e2d8a7f8249fdeea95eda9c3d6aec8ca79c59c8fe5bfddddb36f2bd884b24e3d

                SHA512

                81da913255b222217d41e63b059bfb875e3e85cde6406ddfd5d824a1efb30a9f073514c7ff6b49d15a05a11f9480b8bf514264a9a9de011d8ee01b073c1c5467

              • C:\Windows\windefender.exe
                Filesize

                2.0MB

                MD5

                8e67f58837092385dcf01e8a2b4f5783

                SHA1

                012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                SHA256

                166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                SHA512

                40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

              • C:\Windows\windefender.exe
                Filesize

                2.0MB

                MD5

                8e67f58837092385dcf01e8a2b4f5783

                SHA1

                012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                SHA256

                166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                SHA512

                40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

              • C:\Windows\windefender.exe
                Filesize

                2.0MB

                MD5

                8e67f58837092385dcf01e8a2b4f5783

                SHA1

                012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                SHA256

                166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                SHA512

                40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

              • memory/916-181-0x0000000004D40000-0x0000000004D50000-memory.dmp
                Filesize

                64KB

              • memory/916-204-0x000000007F980000-0x000000007F990000-memory.dmp
                Filesize

                64KB

              • memory/916-194-0x0000000070B20000-0x0000000070E74000-memory.dmp
                Filesize

                3.3MB

              • memory/916-193-0x0000000070380000-0x00000000703CC000-memory.dmp
                Filesize

                304KB

              • memory/916-192-0x0000000004D40000-0x0000000004D50000-memory.dmp
                Filesize

                64KB

              • memory/916-182-0x0000000004D40000-0x0000000004D50000-memory.dmp
                Filesize

                64KB

              • memory/1240-219-0x0000000005250000-0x0000000005260000-memory.dmp
                Filesize

                64KB

              • memory/1240-218-0x0000000005250000-0x0000000005260000-memory.dmp
                Filesize

                64KB

              • memory/1240-221-0x0000000005250000-0x0000000005260000-memory.dmp
                Filesize

                64KB

              • memory/1240-222-0x0000000070380000-0x00000000703CC000-memory.dmp
                Filesize

                304KB

              • memory/1240-223-0x0000000070B40000-0x0000000070E94000-memory.dmp
                Filesize

                3.3MB

              • memory/1240-233-0x000000007F090000-0x000000007F0A0000-memory.dmp
                Filesize

                64KB

              • memory/2120-179-0x0000000000400000-0x00000000030DC000-memory.dmp
                Filesize

                44.9MB

              • memory/2120-170-0x0000000000400000-0x00000000030DC000-memory.dmp
                Filesize

                44.9MB

              • memory/2120-134-0x0000000005140000-0x0000000005A2B000-memory.dmp
                Filesize

                8.9MB

              • memory/2680-356-0x0000000000400000-0x00000000008DF000-memory.dmp
                Filesize

                4.9MB

              • memory/2680-354-0x0000000000400000-0x00000000008DF000-memory.dmp
                Filesize

                4.9MB

              • memory/3164-169-0x0000000007C50000-0x0000000007C6E000-memory.dmp
                Filesize

                120KB

              • memory/3164-141-0x00000000060B0000-0x0000000006116000-memory.dmp
                Filesize

                408KB

              • memory/3164-176-0x0000000007E40000-0x0000000007E48000-memory.dmp
                Filesize

                32KB

              • memory/3164-175-0x0000000007EF0000-0x0000000007F0A000-memory.dmp
                Filesize

                104KB

              • memory/3164-174-0x0000000007E00000-0x0000000007E0E000-memory.dmp
                Filesize

                56KB

              • memory/3164-173-0x0000000007E50000-0x0000000007EE6000-memory.dmp
                Filesize

                600KB

              • memory/3164-172-0x000000007F2A0000-0x000000007F2B0000-memory.dmp
                Filesize

                64KB

              • memory/3164-171-0x0000000007D90000-0x0000000007D9A000-memory.dmp
                Filesize

                40KB

              • memory/3164-159-0x0000000070400000-0x0000000070754000-memory.dmp
                Filesize

                3.3MB

              • memory/3164-158-0x0000000070280000-0x00000000702CC000-memory.dmp
                Filesize

                304KB

              • memory/3164-135-0x0000000005140000-0x0000000005176000-memory.dmp
                Filesize

                216KB

              • memory/3164-157-0x0000000007C70000-0x0000000007CA2000-memory.dmp
                Filesize

                200KB

              • memory/3164-136-0x0000000005950000-0x0000000005F78000-memory.dmp
                Filesize

                6.2MB

              • memory/3164-156-0x0000000005310000-0x0000000005320000-memory.dmp
                Filesize

                64KB

              • memory/3164-155-0x0000000007AA0000-0x0000000007ABA000-memory.dmp
                Filesize

                104KB

              • memory/3164-137-0x0000000005310000-0x0000000005320000-memory.dmp
                Filesize

                64KB

              • memory/3164-138-0x0000000005310000-0x0000000005320000-memory.dmp
                Filesize

