Analysis

  • max time kernel
    299s
  • max time network
    295s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2024 22:22

General

  • Target

    20212369495ea37faaa0fd8cdc03cd56b6df8db3124eda49d158a0e6c7109085.exe

  • Size

    4.2MB

  • MD5

    ff1a34dc4633f8363b0421d24ecb13e1

  • SHA1

    86f131c3358df3b0e9cbeac22849e8372b8f3c05

  • SHA256

    20212369495ea37faaa0fd8cdc03cd56b6df8db3124eda49d158a0e6c7109085

  • SHA512

    c6ed9dc23244b3baeb30c3d6f659058eee60dac9496b6477ebc89dfbec837ed6c1d9221488b1335997ad7d4fccd99f6ce61a88661e6d63e49f5980c0b2895ae9

  • SSDEEP

    98304:Jv0T1XT8Tbl9EdJLPOp4i7E1Yl4G/M6pSEC/z40cZX:doBQTbl9ETLOp1p4G/lSEMz4p

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 37 IoCs
  • Windows security bypass 2 TTPs 7 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 7 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\20212369495ea37faaa0fd8cdc03cd56b6df8db3124eda49d158a0e6c7109085.exe
    "C:\Users\Admin\AppData\Local\Temp\20212369495ea37faaa0fd8cdc03cd56b6df8db3124eda49d158a0e6c7109085.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3076
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:596
    • C:\Users\Admin\AppData\Local\Temp\20212369495ea37faaa0fd8cdc03cd56b6df8db3124eda49d158a0e6c7109085.exe
      "C:\Users\Admin\AppData\Local\Temp\20212369495ea37faaa0fd8cdc03cd56b6df8db3124eda49d158a0e6c7109085.exe"
      2⤵
      • Windows security bypass
      • Windows security modification
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4136
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1688
      • C:\Windows\System32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4728
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:2328
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:600
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4732
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Manipulates WinMonFS driver.
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5112
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2288
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:3760
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:1940
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3504
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2292
          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:3996
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            4⤵
            • Creates scheduled task(s)
            PID:4792
          • C:\Windows\windefender.exe
            "C:\Windows\windefender.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3440
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1708
              • C:\Windows\SysWOW64\sc.exe
                sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                6⤵
                • Launches sc.exe
                • Suspicious use of AdjustPrivilegeToken
                PID:1904
    • C:\Windows\system32\DllHost.exe
      C:\Windows\system32\DllHost.exe /Processid:{E10F6C3A-F1AE-4ADC-AA9D-2FE65525666E}
      1⤵
        PID:600
      • C:\Windows\windefender.exe
        C:\Windows\windefender.exe
        1⤵
        • Executes dropped EXE
        • Modifies data under HKEY_USERS
        PID:2504

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_st32vqlg.ekw.ps1

        Filesize

        1B

        MD5

        c4ca4238a0b923820dcc509a6f75849b

        SHA1

        356a192b7913b04c54574d18c28d46e6395428ab

        SHA256

        6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

        SHA512

        4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

      • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

        Filesize

        281KB

        MD5

        d98e33b66343e7c96158444127a117f6

        SHA1

        bb716c5509a2bf345c6c1152f6e3e1452d39d50d

        SHA256

        5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

        SHA512

        705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        1c19c16e21c97ed42d5beabc93391fc5

        SHA1

        8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

        SHA256

        1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

        SHA512

        7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        18KB

        MD5

        8a769353c4a5bcd3f1148e5f430c75e3

        SHA1

        7c35100780b9f8166cf1dd014bfe5b76c7e83f3c

        SHA256

        d0961cdc9b8e934014df4d45ee45e7bf11f043450d2d1fb29571bbb6e9e96296

        SHA512

        375b247033a20b2d92ef52e2030fdda3b211e33af2241abd80b7507f69faf600f99261cff1c64d36c98a218b4f86f679cbc3b7885461be3d314c4b184db7faa3

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        18KB

        MD5

        6f946c7bc2a4b8439d4f9309c00bb1ac

        SHA1

        063c7fcf6fe5425e51542907725600daf5f79656

        SHA256

        38eff1d92474d7d8e0b9b56c02b13ad463c1a3c221e8473bb792561a1b9efb4e

        SHA512

        817287d034c82c7899b4b1063cd9bfe3e2c41f93e070f21fa6503f58aaf48646e063362a84b170c0826bc236e63ccdf98b17ca453f9aacae010b1e11c3a0af9b

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        18KB

        MD5

        c502eb662958b61f4f6b53969558463b

        SHA1

        298e6137a6987998eaef1872a1ebe592ff3b4b58

        SHA256

        626daccd61ca288a39c89a5c5371d5380e59d5b89db48d0f2015f4de4d161c2e

        SHA512

        b2c40862883c662cf5956d0474138d6669dbaa7ca7918e15810c7af88c1c8c91365094987816cd5f5636bfe1cd0fef1b67287a1e7509be618286422281664a54

