Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/09/2022, 20:33

General

  • Target

    file.exe

  • Size

    291KB

  • MD5

    cc4c23d08618b9e1e0fc5fb7612ecb72

  • SHA1

    da58fa6dbb5c9d36aaa13dc133047375c6ce4ad5

  • SHA256

    b0911a9dd3cfaeac8a09d2c1e39735d6fffda0ededce1cf0b4fa0334ded45f6b

  • SHA512

    277455f28d5eaaded7b0a86daae5a8413b95a7fdfbac13bed8686f42b2dd3e69453e0a56d8ca342d09b73a022d6a7faade87302315a8d003046df80a1adb5741

  • SSDEEP

    6144:k6z4LxAOH/SKTarMaDB0o+ZWLnigabwVf:k60NAOH/zTIKoVLi

Malware Config

Extracted

Family

djvu

C2

http://acacaca.org/lancer/get.php

Attributes
  • extension

    .aabn

  • offline_id

    MyudhIExJux2oRQXw95TT1oAPu7mvqRMzxr1eet1

  • payload_url

    http://rgyui.top/dl/build2.exe

    http://acacaca.org/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-4Xcf4IX21n Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0565Jhyjd

rsa_pubkey.plain

Extracted

Family

raccoon

Botnet

7394a7fc5da9794209d8b0503ca4abf4

C2

http://213.252.245.214

rc4.plain

Signatures

  • Detected Djvu ransomware 10 IoCs
  • Detects Smokeloader packer 1 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 9 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4772
  • C:\Users\Admin\AppData\Local\Temp\5498.exe
    C:\Users\Admin\AppData\Local\Temp\5498.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3736
    • C:\Users\Admin\AppData\Local\Temp\5498.exe
      C:\Users\Admin\AppData\Local\Temp\5498.exe
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3924
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\56e2f769-a5b0-4d48-ae30-c5fa3ee94d93" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:2500
      • C:\Users\Admin\AppData\Local\Temp\5498.exe
        "C:\Users\Admin\AppData\Local\Temp\5498.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3396
        • C:\Users\Admin\AppData\Local\Temp\5498.exe
          "C:\Users\Admin\AppData\Local\Temp\5498.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:4068
          • C:\Users\Admin\AppData\Local\44389240-183e-47cc-bd46-ba229d0cfe9c\build2.exe
            "C:\Users\Admin\AppData\Local\44389240-183e-47cc-bd46-ba229d0cfe9c\build2.exe"
            5⤵
            • Executes dropped EXE
            PID:2808
          • C:\Users\Admin\AppData\Local\44389240-183e-47cc-bd46-ba229d0cfe9c\build3.exe
            "C:\Users\Admin\AppData\Local\44389240-183e-47cc-bd46-ba229d0cfe9c\build3.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:728
            • C:\Windows\SysWOW64\schtasks.exe
              /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
              6⤵
              • Creates scheduled task(s)
              PID:760
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\562F.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:684
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\562F.dll
      2⤵
      • Loads dropped DLL
      PID:2848
  • C:\Users\Admin\AppData\Local\Temp\571B.exe
    C:\Users\Admin\AppData\Local\Temp\571B.exe
    1⤵
    • Executes dropped EXE
    PID:3796
  • C:\Users\Admin\AppData\Local\Temp\6F38.exe
    C:\Users\Admin\AppData\Local\Temp\6F38.exe
    1⤵
    • Executes dropped EXE
    PID:4660
  • C:\Windows\SysWOW64\explorer.exe
    C:\Windows\SysWOW64\explorer.exe
    1⤵
    • Accesses Microsoft Outlook profiles
    • outlook_office_path
    • outlook_win_path
    PID:1976
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe
    1⤵
      PID:4428
    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4484
      • C:\Windows\SysWOW64\schtasks.exe
        /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
        2⤵
        • Creates scheduled task(s)
        PID:2252

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

      Filesize

      2KB

      MD5

      ea3ead1b160922fb25b1b9d766a56fa5

      SHA1

      9f61cb0a5a80fa5ba776f71fed4728d002d3aca1

      SHA256

      4080213fba647d43c0ac02710ac7b631c23f8f791930016045cda9aeec1b6867

      SHA512

      ec817bdc668bff4c266ca8b6a6c4068251926714262a95f9ac7f7565e2d66a26371589182d0ba1d03fa482d99430b865cb7eb24becf92b72e45f20b26a215c15

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

      Filesize

      1KB

      MD5

      e9e482bf825221326b7c080ef52e5036

      SHA1

      67244c170dad567630298f89364a5e9626e2517a

      SHA256

      60843d5086f10e833ca98696967f1a39ea04a2ffee6d87679b5803092b9cfa71

      SHA512

      c7a5fd63c0faa2a5cd8be90c7dcf10d8dd564964dc4b8ab4fa1a7a188fa89094563f595c94f4ea133582cfbcf9cc90cb74bd273924b7fa5eadae868bced51440

