Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13-03-2024 14:07

General

  • Target

    file.exe

  • Size

    5.9MB

  • MD5

    a22002306cbbdc52549b8998a7348cfb

  • SHA1

    6396fa71cd6042d915ec3244eb9eea7b11735b65

  • SHA256

    b29b6f1b6a2d7f6d8b63ac749bdc991892970c7e7643221cf6087d75e4f17c41

  • SHA512

    240cb963bfdf51c25b5284daa49f4fb86539dc6b614327fc5f3f5bf3956784974b7beaefe1df67cdf6e414bb86c2581321f44ec9b58eb25735b7d2e4d6cbd6e6

  • SSDEEP

    98304:3bch/RlekYSHAdakJEnHfCVf4Pp1ScWt/cS4HHQTHYuin7owuTALeZN/sa+gGgH9:3Y5u82J8npxWt/cS4nG47n7t/sGgH8rP

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.145

Attributes
  • url_path

    /3cd2b41cbde8fc9c.php

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 19 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Windows security bypass 2 TTPs 7 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 20 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 7 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Users\Admin\AppData\Local\Temp\InstallSetup10.exe
      "C:\Users\Admin\AppData\Local\Temp\InstallSetup10.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2556
      • C:\Users\Admin\AppData\Local\Temp\syncUpd.exe
        C:\Users\Admin\AppData\Local\Temp\syncUpd.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:2480
      • C:\Users\Admin\AppData\Local\Temp\BroomSetup.exe
        C:\Users\Admin\AppData\Local\Temp\BroomSetup.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2216
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1064
          • C:\Windows\SysWOW64\chcp.com
            chcp 1251
            5⤵
              PID:1672
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F
              5⤵
              • Creates scheduled task(s)
              PID:784
      • C:\Users\Admin\AppData\Local\Temp\453829d01bd822c255d951511849bab8.exe
        "C:\Users\Admin\AppData\Local\Temp\453829d01bd822c255d951511849bab8.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2640
        • C:\Users\Admin\AppData\Local\Temp\453829d01bd822c255d951511849bab8.exe
          "C:\Users\Admin\AppData\Local\Temp\453829d01bd822c255d951511849bab8.exe"
          3⤵
          • Windows security bypass
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Adds Run key to start application
          • Checks for VirtualBox DLLs, possible anti-VM trick
          • Drops file in Windows directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1940
          • C:\Windows\system32\cmd.exe
            C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2428
            • C:\Windows\system32\netsh.exe
              netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
              5⤵
              • Modifies Windows Firewall
              • Modifies data under HKEY_USERS
              PID:1160
          • C:\Windows\rss\csrss.exe
            C:\Windows\rss\csrss.exe
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies system certificate store
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1896
            • C:\Windows\system32\schtasks.exe
              schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
              5⤵
              • Creates scheduled task(s)
              PID:1776
            • C:\Windows\system32\schtasks.exe
              schtasks /delete /tn ScheduledUpdate /f
              5⤵
                PID:1296
              • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
                "C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Modifies system certificate store
                PID:1640
              • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                5⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:1392
        • C:\Users\Admin\AppData\Local\Temp\pub1E.exe
          "C:\Users\Admin\AppData\Local\Temp\pub1E.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2804
      • C:\Windows\system32\makecab.exe
        "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240313140806.log C:\Windows\Logs\CBS\CbsPersist_20240313140806.cab
        1⤵
        • Drops file in Windows directory
        PID:2172

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

        Filesize

        67KB

        MD5

        753df6889fd7410a2e9fe333da83a429

        SHA1

        3c425f16e8267186061dd48ac1c77c122962456e

        SHA256

        b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

        SHA512

        9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

      • C:\Users\Admin\AppData\Local\Temp\453829d01bd822c255d951511849bab8.exe

        Filesize

        3.6MB

        MD5

        9f0d1959d430244b21a1e7291ab2aa21

        SHA1

        553262378b50d80cda90441acef61fe084d1944a

        SHA256

        0a530bd370b48d1e3489ce7e9d69bed86238384a9e54c96a58652001410dd248

        SHA512

        c0c41c0e7ec956a15580cdbd55ee97ae5134f4d145983d6359fec1082ecad0a7eb9c6949b0c43bcc7d862d62eca1361d53a4b599d1d297be58a6da929eda2e04