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        18KB

        MD5

        3516ea0eb4ae4e627e6540730c03d8de

        SHA1

        b6df264e6d83bba97daa66ff4b68940510181bcb

        SHA256

        45b0335b5f41ecbb99dc272ab4fc5dddddb2307632b727906a55229f749a0040

        SHA512

        917d22408862bc810cab3b3dd8b93c0096551e688d367db37dfa638d37634de70055fa557c1d0d04f2ffbc3c23d68cb936011d7b7b23e0b80fe3895903255da4

      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

        Filesize

        18KB

        MD5

        54ce3df0d0bc76e06e6409613a06fa2f

        SHA1

        13846a46f3d7b1aa59250f2d6dc2860966f80456

        SHA256

        a84f90f65719db5ed9a3befed853cc4f4e023b2cad75f56342b836566bb2af8c

        SHA512

        9260f9521173db344c21a8cb2420fea5693de83fc86da63759f3a3ce786e3eea26ba01637a2489e9b536387eebc343e5666171d8c2945efb778beeb42ce5c6a6

      • C:\Windows\rss\csrss.exe

        Filesize

        4.2MB

        MD5

        ff1a34dc4633f8363b0421d24ecb13e1

        SHA1

        86f131c3358df3b0e9cbeac22849e8372b8f3c05

        SHA256

        20212369495ea37faaa0fd8cdc03cd56b6df8db3124eda49d158a0e6c7109085

        SHA512

        c6ed9dc23244b3baeb30c3d6f659058eee60dac9496b6477ebc89dfbec837ed6c1d9221488b1335997ad7d4fccd99f6ce61a88661e6d63e49f5980c0b2895ae9