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

      Filesize

      488B

      MD5

      943d2fd269c183c8b12e0c51ff3b6d26

      SHA1

      a816273d662f4d3673adb48bcd0be5bc7b4736d6

      SHA256

      bc558431a7e299b3d8f6b306ba982917fca3dad0092788b11282d808b5573d94

      SHA512

      865c05577a5aea9531212453ce20f232faab02e414fd156f4ec6d892fa9ee923de6916bbfc8d2dd7ac13422c664059290634b66f74b7084dc852c3d8edeb6ffc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

      Filesize

      482B

      MD5

      7c0372f25292720bdba829a6eaf2c73c

      SHA1

      5e5ac542049461eca8f21c43ad84491486b2fcab

      SHA256

      08673096721098db7133b9ad1fc91854d21ce6114aa9a418739507c3076add61

      SHA512

      f538fddcf9b9b64e858187f2eebdf0a0ffa0c4600a3bb1875a249ab717790accf127111711a7baaca04a573df4c7c6817deb7033c9717fc9febe7ffc1a02972d

    • C:\Users\Admin\AppData\Local\44389240-183e-47cc-bd46-ba229d0cfe9c\build2.exe

      Filesize

      376KB

      MD5

      8b01bb02b7aeb097ba96dc7628575ca0

      SHA1

      11046fb024f695b1dc7a3a0be9167cb4e85548c6

      SHA256

      7abb4b2423a93fa4b7a2cd19bcc854cc96d2e9ed20c13b86c39f49fe7cb80e4a

      SHA512

      64cd772d4e319255e32909577ac137966cd47bd295aa3a61a76e52d651d80d313a3cfee7ea88d703bb293931a91558161184de2b76f8e5d9a2358a065c5c5f35

    • C:\Users\Admin\AppData\Local\44389240-183e-47cc-bd46-ba229d0cfe9c\build2.exe

      Filesize

      376KB

      MD5

      8b01bb02b7aeb097ba96dc7628575ca0

      SHA1

      11046fb024f695b1dc7a3a0be9167cb4e85548c6

      SHA256

      7abb4b2423a93fa4b7a2cd19bcc854cc96d2e9ed20c13b86c39f49fe7cb80e4a

      SHA512

      64cd772d4e319255e32909577ac137966cd47bd295aa3a61a76e52d651d80d313a3cfee7ea88d703bb293931a91558161184de2b76f8e5d9a2358a065c5c5f35

    • C:\Users\Admin\AppData\Local\44389240-183e-47cc-bd46-ba229d0cfe9c\build3.exe

      Filesize

      9KB

      MD5

      9ead10c08e72ae41921191f8db39bc16

      SHA1

      abe3bce01cd34afc88e2c838173f8c2bd0090ae1

      SHA256

      8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

      SHA512

      aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

    • C:\Users\Admin\AppData\Local\44389240-183e-47cc-bd46-ba229d0cfe9c\build3.exe

      Filesize

      9KB

      MD5

      9ead10c08e72ae41921191f8db39bc16

      SHA1

      abe3bce01cd34afc88e2c838173f8c2bd0090ae1

      SHA256

      8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

      SHA512

      aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

    • C:\Users\Admin\AppData\Local\56e2f769-a5b0-4d48-ae30-c5fa3ee94d93\5498.exe

      Filesize

      810KB

      MD5

      b3b3ce9a828b0618fce1d501772b7e21

      SHA1

      383d07a269563517e61b9196fd6d67eaed570a0d

      SHA256

      d0334afe19a3fa3d839d7f69caa52dc1ff5c8aeaa4b85f5bfb07987f9d502e70

      SHA512

      9a0aa74eae28f1c87a6fec8510fc72e980e1aeb13c7752e271f9edde237cdd7e804b5a3a90cc3d87cf36cc2031707fa97a08dc17303e9f3143f6674f09a5c8bf

    • C:\Users\Admin\AppData\Local\Temp\5498.exe

      Filesize

      810KB

      MD5

      b3b3ce9a828b0618fce1d501772b7e21

      SHA1

      383d07a269563517e61b9196fd6d67eaed570a0d

      SHA256

      d0334afe19a3fa3d839d7f69caa52dc1ff5c8aeaa4b85f5bfb07987f9d502e70

      SHA512

      9a0aa74eae28f1c87a6fec8510fc72e980e1aeb13c7752e271f9edde237cdd7e804b5a3a90cc3d87cf36cc2031707fa97a08dc17303e9f3143f6674f09a5c8bf