      • C:\Users\Admin\AppData\Local\Temp\453829d01bd822c255d951511849bab8.exe

        Filesize

        3.1MB

        MD5

        0280345cfc5a72d56718a74ebc502718

        SHA1

        bf432be3ce35b7a53eaaff719422fd0108f5a46e

        SHA256

        a70fc0c4176c0baa53d7d5b9d0e6e338ec852feacc97e20c64bf6dddf5e19229

        SHA512

        e4ed07fd0094d370b7f7335ac5c2ef99f1b598e006c3b48251c11379cca93b79b25565dd33ec14a035d6e0c0b9b8b9a04dbde61a8640c47bb32451de907bb1be

      • C:\Users\Admin\AppData\Local\Temp\453829d01bd822c255d951511849bab8.exe

        Filesize

        4.1MB

        MD5

        49203862b08ebc3c706bebae1be9c43b

        SHA1

        51fffb777959955ccde2ca5456a1b6ff5230b95d

        SHA256

        b12e77896a69c8953cb24500f9eb6660ae306ba6d4c7b814ba12c4ff2b2c9cb7

        SHA512

        75fa654c4ac67db9fb287cc781f8059774ff695c9d6197c5a00f97401fc57c50a0cde5f212e115cabdfca368585122343fe96fbe0c1edc19630df68cfebe05c5

      • C:\Users\Admin\AppData\Local\Temp\453829d01bd822c255d951511849bab8.exe

        Filesize

        2.9MB

        MD5

        e773dd97ad81e96c9aa58e5b9fc32a46

        SHA1

        508246da1233d2d075c16335452aca6f6bf13bee

        SHA256

        ae41612138ca21a615ebd1678affe60789df174116e451f4e8d26159facbafee

        SHA512

        bd5090205ac105befc150d453fd9535812ccc9868a2d375d2529a267d5060411469b77fbe2702aa192cb022fec7c97a8cca3f8b75bedd5341bb86d0e4dbc47e2

      • C:\Users\Admin\AppData\Local\Temp\BroomSetup.exe

        Filesize

        1.7MB

        MD5

        eee5ddcffbed16222cac0a1b4e2e466e

        SHA1

        28b40c88b8ea50b0782e2bcbb4cc0f411035f3d5

        SHA256

        2a40e5dccc7526c4982334941c90f95374460e2a816e84e724e98c4d52ae8c54

        SHA512

        8f88901f3ebd425818db09f268df19ccf8a755603f04e9481bcf02b112a84393f8a900ead77f8f971bfa33fd9fa5636b7494aaee864a0fb04e3273911a4216dc

      • C:\Users\Admin\AppData\Local\Temp\Cab73AC.tmp

        Filesize

        65KB

        MD5

        ac05d27423a85adc1622c714f2cb6184

        SHA1

        b0fe2b1abddb97837ea0195be70ab2ff14d43198

        SHA256

        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

        SHA512

        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

      • C:\Users\Admin\AppData\Local\Temp\Tar7690.tmp

        Filesize

        175KB

        MD5

        dd73cead4b93366cf3465c8cd32e2796

        SHA1

        74546226dfe9ceb8184651e920d1dbfb432b314e

        SHA256

        a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

        SHA512

        ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

      • C:\Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

        Filesize

        3.2MB

        MD5

        f9a8a3b7ce3fc9f70512156fec660df9

        SHA1

        162266af4670658cd07f38386a3e4b19a4e1f49d

        SHA256

        26f79454997a60d19fda28d3cea120fbd95f444b41e2fbf916011720555125f7

        SHA512

        e4d39f9446d447516931532fb7729ff9bf3da37c827e22fc33ce29b03687effe423bae0778fdb63bce9e615231a8406119b0862b6f14236b7490ab0fda68b4ab

      • C:\Users\Admin\AppData\Local\Temp\pub1E.exe

        Filesize

        8KB

        MD5

        08bf7dfea9919ac71d97889b2bee673c

        SHA1

        e48b2bcebe43b9477f377a2d70f3cb75cd583813

        SHA256

        da737c0d2b3e011e362325b5c531f8c456f788121221a795990ce85c4fb1ab43

        SHA512

        71d5596783d5b1dd2f84bf9f508da514734c47d9575f81399ddb4a7e71015fcb7107957f63a6f024024ca76d5b3b9b183a91deb9590cd8e46b2d630bbb9b5680

