Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/09/2022, 20:33

General

  • Target

    file.exe

  • Size

    291KB

  • MD5

    cc4c23d08618b9e1e0fc5fb7612ecb72

  • SHA1

    da58fa6dbb5c9d36aaa13dc133047375c6ce4ad5

  • SHA256

    b0911a9dd3cfaeac8a09d2c1e39735d6fffda0ededce1cf0b4fa0334ded45f6b

  • SHA512

    277455f28d5eaaded7b0a86daae5a8413b95a7fdfbac13bed8686f42b2dd3e69453e0a56d8ca342d09b73a022d6a7faade87302315a8d003046df80a1adb5741

  • SSDEEP

    6144:k6z4LxAOH/SKTarMaDB0o+ZWLnigabwVf:k60NAOH/zTIKoVLi

Malware Config

Extracted

Family

djvu

C2

http://acacaca.org/lancer/get.php

Attributes
  • extension

    .aabn

  • offline_id

    MyudhIExJux2oRQXw95TT1oAPu7mvqRMzxr1eet1

  • payload_url

    http://rgyui.top/dl/build2.exe

    http://acacaca.org/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-4Xcf4IX21n Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0565Jhyjd

rsa_pubkey.plain

Extracted

Family

raccoon

Botnet

7394a7fc5da9794209d8b0503ca4abf4

C2

http://213.252.245.214

rc4.plain

Signatures

  • Detected Djvu ransomware 10 IoCs
  • Detects Smokeloader packer 1 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 9 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4772
  • C:\Users\Admin\AppData\Local\Temp\5498.exe
    C:\Users\Admin\AppData\Local\Temp\5498.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3736
    • C:\Users\Admin\AppData\Local\Temp\5498.exe
      C:\Users\Admin\AppData\Local\Temp\5498.exe
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3924
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\56e2f769-a5b0-4d48-ae30-c5fa3ee94d93" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:2500
      • C:\Users\Admin\AppData\Local\Temp\5498.exe
        "C:\Users\Admin\AppData\Local\Temp\5498.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3396
        • C:\Users\Admin\AppData\Local\Temp\5498.exe
          "C:\Users\Admin\AppData\Local\Temp\5498.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:4068
          • C:\Users\Admin\AppData\Local\44389240-183e-47cc-bd46-ba229d0cfe9c\build2.exe
            "C:\Users\Admin\AppData\Local\44389240-183e-47cc-bd46-ba229d0cfe9c\build2.exe"
            5⤵
            • Executes dropped EXE
            PID:2808
          • C:\Users\Admin\AppData\Local\44389240-183e-47cc-bd46-ba229d0cfe9c\build3.exe
            "C:\Users\Admin\AppData\Local\44389240-183e-47cc-bd46-ba229d0cfe9c\build3.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:728
            • C:\Windows\SysWOW64\schtasks.exe
              /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
              6⤵
              • Creates scheduled task(s)
              PID:760
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\562F.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:684
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\562F.dll
      2⤵
      • Loads dropped DLL
      PID:2848
  • C:\Users\Admin\AppData\Local\Temp\571B.exe
    C:\Users\Admin\AppData\Local\Temp\571B.exe
    1⤵
    • Executes dropped EXE
    PID:3796
  • C:\Users\Admin\AppData\Local\Temp\6F38.exe
    C:\Users\Admin\AppData\Local\Temp\6F38.exe
    1⤵
    • Executes dropped EXE
    PID:4660
  • C:\Windows\SysWOW64\explorer.exe
    C:\Windows\SysWOW64\explorer.exe
    1⤵
    • Accesses Microsoft Outlook profiles
    • outlook_office_path
    • outlook_win_path
    PID:1976
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe
    1⤵
      PID:4428
    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4484
      • C:\Windows\SysWOW64\schtasks.exe
        /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
        2⤵
        • Creates scheduled task(s)
        PID:2252

