Resubmissions

17-10-2022 12:08

221017-pavzbabhel 10

14-10-2022 16:38

221014-t5ctfadhbp 10

Analysis

  • max time kernel
    156s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-10-2022 16:38

General

  • Target

    file.exe

  • Size

    232KB

  • MD5

    52ffaf10efe8795445a3df86abd0ded2

  • SHA1

    c1daa480214146034e1bdb20286196246b7a7428

  • SHA256

    10670270d9e09c0b5b515ad8fe190c975ac0427fb1f4a8257445ee0dbb7db2bd

  • SHA512

    77db60f3fd3f930e7244f7728a1bc029fefbaa8f2161a040961c1256691eaf8fb6f4100dc0faea1d1ee96f5f3f828861fa977650cb0e87e58777f4fb2e4df4c6

  • SSDEEP

    3072:sXN7q4qOU4rN6cMmlfez5r65zW+16b5A4dJQmEPc9HfmqJZ0K+Gyq0VP:oXqOOEfa6hbkbysQmt9FZ0zd

Malware Config

Extracted

Family

djvu

C2

http://winnlinne.com/lancer/get.php

Attributes
  • extension

    .powz

  • offline_id

    tHl9RvVtHhFQisMomKMdXzz2soNLhV0cuok85it1

  • payload_url

    http://rgyui.top/dl/build2.exe

    http://winnlinne.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-oTIha7SI4s Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0581Jhyjd

rsa_pubkey.plain

Signatures

  • Detected Djvu ransomware 6 IoCs
  • Detects Smokeloader packer 3 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 8 IoCs
  • VMProtect packed file 6 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Loads dropped DLL 2 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 10 IoCs
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4224
  • C:\Users\Admin\AppData\Roaming\gvgsivb
    C:\Users\Admin\AppData\Roaming\gvgsivb
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:1028
  • C:\Users\Admin\AppData\Local\Temp\8DE8.exe
    C:\Users\Admin\AppData\Local\Temp\8DE8.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:4460
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 560
      2⤵
      • Program crash
      PID:4632
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 568
      2⤵
      • Program crash
      PID:3504
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 580
      2⤵
      • Program crash
      PID:380
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 700
      2⤵
      • Program crash
      PID:4804
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 792
      2⤵
      • Program crash
      PID:1220
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 884
      2⤵
      • Program crash
      PID:1784
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic os get Caption
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1420
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 1392
      2⤵
      • Program crash
      PID:2104
    • C:\Windows\SysWOW64\cmd.exe
      cmd /C "wmic path win32_VideoController get name"
      2⤵
        PID:4392
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic path win32_VideoController get name
          3⤵
            PID:4744
        • C:\Windows\SysWOW64\cmd.exe
          cmd /C "wmic cpu get name"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:5040
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            wmic cpu get name
            3⤵
              PID:3888
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 1416
            2⤵
            • Program crash
            PID:3240
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 1348
            2⤵
            • Program crash
            PID:384
        • C:\Windows\system32\regsvr32.exe
          regsvr32 /s C:\Users\Admin\AppData\Local\Temp\9905.dll
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:3772
          • C:\Windows\SysWOW64\regsvr32.exe
            /s C:\Users\Admin\AppData\Local\Temp\9905.dll
            2⤵
            • Loads dropped DLL
            PID:1240
        • C:\Users\Admin\AppData\Local\Temp\CC6A.exe
          C:\Users\Admin\AppData\Local\Temp\CC6A.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2452
          • C:\Users\Admin\AppData\Local\Temp\CC6A.exe
            C:\Users\Admin\AppData\Local\Temp\CC6A.exe
            2⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1148
            • C:\Windows\SysWOW64\icacls.exe
              icacls "C:\Users\Admin\AppData\Local\49b02f67-198e-4234-80e5-7dea0d075e6c" /deny *S-1-1-0:(OI)(CI)(DE,DC)
              3⤵
              • Modifies file permissions
              PID:4748
        • C:\Users\Admin\AppData\Local\Temp\35A4.exe
          C:\Users\Admin\AppData\Local\Temp\35A4.exe
          1⤵
          • Executes dropped EXE
          PID:2632
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4460 -ip 4460
          1⤵
            PID:2892
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4460 -ip 4460
            1⤵
              PID:680
            • C:\Users\Admin\AppData\Local\Temp\4565.exe
              C:\Users\Admin\AppData\Local\Temp\4565.exe
              1⤵
              • Executes dropped EXE
              • Checks SCSI registry key(s)
              • Suspicious behavior: MapViewOfSection
              PID:1824
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4460 -ip 4460
              1⤵
                PID:4940
              • C:\Users\Admin\AppData\Local\Temp\473A.exe
                C:\Users\Admin\AppData\Local\Temp\473A.exe
                1⤵
                • Executes dropped EXE
                PID:3160
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3160 -s 448
                  2⤵
                  • Program crash
                  PID:3484
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4460 -ip 4460
                1⤵
                  PID:2456
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3160 -ip 3160
                  1⤵
                    PID:2856
                  • C:\Users\Admin\AppData\Local\Temp\4FA8.exe
                    C:\Users\Admin\AppData\Local\Temp\4FA8.exe
                    1⤵
                    • Executes dropped EXE
                    PID:3876
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4460 -ip 4460
                    1⤵
                      PID:3696
                    • C:\Windows\SysWOW64\explorer.exe
                      C:\Windows\SysWOW64\explorer.exe
                      1⤵
                      • Accesses Microsoft Outlook profiles
                      • outlook_office_path
                      • outlook_win_path
                      PID:1188
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4460 -ip 4460
                      1⤵
                        PID:620
                      • C:\Windows\explorer.exe
                        C:\Windows\explorer.exe
                        1⤵
                          PID:4132
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4460 -ip 4460
                          1⤵
                            PID:4320
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4460 -ip 4460
                            1⤵
                              PID:3640
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4460 -ip 4460
                              1⤵
                                PID:4448