      • C:\Users\Admin\AppData\Local\Temp\syncUpd.exe

        Filesize

        200KB

        MD5

        4daa194c9f29f77b6a97afcc50793020

        SHA1

        fa03fe3b16bc39ca17366c7b22bd71d0693cbf6f

        SHA256

        421f8d69e9d99d7e447bae84e0574e19c9210c6f6121944408be0669aa63c56e

        SHA512

        0638935945b3c181b59bda9dc13e53fc88cbbabe046af0460049f6e89688a9cd4e67783b93002330aa94cd25a04db492e1791bad4cc6c634ab6975affd63ba05

      • C:\Users\Admin\AppData\Roaming\Temp\Task.bat

        Filesize

        128B

        MD5

        11bb3db51f701d4e42d3287f71a6a43e

        SHA1

        63a4ee82223be6a62d04bdfe40ef8ba91ae49a86

        SHA256

        6be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331

        SHA512

        907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2

      • \ProgramData\mozglue.dll

        Filesize

        593KB

        MD5

        c8fd9be83bc728cc04beffafc2907fe9

        SHA1

        95ab9f701e0024cedfbd312bcfe4e726744c4f2e

        SHA256

        ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

        SHA512

        fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

      • \ProgramData\nss3.dll

        Filesize

        2.0MB

        MD5

        1cc453cdf74f31e4d913ff9c10acdde2

        SHA1

        6e85eae544d6e965f15fa5c39700fa7202f3aafe

        SHA256

        ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

        SHA512

        dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

      • \Users\Admin\AppData\Local\Temp\453829d01bd822c255d951511849bab8.exe

        Filesize

        3.9MB

        MD5

        267ddcb6c9f4695d300b4f0072cadb02

        SHA1

        48948d15e53f8b4ebe665218d71adc7ec9d4faff

        SHA256

        118f9d011dab9fc9ae655baf211d2e29a56fa452b4248ef7b0b31a7b6805e68f

        SHA512

        921a4fb8cee2b10ef67fd1e4b49aa8198e191d597c83dae89b53e7e2e00591bafcd0ef148519d0810adeb467abe6e0c1f1e5abd9b2a662160d5ea9df96277ed2

      • \Users\Admin\AppData\Local\Temp\453829d01bd822c255d951511849bab8.exe

        Filesize

        4.0MB

        MD5

        f2f772d83210f439df9a6c15a6c691bd

        SHA1

        a1a525904277f65c31b98a8487705bccfb193fe7

        SHA256

        35bc016fc9c41d21a744cb240b67d27a43cb86e0875c436e3d5e7d3e8a7cb5a2

        SHA512

        6d9b0e1320f3ede0aa3655a21cade0f5f490b6364c80447ef07f8dc62632997f13e854235b502b27953bc7e0441e9e5b378bb5e4d91a02bbf38291ce0f313466

      • \Users\Admin\AppData\Local\Temp\InstallSetup10.exe

        Filesize

        1.8MB

        MD5

        12cfd4de0b77729cba35acd6ab559dad

        SHA1

        7ee89792a8e7efe3961417f439ece1d5051a106e

        SHA256

        6c528e4baf911f75d235717225e5c4197ad0178bf731e3702fc3c41edcbd72a0

        SHA512

        6d2bdc67668330d4eac0e7e79e7057b97913215372a14bf3d6db2db5fb3346a2dfaa9719243cf3d3b81cec06187a53fdcb05b3edc146bbb79ff965add7113967

      • \Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

        Filesize

        281KB

        MD5

        d98e33b66343e7c96158444127a117f6

        SHA1

        bb716c5509a2bf345c6c1152f6e3e1452d39d50d

        SHA256

        5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

        SHA512

        705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

      • \Users\Admin\AppData\Local\Temp\csrss\patch.exe

        Filesize

        1.7MB

        MD5

        13aaafe14eb60d6a718230e82c671d57

        SHA1

        e039dd924d12f264521b8e689426fb7ca95a0a7b

        SHA256

        f44a7deb678ae7bbaaadf88e4c620d7cdf7e6831a1656c456545b1c06feb4ef3

        SHA512

        ade02218c0fd1ef9290c3113cf993dd89e87d4fb66fa1b34afdc73c84876123cd742d2a36d8daa95e2a573d2aa7e880f3c8ba0c5c91916ed15e7c4f6ff847de3