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

            Filesize

            2KB

            MD5

            ea3ead1b160922fb25b1b9d766a56fa5

            SHA1

            9f61cb0a5a80fa5ba776f71fed4728d002d3aca1

            SHA256

            4080213fba647d43c0ac02710ac7b631c23f8f791930016045cda9aeec1b6867

            SHA512

            ec817bdc668bff4c266ca8b6a6c4068251926714262a95f9ac7f7565e2d66a26371589182d0ba1d03fa482d99430b865cb7eb24becf92b72e45f20b26a215c15

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

            Filesize

            1KB

            MD5

            e9e482bf825221326b7c080ef52e5036

            SHA1

            67244c170dad567630298f89364a5e9626e2517a

            SHA256

            60843d5086f10e833ca98696967f1a39ea04a2ffee6d87679b5803092b9cfa71

            SHA512

            c7a5fd63c0faa2a5cd8be90c7dcf10d8dd564964dc4b8ab4fa1a7a188fa89094563f595c94f4ea133582cfbcf9cc90cb74bd273924b7fa5eadae868bced51440

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

            Filesize

            488B

            MD5

            943d2fd269c183c8b12e0c51ff3b6d26

            SHA1

            a816273d662f4d3673adb48bcd0be5bc7b4736d6

            SHA256

            bc558431a7e299b3d8f6b306ba982917fca3dad0092788b11282d808b5573d94

            SHA512

            865c05577a5aea9531212453ce20f232faab02e414fd156f4ec6d892fa9ee923de6916bbfc8d2dd7ac13422c664059290634b66f74b7084dc852c3d8edeb6ffc

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

            Filesize

            482B

            MD5

            7c0372f25292720bdba829a6eaf2c73c

            SHA1

            5e5ac542049461eca8f21c43ad84491486b2fcab

            SHA256

            08673096721098db7133b9ad1fc91854d21ce6114aa9a418739507c3076add61

            SHA512

            f538fddcf9b9b64e858187f2eebdf0a0ffa0c4600a3bb1875a249ab717790accf127111711a7baaca04a573df4c7c6817deb7033c9717fc9febe7ffc1a02972d

          • C:\Users\Admin\AppData\Local\44389240-183e-47cc-bd46-ba229d0cfe9c\build2.exe

            Filesize

            376KB

            MD5

            8b01bb02b7aeb097ba96dc7628575ca0

            SHA1

            11046fb024f695b1dc7a3a0be9167cb4e85548c6

            SHA256

            7abb4b2423a93fa4b7a2cd19bcc854cc96d2e9ed20c13b86c39f49fe7cb80e4a

            SHA512

            64cd772d4e319255e32909577ac137966cd47bd295aa3a61a76e52d651d80d313a3cfee7ea88d703bb293931a91558161184de2b76f8e5d9a2358a065c5c5f35

          • C:\Users\Admin\AppData\Local\44389240-183e-47cc-bd46-ba229d0cfe9c\build2.exe

            Filesize

            376KB

            MD5

            8b01bb02b7aeb097ba96dc7628575ca0

            SHA1

            11046fb024f695b1dc7a3a0be9167cb4e85548c6

            SHA256

            7abb4b2423a93fa4b7a2cd19bcc854cc96d2e9ed20c13b86c39f49fe7cb80e4a

            SHA512

            64cd772d4e319255e32909577ac137966cd47bd295aa3a61a76e52d651d80d313a3cfee7ea88d703bb293931a91558161184de2b76f8e5d9a2358a065c5c5f35