                              Network

                              MITRE ATT&CK Enterprise v6

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\49b02f67-198e-4234-80e5-7dea0d075e6c\CC6A.exe

                                Filesize

                                752KB

                                MD5

                                93e80cf200afb6eb3aef34afa206af0b

                                SHA1

                                fc15242b02094520aa7698927242f38b92d35035

                                SHA256

                                11e540177faa07c038cefed9710578df667f5b0f9466d8437d76aa0c29e8061e

                                SHA512

                                bfebe204bbff1494fb1648c9e2f9f07f669d468a6505fd48c6482292809996cb397f363fb164fefc0cdf6613216430ab62c92cf2f616e4afcddb58da9601c08d

                              • C:\Users\Admin\AppData\Local\Temp\35A4.exe

                                Filesize

                                3.5MB

                                MD5

                                8c31d30ef8674d07d554ebf5d8fbbb6d

                                SHA1

                                04aafe34c5dc8b18e8324fb340a078aba5e792fd

                                SHA256

                                b2e8dfa026c7e6d1c4548f689ef345d1bb42e5e7aef03f97415516423ee8bbe6

                                SHA512

                                117c01537b03fc5b8d82224547cd164299ce0020da5abb4e7524ab9dacfa938ce292627118e10a24735fc3152f5edc46611b6872b748d7cf2dbb330c333e8d0d

                              • C:\Users\Admin\AppData\Local\Temp\35A4.exe

                                Filesize

                                3.5MB

                                MD5

                                8c31d30ef8674d07d554ebf5d8fbbb6d

                                SHA1

                                04aafe34c5dc8b18e8324fb340a078aba5e792fd

                                SHA256

                                b2e8dfa026c7e6d1c4548f689ef345d1bb42e5e7aef03f97415516423ee8bbe6

                                SHA512

                                117c01537b03fc5b8d82224547cd164299ce0020da5abb4e7524ab9dacfa938ce292627118e10a24735fc3152f5edc46611b6872b748d7cf2dbb330c333e8d0d

                              • C:\Users\Admin\AppData\Local\Temp\4565.exe

                                Filesize

                                233KB

                                MD5

                                52d849c0184546cbe9e80c012cb8f1ce

                                SHA1

                                7a501787d5d3c154a28ce3cc8e208d223a4c3f26

                                SHA256

                                23c0c906a9ce311cea8d0f25d327595da8aac6164403401a4825d2605b62aa21

                                SHA512

                                4011c1b2ad832e2ccf5b6b14d5621eaf487c6b43402fd9580043cc9cc5a17b65118c07db098d649ba2272a7e759e28599502ffac0e5b11164f7438d7d6b67811

                              • C:\Users\Admin\AppData\Local\Temp\4565.exe

                                Filesize

                                233KB

                                MD5

                                52d849c0184546cbe9e80c012cb8f1ce

                                SHA1

                                7a501787d5d3c154a28ce3cc8e208d223a4c3f26

                                SHA256

                                23c0c906a9ce311cea8d0f25d327595da8aac6164403401a4825d2605b62aa21

                                SHA512

                                4011c1b2ad832e2ccf5b6b14d5621eaf487c6b43402fd9580043cc9cc5a17b65118c07db098d649ba2272a7e759e28599502ffac0e5b11164f7438d7d6b67811