      • \Users\Admin\AppData\Local\Temp\dbghelp.dll

        Filesize

        1.5MB

        MD5

        f0616fa8bc54ece07e3107057f74e4db

        SHA1

        b33995c4f9a004b7d806c4bb36040ee844781fca

        SHA256

        6e58fcf4d763022b1f79a3c448eb2ebd8ad1c15df3acf58416893f1cbc699026

        SHA512

        15242e3f5652d7f1d0e31cebadfe2f238ca3222f0e927eb7feb644ab2b3d33132cf2316ee5089324f20f72f1650ad5bb8dd82b96518386ce5b319fb5ceb8313c

      • \Users\Admin\AppData\Local\Temp\nsd3F53.tmp\INetC.dll

        Filesize

        21KB

        MD5

        2b342079303895c50af8040a91f30f71

        SHA1

        b11335e1cb8356d9c337cb89fe81d669a69de17e

        SHA256

        2d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f

        SHA512

        550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47

      • \Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

        Filesize

        3.1MB

        MD5

        6dbb6e81b0c6bb0b6f950feddafeb7ce

        SHA1

        11b75fefa76a6a6d19106b27b02f280cbf7cb2c8

        SHA256

        0e20e6f520b3a485011e0b94b4f740920c20dbf9ede4bb1239517d7d92e4062e

        SHA512

        2988b7da5f189db72f0e92ec3c1ddd7f915bb219ce349ca907aa7c3a3ae46969d0caa10bdc57d55ccd02d857d8612b9255d1490a03370fd8559a2d5e71b18573

      • \Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

        Filesize

        3.8MB

        MD5

        de4c2e8e8ba9155a90947f569b1fd5d0

        SHA1

        17a8d8c5483ce0d5ba3ebc225aa6fa0e50385051

        SHA256

        4c7952a36d8fc3f59b3b5e9a0c263a9d96d106eb6bb5b433ac16f441eeca4130

        SHA512

        549503c00d6678a11df0b6309ccb5a0fe02b6e07092cdc72c309f54303c290171f97dd95b7f50b0cce4f4e3e720042660bfc28ee097e1b5facec8e9d366e36d0

      • \Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

        Filesize

        3.1MB

        MD5

        c5d7807802889c5dab609b284d99960f

        SHA1

        47f17059486d0c08ebe706c1a1800ec24f335d46

        SHA256

        9d1be434374115970b1ecef8abf6c3a73923e2aeb9244ac25b4af4bc7e709bb9

        SHA512

        d19f47f69f87bb68ba971758552dcfe995b0927fcf7e1d69a2ba38a482f567ab5bed3f06844423de85e6868ea3b1f59f551536f2d2ade025b68c0d5974965e2b

      • \Users\Admin\AppData\Local\Temp\symsrv.dll

        Filesize

        163KB

        MD5

        5c399d34d8dc01741269ff1f1aca7554

        SHA1

        e0ceed500d3cef5558f3f55d33ba9c3a709e8f55

        SHA256

        e11e0f7804bfc485b19103a940be3d382f31c1378caca0c63076e27797d7553f

        SHA512

        8ff9d38b22d73c595cc417427b59f5ca8e1fb7b47a2fa6aef25322bf6e614d6b71339a752d779bd736b4c1057239100ac8cc62629fd5d6556785a69bcdc3d73d

      • memory/1640-126-0x0000000140000000-0x00000001405E8000-memory.dmp

        Filesize

        5.9MB

      • memory/1640-113-0x0000000140000000-0x00000001405E8000-memory.dmp

        Filesize

        5.9MB

      • memory/1896-222-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1896-235-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1896-289-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1896-281-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1896-279-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1896-275-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1896-230-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1896-251-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1896-101-0x00000000028B0000-0x0000000002CA8000-memory.dmp