          • C:\Users\Admin\AppData\Local\44389240-183e-47cc-bd46-ba229d0cfe9c\build3.exe

            Filesize

            9KB

            MD5

            9ead10c08e72ae41921191f8db39bc16

            SHA1

            abe3bce01cd34afc88e2c838173f8c2bd0090ae1

            SHA256

            8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

            SHA512

            aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

          • C:\Users\Admin\AppData\Local\44389240-183e-47cc-bd46-ba229d0cfe9c\build3.exe

            Filesize

            9KB

            MD5

            9ead10c08e72ae41921191f8db39bc16

            SHA1

            abe3bce01cd34afc88e2c838173f8c2bd0090ae1

            SHA256

            8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

            SHA512

            aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

          • C:\Users\Admin\AppData\Local\56e2f769-a5b0-4d48-ae30-c5fa3ee94d93\5498.exe

            Filesize

            810KB

            MD5

            b3b3ce9a828b0618fce1d501772b7e21

            SHA1

            383d07a269563517e61b9196fd6d67eaed570a0d

            SHA256

            d0334afe19a3fa3d839d7f69caa52dc1ff5c8aeaa4b85f5bfb07987f9d502e70

            SHA512

            9a0aa74eae28f1c87a6fec8510fc72e980e1aeb13c7752e271f9edde237cdd7e804b5a3a90cc3d87cf36cc2031707fa97a08dc17303e9f3143f6674f09a5c8bf

          • C:\Users\Admin\AppData\Local\Temp\5498.exe

            Filesize

            810KB

            MD5

            b3b3ce9a828b0618fce1d501772b7e21

            SHA1

            383d07a269563517e61b9196fd6d67eaed570a0d

            SHA256

            d0334afe19a3fa3d839d7f69caa52dc1ff5c8aeaa4b85f5bfb07987f9d502e70

            SHA512

            9a0aa74eae28f1c87a6fec8510fc72e980e1aeb13c7752e271f9edde237cdd7e804b5a3a90cc3d87cf36cc2031707fa97a08dc17303e9f3143f6674f09a5c8bf

          • C:\Users\Admin\AppData\Local\Temp\5498.exe

            Filesize

            810KB

            MD5

            b3b3ce9a828b0618fce1d501772b7e21

            SHA1

            383d07a269563517e61b9196fd6d67eaed570a0d

            SHA256

            d0334afe19a3fa3d839d7f69caa52dc1ff5c8aeaa4b85f5bfb07987f9d502e70

            SHA512

            9a0aa74eae28f1c87a6fec8510fc72e980e1aeb13c7752e271f9edde237cdd7e804b5a3a90cc3d87cf36cc2031707fa97a08dc17303e9f3143f6674f09a5c8bf

          • C:\Users\Admin\AppData\Local\Temp\5498.exe

            Filesize

            810KB

            MD5

            b3b3ce9a828b0618fce1d501772b7e21

            SHA1

            383d07a269563517e61b9196fd6d67eaed570a0d

            SHA256

            d0334afe19a3fa3d839d7f69caa52dc1ff5c8aeaa4b85f5bfb07987f9d502e70

            SHA512

            9a0aa74eae28f1c87a6fec8510fc72e980e1aeb13c7752e271f9edde237cdd7e804b5a3a90cc3d87cf36cc2031707fa97a08dc17303e9f3143f6674f09a5c8bf

          • C:\Users\Admin\AppData\Local\Temp\5498.exe

            Filesize

            810KB

            MD5

            b3b3ce9a828b0618fce1d501772b7e21

            SHA1

            383d07a269563517e61b9196fd6d67eaed570a0d

            SHA256

            d0334afe19a3fa3d839d7f69caa52dc1ff5c8aeaa4b85f5bfb07987f9d502e70

            SHA512

            9a0aa74eae28f1c87a6fec8510fc72e980e1aeb13c7752e271f9edde237cdd7e804b5a3a90cc3d87cf36cc2031707fa97a08dc17303e9f3143f6674f09a5c8bf

          • C:\Users\Admin\AppData\Local\Temp\5498.exe

            Filesize

            810KB

            MD5

            b3b3ce9a828b0618fce1d501772b7e21

            SHA1

            383d07a269563517e61b9196fd6d67eaed570a0d

            SHA256

            d0334afe19a3fa3d839d7f69caa52dc1ff5c8aeaa4b85f5bfb07987f9d502e70

            SHA512

            9a0aa74eae28f1c87a6fec8510fc72e980e1aeb13c7752e271f9edde237cdd7e804b5a3a90cc3d87cf36cc2031707fa97a08dc17303e9f3143f6674f09a5c8bf