                64KB

              • memory/3164-154-0x0000000008100000-0x000000000877A000-memory.dmp
                Filesize

                6.5MB

              • memory/3164-153-0x0000000007A00000-0x0000000007A76000-memory.dmp
                Filesize

                472KB

              • memory/3164-152-0x0000000006B10000-0x0000000006B54000-memory.dmp
                Filesize

                272KB

              • memory/3164-139-0x0000000005820000-0x0000000005842000-memory.dmp
                Filesize

                136KB

              • memory/3164-140-0x00000000058C0000-0x0000000005926000-memory.dmp
                Filesize

                408KB

              • memory/3164-151-0x00000000066F0000-0x000000000670E000-memory.dmp
                Filesize

                120KB

              • memory/3352-357-0x0000000000400000-0x00000000008DF000-memory.dmp
                Filesize

                4.9MB

              • memory/3352-370-0x0000000000400000-0x00000000008DF000-memory.dmp
                Filesize

                4.9MB

              • memory/3352-363-0x0000000000400000-0x00000000008DF000-memory.dmp
                Filesize

                4.9MB

              • memory/3392-375-0x0000000000400000-0x0000000000C25000-memory.dmp
                Filesize

                8.1MB

              • memory/3392-369-0x0000000000400000-0x0000000000C25000-memory.dmp
                Filesize

                8.1MB

              • memory/3392-373-0x0000000000400000-0x0000000000C25000-memory.dmp
                Filesize

                8.1MB

              • memory/3576-316-0x0000000000400000-0x00000000030DC000-memory.dmp
                Filesize

                44.9MB

              • memory/3576-360-0x0000000000400000-0x00000000030DC000-memory.dmp
                Filesize

                44.9MB

              • memory/3576-358-0x0000000000400000-0x00000000030DC000-memory.dmp
                Filesize

                44.9MB

              • memory/3576-362-0x0000000000400000-0x00000000030DC000-memory.dmp
                Filesize

                44.9MB

              • memory/3576-371-0x0000000000400000-0x00000000030DC000-memory.dmp
                Filesize

                44.9MB

              • memory/3576-349-0x0000000000400000-0x00000000030DC000-memory.dmp
                Filesize

                44.9MB

              • memory/4492-304-0x0000000070200000-0x000000007024C000-memory.dmp
                Filesize

                304KB

              • memory/4492-301-0x0000000002750000-0x0000000002760000-memory.dmp
                Filesize

                64KB

              • memory/4492-303-0x0000000002750000-0x0000000002760000-memory.dmp
                Filesize

                64KB

              • memory/4492-315-0x000000007F620000-0x000000007F630000-memory.dmp
                Filesize

                64KB

              • memory/4492-302-0x0000000002750000-0x0000000002760000-memory.dmp
                Filesize

                64KB

              • memory/4492-305-0x0000000070380000-0x00000000706D4000-memory.dmp
                Filesize

                3.3MB

              • memory/4624-247-0x0000000070380000-0x00000000703CC000-memory.dmp
                Filesize

                304KB

              • memory/4624-245-0x0000000003090000-0x00000000030A0000-memory.dmp
                Filesize

                64KB

              • memory/4624-246-0x0000000003090000-0x00000000030A0000-memory.dmp
                Filesize

                64KB

              • memory/4624-248-0x0000000070B20000-0x0000000070E74000-memory.dmp
                Filesize

                3.3MB

              • memory/4632-277-0x0000000004E50000-0x0000000004E60000-memory.dmp
                Filesize

                64KB

              • memory/4632-270-0x0000000004E50000-0x0000000004E60000-memory.dmp
                Filesize

                64KB

              • memory/4632-275-0x0000000004E50000-0x0000000004E60000-memory.dmp
                Filesize

                64KB

              • memory/4632-289-0x000000007F290000-0x000000007F2A0000-memory.dmp
                Filesize

                64KB

              • memory/4632-279-0x0000000070A80000-0x0000000070DD4000-memory.dmp
                Filesize

                3.3MB

              • memory/4632-278-0x00000000702E0000-0x000000007032C000-memory.dmp
                Filesize

                304KB

              • memory/4788-329-0x0000000002540000-0x0000000002550000-memory.dmp
                Filesize

                64KB

              • memory/4788-328-0x0000000002540000-0x0000000002550000-memory.dmp
                Filesize

                64KB

              • memory/4788-342-0x000000007EE40000-0x000000007EE50000-memory.dmp
                Filesize

                64KB

              • memory/4788-330-0x0000000070200000-0x000000007024C000-memory.dmp
                Filesize

                304KB

              • memory/4788-331-0x0000000070380000-0x00000000706D4000-memory.dmp
                Filesize

                3.3MB

              • memory/4788-341-0x0000000002540000-0x0000000002550000-memory.dmp
                Filesize

                64KB

              • memory/5096-263-0x0000000000400000-0x00000000030DC000-memory.dmp
                Filesize

                44.9MB

              • memory/5096-208-0x0000000000400000-0x00000000030DC000-memory.dmp
                Filesize

                44.9MB