    • C:\Users\Admin\AppData\Local\Temp\5498.exe

      Filesize

      810KB

      MD5

      b3b3ce9a828b0618fce1d501772b7e21

      SHA1

      383d07a269563517e61b9196fd6d67eaed570a0d

      SHA256

      d0334afe19a3fa3d839d7f69caa52dc1ff5c8aeaa4b85f5bfb07987f9d502e70

      SHA512

      9a0aa74eae28f1c87a6fec8510fc72e980e1aeb13c7752e271f9edde237cdd7e804b5a3a90cc3d87cf36cc2031707fa97a08dc17303e9f3143f6674f09a5c8bf

    • C:\Users\Admin\AppData\Local\Temp\5498.exe

      Filesize

      810KB

      MD5

      b3b3ce9a828b0618fce1d501772b7e21

      SHA1

      383d07a269563517e61b9196fd6d67eaed570a0d

      SHA256

      d0334afe19a3fa3d839d7f69caa52dc1ff5c8aeaa4b85f5bfb07987f9d502e70

      SHA512

      9a0aa74eae28f1c87a6fec8510fc72e980e1aeb13c7752e271f9edde237cdd7e804b5a3a90cc3d87cf36cc2031707fa97a08dc17303e9f3143f6674f09a5c8bf

    • C:\Users\Admin\AppData\Local\Temp\5498.exe

      Filesize

      810KB

      MD5

      b3b3ce9a828b0618fce1d501772b7e21

      SHA1

      383d07a269563517e61b9196fd6d67eaed570a0d

      SHA256

      d0334afe19a3fa3d839d7f69caa52dc1ff5c8aeaa4b85f5bfb07987f9d502e70

      SHA512

      9a0aa74eae28f1c87a6fec8510fc72e980e1aeb13c7752e271f9edde237cdd7e804b5a3a90cc3d87cf36cc2031707fa97a08dc17303e9f3143f6674f09a5c8bf

    • C:\Users\Admin\AppData\Local\Temp\5498.exe

      Filesize

      810KB

      MD5

      b3b3ce9a828b0618fce1d501772b7e21

      SHA1

      383d07a269563517e61b9196fd6d67eaed570a0d

      SHA256

      d0334afe19a3fa3d839d7f69caa52dc1ff5c8aeaa4b85f5bfb07987f9d502e70

      SHA512

      9a0aa74eae28f1c87a6fec8510fc72e980e1aeb13c7752e271f9edde237cdd7e804b5a3a90cc3d87cf36cc2031707fa97a08dc17303e9f3143f6674f09a5c8bf

    • C:\Users\Admin\AppData\Local\Temp\562F.dll

      Filesize

      1.5MB

      MD5

      d6a47227f94329ef24299d3b44b07c76

      SHA1

      24238a7ce13d16bf8e7194f21609462e04cabdba

      SHA256

      fd4d29413f205910926eef85398b17f51bb1af975b740ab1093376fb09df07e1

      SHA512

      855a109d6f4316f9922dd6c8ba25199210f0f237af8500399ef969439c659e4ee1959dedbe2e743baa99e653fdefe101194a5d9e730495909d66a9047f50831f

    • C:\Users\Admin\AppData\Local\Temp\562F.dll

      Filesize

      1.5MB

      MD5

      d6a47227f94329ef24299d3b44b07c76

      SHA1

      24238a7ce13d16bf8e7194f21609462e04cabdba

      SHA256

      fd4d29413f205910926eef85398b17f51bb1af975b740ab1093376fb09df07e1

      SHA512

      855a109d6f4316f9922dd6c8ba25199210f0f237af8500399ef969439c659e4ee1959dedbe2e743baa99e653fdefe101194a5d9e730495909d66a9047f50831f

    • C:\Users\Admin\AppData\Local\Temp\562F.dll

      Filesize

      1.5MB

      MD5

      d6a47227f94329ef24299d3b44b07c76

      SHA1

      24238a7ce13d16bf8e7194f21609462e04cabdba

      SHA256

      fd4d29413f205910926eef85398b17f51bb1af975b740ab1093376fb09df07e1

      SHA512

      855a109d6f4316f9922dd6c8ba25199210f0f237af8500399ef969439c659e4ee1959dedbe2e743baa99e653fdefe101194a5d9e730495909d66a9047f50831f

    • C:\Users\Admin\AppData\Local\Temp\571B.exe

      Filesize

      388KB

      MD5

      2c9ba61967ebae81290477ae4e17a428

      SHA1

      6abc911f746e90e5cc56d526df8d3e71076156f7

      SHA256

      3dd85136dc7ace7d4c7f38f91bacc3489c65ebfb20d945eb9f1702343f8e4eec

      SHA512

      efd11abf6266ce1c487d6ce1ac6c1762223103975e822091faac42c8e860b89c9125985429b8ed96122be919e51888b35bbaff031a27a57ae9312bb3c386cb4b