      • C:\Windows\windefender.exe

        Filesize

        2.0MB

        MD5

        8e67f58837092385dcf01e8a2b4f5783

        SHA1

        012c49cfd8c5d06795a6f67ea2baf2a082cf8625

        SHA256

        166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

        SHA512

        40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

      • memory/596-73-0x0000000070360000-0x00000000703AB000-memory.dmp

        Filesize

        300KB

      • memory/596-81-0x0000000004C40000-0x0000000004C50000-memory.dmp

        Filesize

        64KB

      • memory/596-15-0x00000000086D0000-0x000000000871B000-memory.dmp

        Filesize

        300KB

      • memory/596-13-0x0000000007CE0000-0x0000000008030000-memory.dmp

        Filesize

        3.3MB

      • memory/596-34-0x00000000091D0000-0x000000000920C000-memory.dmp

        Filesize

        240KB

      • memory/596-65-0x0000000009290000-0x0000000009306000-memory.dmp

        Filesize

        472KB

      • memory/596-10-0x00000000079B0000-0x00000000079D2000-memory.dmp

        Filesize

        136KB

      • memory/596-80-0x000000000A0F0000-0x000000000A195000-memory.dmp

        Filesize

        660KB

      • memory/596-75-0x000000000A090000-0x000000000A0AE000-memory.dmp

        Filesize

        120KB

      • memory/596-74-0x00000000703B0000-0x0000000070700000-memory.dmp

        Filesize

        3.3MB

      • memory/596-82-0x000000000A310000-0x000000000A3A4000-memory.dmp

        Filesize

        592KB

      • memory/596-14-0x0000000008110000-0x000000000812C000-memory.dmp

        Filesize

        112KB

      • memory/596-72-0x000000000A0B0000-0x000000000A0E3000-memory.dmp

        Filesize

        204KB

      • memory/596-280-0x000000000A250000-0x000000000A258000-memory.dmp

        Filesize

        32KB

      • memory/596-275-0x000000000A270000-0x000000000A28A000-memory.dmp

        Filesize

        104KB

      • memory/596-298-0x0000000073650000-0x0000000073D3E000-memory.dmp

        Filesize

        6.9MB

      • memory/596-12-0x0000000007BC0000-0x0000000007C26000-memory.dmp

        Filesize

        408KB

      • memory/596-11-0x0000000007A50000-0x0000000007AB6000-memory.dmp

        Filesize

        408KB

      • memory/596-9-0x0000000007340000-0x0000000007968000-memory.dmp

        Filesize

        6.2MB

      • memory/596-7-0x0000000073650000-0x0000000073D3E000-memory.dmp

        Filesize

        6.9MB

      • memory/596-8-0x0000000004C40000-0x0000000004C50000-memory.dmp

        Filesize

        64KB

      • memory/596-6-0x0000000004C90000-0x0000000004CC6000-memory.dmp

        Filesize

        216KB

      • memory/600-580-0x0000000004B90000-0x0000000004BA0000-memory.dmp

        Filesize

        64KB

      • memory/600-552-0x0000000004B90000-0x0000000004BA0000-memory.dmp

        Filesize

        64KB

      • memory/600-793-0x0000000073750000-0x0000000073E3E000-memory.dmp

        Filesize

        6.9MB

      • memory/600-574-0x00000000704D0000-0x0000000070820000-memory.dmp

        Filesize

        3.3MB

      • memory/600-573-0x0000000070480000-0x00000000704CB000-memory.dmp

        Filesize

        300KB

      • memory/600-572-0x000000007EFB0000-0x000000007EFC0000-memory.dmp

        Filesize

        64KB

      • memory/600-550-0x0000000073750000-0x0000000073E3E000-memory.dmp

        Filesize

        6.9MB

      • memory/600-551-0x0000000004B90000-0x0000000004BA0000-memory.dmp

        Filesize

        64KB

      • memory/1688-307-0x0000000007370000-0x0000000007380000-memory.dmp

        Filesize

        64KB

      • memory/1688-335-0x0000000009A70000-0x0000000009B15000-memory.dmp

        Filesize

        660KB

      • memory/1688-546-0x0000000073750000-0x0000000073E3E000-memory.dmp

        Filesize

        6.9MB

      • memory/1688-308-0x0000000007370000-0x0000000007380000-memory.dmp

        Filesize

        64KB

      • memory/1688-336-0x0000000007370000-0x0000000007380000-memory.dmp

        Filesize

        64KB

      • memory/1688-329-0x0000000070480000-0x00000000704CB000-memory.dmp

        Filesize

        300KB

      • memory/1688-330-0x00000000704D0000-0x0000000070820000-memory.dmp

        Filesize

        3.3MB

      • memory/1688-310-0x00000000085B0000-0x00000000085FB000-memory.dmp

        Filesize

        300KB

      • memory/1688-309-0x00000000080E0000-0x0000000008430000-memory.dmp

        Filesize

        3.3MB

      • memory/1688-306-0x0000000073750000-0x0000000073E3E000-memory.dmp

        Filesize

        6.9MB

      • memory/2288-1050-0x00000000736B0000-0x0000000073D9E000-memory.dmp

        Filesize

        6.9MB

      • memory/2288-1052-0x0000000006AD0000-0x0000000006AE0000-memory.dmp

        Filesize

        64KB

      • memory/2288-1053-0x0000000006AD0000-0x0000000006AE0000-memory.dmp

        Filesize

        64KB

      • memory/2288-1055-0x00000000083E0000-0x000000000842B000-memory.dmp

        Filesize

        300KB

      • memory/2288-1051-0x00000000078B0000-0x0000000007C00000-memory.dmp

        Filesize

        3.3MB

      • memory/2288-1074-0x00000000703E0000-0x000000007042B000-memory.dmp

        Filesize

        300KB

      • memory/2504-1802-0x0000000000400000-0x00000000008DF000-memory.dmp

        Filesize

        4.9MB

      • memory/2504-1808-0x0000000000400000-0x00000000008DF000-memory.dmp

        Filesize

        4.9MB

      • memory/3076-299-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/3076-301-0x0000000002FB0000-0x000000000389B000-memory.dmp

        Filesize

        8.9MB

      • memory/3076-3-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/3076-1-0x0000000002BA0000-0x0000000002FA7000-memory.dmp

        Filesize

        4.0MB

      • memory/3076-2-0x0000000002FB0000-0x000000000389B000-memory.dmp

        Filesize

        8.9MB

      • memory/3440-1795-0x0000000000400000-0x00000000008DF000-memory.dmp

        Filesize

        4.9MB

      • memory/4136-800-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/4136-302-0x0000000002C30000-0x000000000302F000-memory.dmp

        Filesize

        4.0MB

      • memory/4136-303-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/4136-1042-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/4136-579-0x0000000002C30000-0x000000000302F000-memory.dmp

        Filesize

        4.0MB

      • memory/4732-796-0x0000000073750000-0x0000000073E3E000-memory.dmp

        Filesize

        6.9MB

      • memory/4732-1038-0x0000000073750000-0x0000000073E3E000-memory.dmp

        Filesize

        6.9MB

      • memory/4732-825-0x00000000049C0000-0x00000000049D0000-memory.dmp

        Filesize

        64KB

      • memory/4732-819-0x0000000070480000-0x00000000704CB000-memory.dmp

        Filesize

        300KB

      • memory/4732-820-0x00000000704D0000-0x0000000070820000-memory.dmp

        Filesize

        3.3MB

      • memory/4732-798-0x00000000049C0000-0x00000000049D0000-memory.dmp

        Filesize

        64KB

      • memory/4732-797-0x00000000049C0000-0x00000000049D0000-memory.dmp

        Filesize

        64KB

      • memory/5112-1787-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5112-1819-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5112-1796-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5112-1799-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5112-1801-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5112-1046-0x0000000003600000-0x0000000003EEB000-memory.dmp

        Filesize

        8.9MB

      • memory/5112-1803-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5112-1805-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5112-1807-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5112-1047-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5112-1809-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5112-1811-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5112-1813-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5112-1815-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5112-1817-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5112-1045-0x0000000003200000-0x00000000035F9000-memory.dmp

        Filesize

        4.0MB

      • memory/5112-1821-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5112-1823-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5112-1825-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5112-1827-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5112-1829-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5112-1831-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5112-1833-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5112-1835-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5112-1837-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5112-1839-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5112-1841-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5112-1843-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5112-1845-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5112-1847-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB

      • memory/5112-1849-0x0000000000400000-0x0000000000EDA000-memory.dmp

        Filesize

        10.9MB