        Filesize

        4.0MB

      • memory/1896-103-0x00000000028B0000-0x0000000002CA8000-memory.dmp

        Filesize

        4.0MB

      • memory/1896-104-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1896-218-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1896-238-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1896-241-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1896-246-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1896-248-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1940-88-0x0000000002650000-0x0000000002A48000-memory.dmp

        Filesize

        4.0MB

      • memory/1940-80-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1940-71-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/1940-70-0x0000000002650000-0x0000000002A48000-memory.dmp

        Filesize

        4.0MB

      • memory/1940-69-0x0000000002650000-0x0000000002A48000-memory.dmp

        Filesize

        4.0MB

      • memory/2216-219-0x0000000000240000-0x0000000000241000-memory.dmp

        Filesize

        4KB

      • memory/2216-68-0x0000000000240000-0x0000000000241000-memory.dmp

        Filesize

        4KB

      • memory/2216-66-0x0000000000400000-0x0000000000930000-memory.dmp

        Filesize

        5.2MB

      • memory/2216-188-0x0000000000400000-0x0000000000930000-memory.dmp

        Filesize

        5.2MB

      • memory/2480-236-0x0000000000400000-0x000000000063B000-memory.dmp

        Filesize

        2.2MB

      • memory/2480-128-0x00000000002D0000-0x00000000003D0000-memory.dmp

        Filesize

        1024KB

      • memory/2480-290-0x0000000000400000-0x000000000063B000-memory.dmp

        Filesize

        2.2MB

      • memory/2480-189-0x0000000061E00000-0x0000000061EF3000-memory.dmp

        Filesize

        972KB

      • memory/2480-255-0x0000000000400000-0x000000000063B000-memory.dmp

        Filesize

        2.2MB

      • memory/2480-276-0x0000000000400000-0x000000000063B000-memory.dmp

        Filesize

        2.2MB

      • memory/2480-220-0x0000000000400000-0x000000000063B000-memory.dmp

        Filesize

        2.2MB

      • memory/2480-47-0x00000000002D0000-0x00000000003D0000-memory.dmp

        Filesize

        1024KB

      • memory/2480-229-0x0000000000400000-0x000000000063B000-memory.dmp

        Filesize

        2.2MB

      • memory/2480-49-0x0000000000400000-0x000000000063B000-memory.dmp

        Filesize

        2.2MB

      • memory/2480-48-0x00000000001C0000-0x00000000001E7000-memory.dmp

        Filesize

        156KB

      • memory/2528-0-0x00000000012B0000-0x000000000189C000-memory.dmp

        Filesize

        5.9MB

      • memory/2528-39-0x0000000074600000-0x0000000074CEE000-memory.dmp

        Filesize

        6.9MB

      • memory/2528-2-0x0000000005370000-0x00000000053B0000-memory.dmp

        Filesize

        256KB

      • memory/2528-1-0x0000000074600000-0x0000000074CEE000-memory.dmp

        Filesize

        6.9MB

      • memory/2556-64-0x0000000000400000-0x0000000000459000-memory.dmp

        Filesize

        356KB

      • memory/2640-44-0x0000000002C60000-0x000000000354B000-memory.dmp

        Filesize

        8.9MB

      • memory/2640-45-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2640-40-0x0000000002860000-0x0000000002C58000-memory.dmp

        Filesize

        4.0MB

      • memory/2640-50-0x0000000002860000-0x0000000002C58000-memory.dmp

        Filesize

        4.0MB

      • memory/2640-67-0x0000000000400000-0x0000000000D1C000-memory.dmp

        Filesize

        9.1MB

      • memory/2804-43-0x000007FEF5830000-0x000007FEF621C000-memory.dmp

        Filesize

        9.9MB

      • memory/2804-38-0x0000000000EF0000-0x0000000000EF8000-memory.dmp

        Filesize

        32KB

      • memory/2804-46-0x000000001AE40000-0x000000001AEC0000-memory.dmp

        Filesize

        512KB

      • memory/2804-127-0x000000001AE40000-0x000000001AEC0000-memory.dmp

        Filesize

        512KB

      • memory/2804-125-0x000007FEF5830000-0x000007FEF621C000-memory.dmp

        Filesize

        9.9MB