    • C:\Users\Admin\AppData\Local\Temp\571B.exe

      Filesize

      388KB

      MD5

      2c9ba61967ebae81290477ae4e17a428

      SHA1

      6abc911f746e90e5cc56d526df8d3e71076156f7

      SHA256

      3dd85136dc7ace7d4c7f38f91bacc3489c65ebfb20d945eb9f1702343f8e4eec

      SHA512

      efd11abf6266ce1c487d6ce1ac6c1762223103975e822091faac42c8e860b89c9125985429b8ed96122be919e51888b35bbaff031a27a57ae9312bb3c386cb4b

    • C:\Users\Admin\AppData\Local\Temp\6F38.exe

      Filesize

      4.8MB

      MD5

      428da7a5f75ea1f5806f3c120e5d0800

      SHA1

      6494c05df07f73668f8245aaaa6606e58848ab02

      SHA256

      782c7ce28b3d6430b99b22c93f01dc33221e570871cc6b51f298fbcc6855036a

      SHA512

      100814a91dcc4aeaa59840797869b4fd194f7ea5def2480a853aa217261a128ba99b9f632fce7108345f83d08154249e99f400e1616f3886ddb527e5ffbe6d7c

    • C:\Users\Admin\AppData\Local\Temp\6F38.exe

      Filesize

      4.8MB

      MD5

      428da7a5f75ea1f5806f3c120e5d0800

      SHA1

      6494c05df07f73668f8245aaaa6606e58848ab02

      SHA256

      782c7ce28b3d6430b99b22c93f01dc33221e570871cc6b51f298fbcc6855036a

      SHA512

      100814a91dcc4aeaa59840797869b4fd194f7ea5def2480a853aa217261a128ba99b9f632fce7108345f83d08154249e99f400e1616f3886ddb527e5ffbe6d7c

    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

      Filesize

      9KB

      MD5

      9ead10c08e72ae41921191f8db39bc16

      SHA1

      abe3bce01cd34afc88e2c838173f8c2bd0090ae1

      SHA256

      8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

      SHA512

      aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

      Filesize

      9KB

      MD5

      9ead10c08e72ae41921191f8db39bc16

      SHA1

      abe3bce01cd34afc88e2c838173f8c2bd0090ae1

      SHA256

      8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

      SHA512

      aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

    • memory/1976-164-0x0000000001190000-0x0000000001205000-memory.dmp

      Filesize

      468KB

    • memory/1976-171-0x0000000001120000-0x000000000118B000-memory.dmp

      Filesize

      428KB

    • memory/1976-165-0x0000000001120000-0x000000000118B000-memory.dmp

      Filesize

      428KB

    • memory/2848-151-0x0000000002460000-0x00000000025C8000-memory.dmp

      Filesize

      1.4MB

    • memory/2848-152-0x00000000026F0000-0x0000000002806000-memory.dmp

      Filesize

      1.1MB

    • memory/2848-167-0x0000000002810000-0x00000000028CF000-memory.dmp

      Filesize

      764KB

    • memory/2848-168-0x00000000028D0000-0x0000000002979000-memory.dmp

      Filesize

      676KB

    • memory/2848-169-0x00000000028D0000-0x0000000002979000-memory.dmp

      Filesize

      676KB

    • memory/2848-147-0x0000000002040000-0x00000000021C7000-memory.dmp

      Filesize

      1.5MB

    • memory/2848-173-0x00000000026F0000-0x0000000002806000-memory.dmp

      Filesize

      1.1MB

    • memory/3396-182-0x0000000002046000-0x00000000020D7000-memory.dmp

      Filesize

      580KB

    • memory/3736-155-0x0000000002250000-0x000000000236B000-memory.dmp

      Filesize

      1.1MB

    • memory/3736-154-0x0000000000610000-0x00000000006A1000-memory.dmp

      Filesize

      580KB

    • memory/3924-166-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/3924-177-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/3924-160-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/3924-161-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/3924-158-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/4068-183-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/4068-202-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/4068-181-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/4068-184-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/4428-163-0x00000000005C0000-0x00000000005CC000-memory.dmp

      Filesize

      48KB

    • memory/4428-162-0x00000000005D0000-0x00000000005D7000-memory.dmp

      Filesize

      28KB

    • memory/4660-189-0x0000000000BB0000-0x0000000000BC4000-memory.dmp

      Filesize

      80KB

    • memory/4772-135-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/4772-132-0x000000000063D000-0x000000000064E000-memory.dmp

      Filesize

      68KB

    • memory/4772-134-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/4772-133-0x00000000005E0000-0x00000000005E9000-memory.dmp

      Filesize

      36KB