          • C:\Users\Admin\AppData\Local\Temp\562F.dll

            Filesize

            1.5MB

            MD5

            d6a47227f94329ef24299d3b44b07c76

            SHA1

            24238a7ce13d16bf8e7194f21609462e04cabdba

            SHA256

            fd4d29413f205910926eef85398b17f51bb1af975b740ab1093376fb09df07e1

            SHA512

            855a109d6f4316f9922dd6c8ba25199210f0f237af8500399ef969439c659e4ee1959dedbe2e743baa99e653fdefe101194a5d9e730495909d66a9047f50831f

          • C:\Users\Admin\AppData\Local\Temp\562F.dll

            Filesize

            1.5MB

            MD5

            d6a47227f94329ef24299d3b44b07c76

            SHA1

            24238a7ce13d16bf8e7194f21609462e04cabdba

            SHA256

            fd4d29413f205910926eef85398b17f51bb1af975b740ab1093376fb09df07e1

            SHA512

            855a109d6f4316f9922dd6c8ba25199210f0f237af8500399ef969439c659e4ee1959dedbe2e743baa99e653fdefe101194a5d9e730495909d66a9047f50831f

          • C:\Users\Admin\AppData\Local\Temp\562F.dll

            Filesize

            1.5MB

            MD5

            d6a47227f94329ef24299d3b44b07c76

            SHA1

            24238a7ce13d16bf8e7194f21609462e04cabdba

            SHA256

            fd4d29413f205910926eef85398b17f51bb1af975b740ab1093376fb09df07e1

            SHA512

            855a109d6f4316f9922dd6c8ba25199210f0f237af8500399ef969439c659e4ee1959dedbe2e743baa99e653fdefe101194a5d9e730495909d66a9047f50831f

          • C:\Users\Admin\AppData\Local\Temp\571B.exe

            Filesize

            388KB

            MD5

            2c9ba61967ebae81290477ae4e17a428

            SHA1

            6abc911f746e90e5cc56d526df8d3e71076156f7

            SHA256

            3dd85136dc7ace7d4c7f38f91bacc3489c65ebfb20d945eb9f1702343f8e4eec

            SHA512

            efd11abf6266ce1c487d6ce1ac6c1762223103975e822091faac42c8e860b89c9125985429b8ed96122be919e51888b35bbaff031a27a57ae9312bb3c386cb4b

          • C:\Users\Admin\AppData\Local\Temp\571B.exe

            Filesize

            388KB

            MD5

            2c9ba61967ebae81290477ae4e17a428

            SHA1

            6abc911f746e90e5cc56d526df8d3e71076156f7

            SHA256

            3dd85136dc7ace7d4c7f38f91bacc3489c65ebfb20d945eb9f1702343f8e4eec

            SHA512

            efd11abf6266ce1c487d6ce1ac6c1762223103975e822091faac42c8e860b89c9125985429b8ed96122be919e51888b35bbaff031a27a57ae9312bb3c386cb4b

          • C:\Users\Admin\AppData\Local\Temp\6F38.exe

            Filesize

            4.8MB

            MD5

            428da7a5f75ea1f5806f3c120e5d0800

            SHA1

            6494c05df07f73668f8245aaaa6606e58848ab02

            SHA256

            782c7ce28b3d6430b99b22c93f01dc33221e570871cc6b51f298fbcc6855036a

            SHA512

            100814a91dcc4aeaa59840797869b4fd194f7ea5def2480a853aa217261a128ba99b9f632fce7108345f83d08154249e99f400e1616f3886ddb527e5ffbe6d7c

          • C:\Users\Admin\AppData\Local\Temp\6F38.exe

            Filesize

            4.8MB

            MD5

            428da7a5f75ea1f5806f3c120e5d0800

            SHA1

            6494c05df07f73668f8245aaaa6606e58848ab02

            SHA256

            782c7ce28b3d6430b99b22c93f01dc33221e570871cc6b51f298fbcc6855036a

            SHA512

            100814a91dcc4aeaa59840797869b4fd194f7ea5def2480a853aa217261a128ba99b9f632fce7108345f83d08154249e99f400e1616f3886ddb527e5ffbe6d7c

          • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

            Filesize

            9KB

            MD5

            9ead10c08e72ae41921191f8db39bc16

            SHA1

            abe3bce01cd34afc88e2c838173f8c2bd0090ae1

            SHA256

            8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

            SHA512

            aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

          • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

            Filesize

            9KB

            MD5

            9ead10c08e72ae41921191f8db39bc16

            SHA1

            abe3bce01cd34afc88e2c838173f8c2bd0090ae1

            SHA256

            8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

            SHA512

            aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

          • memory/1976-164-0x0000000001190000-0x0000000001205000-memory.dmp

            Filesize

            468KB

          • memory/1976-171-0x0000000001120000-0x000000000118B000-memory.dmp

            Filesize

            428KB

          • memory/1976-165-0x0000000001120000-0x000000000118B000-memory.dmp

            Filesize

            428KB

          • memory/2848-151-0x0000000002460000-0x00000000025C8000-memory.dmp

            Filesize

            1.4MB

          • memory/2848-152-0x00000000026F0000-0x0000000002806000-memory.dmp

            Filesize

            1.1MB

          • memory/2848-167-0x0000000002810000-0x00000000028CF000-memory.dmp

            Filesize

            764KB

          • memory/2848-168-0x00000000028D0000-0x0000000002979000-memory.dmp

            Filesize

            676KB

          • memory/2848-169-0x00000000028D0000-0x0000000002979000-memory.dmp

            Filesize

            676KB

          • memory/2848-147-0x0000000002040000-0x00000000021C7000-memory.dmp

            Filesize

            1.5MB

          • memory/2848-173-0x00000000026F0000-0x0000000002806000-memory.dmp

            Filesize

            1.1MB

          • memory/3396-182-0x0000000002046000-0x00000000020D7000-memory.dmp

            Filesize

            580KB

          • memory/3736-155-0x0000000002250000-0x000000000236B000-memory.dmp

            Filesize

            1.1MB

          • memory/3736-154-0x0000000000610000-0x00000000006A1000-memory.dmp

            Filesize

            580KB

          • memory/3924-166-0x0000000000400000-0x0000000000537000-memory.dmp

            Filesize

            1.2MB

          • memory/3924-177-0x0000000000400000-0x0000000000537000-memory.dmp

            Filesize

            1.2MB

          • memory/3924-160-0x0000000000400000-0x0000000000537000-memory.dmp

            Filesize

            1.2MB

          • memory/3924-161-0x0000000000400000-0x0000000000537000-memory.dmp

            Filesize

            1.2MB

          • memory/3924-158-0x0000000000400000-0x0000000000537000-memory.dmp

            Filesize

            1.2MB

          • memory/4068-183-0x0000000000400000-0x0000000000537000-memory.dmp

            Filesize

            1.2MB

          • memory/4068-202-0x0000000000400000-0x0000000000537000-memory.dmp

            Filesize

            1.2MB

          • memory/4068-181-0x0000000000400000-0x0000000000537000-memory.dmp

            Filesize

            1.2MB

          • memory/4068-184-0x0000000000400000-0x0000000000537000-memory.dmp

            Filesize

            1.2MB

          • memory/4428-163-0x00000000005C0000-0x00000000005CC000-memory.dmp

            Filesize

            48KB

          • memory/4428-162-0x00000000005D0000-0x00000000005D7000-memory.dmp

            Filesize

            28KB

          • memory/4660-189-0x0000000000BB0000-0x0000000000BC4000-memory.dmp

            Filesize

            80KB

          • memory/4772-135-0x0000000000400000-0x000000000044E000-memory.dmp

            Filesize

            312KB

          • memory/4772-132-0x000000000063D000-0x000000000064E000-memory.dmp

            Filesize

            68KB

          • memory/4772-134-0x0000000000400000-0x000000000044E000-memory.dmp

            Filesize

            312KB

          • memory/4772-133-0x00000000005E0000-0x00000000005E9000-memory.dmp

            Filesize

            36KB