                              • C:\Users\Admin\AppData\Local\Temp\473A.exe

                                Filesize

                                233KB

                                MD5

                                45c91e5c87d55c069402bdebe3dd1012

                                SHA1

                                50e7b4b4044f9d898b9f8928c99562108daad3ac

                                SHA256

                                cca189213624536dcd09665b8fd0c5bb7a03654879a98464b0394de12516b7aa

                                SHA512

                                d790b1aac28bae6167b56ae9e1d610de1825d7286939e0537b91feb744eefc6b6bd8afba686fb0b3d446d0a7af5778c473a1709b6e4282d90b74fcc0a8363476

                              • C:\Users\Admin\AppData\Local\Temp\473A.exe

                                Filesize

                                233KB

                                MD5

                                45c91e5c87d55c069402bdebe3dd1012

                                SHA1

                                50e7b4b4044f9d898b9f8928c99562108daad3ac

                                SHA256

                                cca189213624536dcd09665b8fd0c5bb7a03654879a98464b0394de12516b7aa

                                SHA512

                                d790b1aac28bae6167b56ae9e1d610de1825d7286939e0537b91feb744eefc6b6bd8afba686fb0b3d446d0a7af5778c473a1709b6e4282d90b74fcc0a8363476

                              • C:\Users\Admin\AppData\Local\Temp\4FA8.exe

                                Filesize

                                3.5MB

                                MD5

                                8c31d30ef8674d07d554ebf5d8fbbb6d

                                SHA1

                                04aafe34c5dc8b18e8324fb340a078aba5e792fd

                                SHA256

                                b2e8dfa026c7e6d1c4548f689ef345d1bb42e5e7aef03f97415516423ee8bbe6

                                SHA512

                                117c01537b03fc5b8d82224547cd164299ce0020da5abb4e7524ab9dacfa938ce292627118e10a24735fc3152f5edc46611b6872b748d7cf2dbb330c333e8d0d

                              • C:\Users\Admin\AppData\Local\Temp\4FA8.exe

                                Filesize

                                3.5MB

                                MD5

                                8c31d30ef8674d07d554ebf5d8fbbb6d

                                SHA1

                                04aafe34c5dc8b18e8324fb340a078aba5e792fd

                                SHA256

                                b2e8dfa026c7e6d1c4548f689ef345d1bb42e5e7aef03f97415516423ee8bbe6

                                SHA512

                                117c01537b03fc5b8d82224547cd164299ce0020da5abb4e7524ab9dacfa938ce292627118e10a24735fc3152f5edc46611b6872b748d7cf2dbb330c333e8d0d

                              • C:\Users\Admin\AppData\Local\Temp\8DE8.exe

                                Filesize

                                5.8MB

                                MD5

                                7a44ff9571afa93eaa2e0d782dbcee29

                                SHA1

                                02f57d08fcb94cf5c3994dab72771bb819da0b4c

                                SHA256

                                6ed16ced92cce116fee370894c01f8b4d5977f48b9bf60144a09e9e328d6e2cc

                                SHA512

                                3c264412a2ce28c4d9e72677276779ee2c5510a5e51a56a94907252c4f558db8e10c38b898c9b20b4efd1754a289a2b553200f4a99e15d04433c31fd82e78606

                              • C:\Users\Admin\AppData\Local\Temp\8DE8.exe

                                Filesize

                                5.8MB

                                MD5

                                7a44ff9571afa93eaa2e0d782dbcee29

                                SHA1

                                02f57d08fcb94cf5c3994dab72771bb819da0b4c

                                SHA256

                                6ed16ced92cce116fee370894c01f8b4d5977f48b9bf60144a09e9e328d6e2cc

                                SHA512

                                3c264412a2ce28c4d9e72677276779ee2c5510a5e51a56a94907252c4f558db8e10c38b898c9b20b4efd1754a289a2b553200f4a99e15d04433c31fd82e78606

                              • C:\Users\Admin\AppData\Local\Temp\9905.dll

                                Filesize

                                1.7MB

                                MD5

                                11fedcc03c7ca6bdefb0323870da3cf6

                                SHA1

                                4c36be2e3ad93396b91fbcc958ad939bdf021de4

                                SHA256

                                4a44c573dde12af8398b15a241b813f66c383a0ea791369b6d3a3171678dcdb7

                                SHA512

                                111ab62b9f52cf502341d285d51e203df37de7e4092b873b712d17dea96b3e1bba6073ec0e212b96a09a40f82ea05f0c280e882e2d720e15ca2f05517bb15ccf

                              • C:\Users\Admin\AppData\Local\Temp\9905.dll

                                Filesize

                                1.7MB

                                MD5

                                11fedcc03c7ca6bdefb0323870da3cf6

                                SHA1

                                4c36be2e3ad93396b91fbcc958ad939bdf021de4

                                SHA256

                                4a44c573dde12af8398b15a241b813f66c383a0ea791369b6d3a3171678dcdb7

                                SHA512

                                111ab62b9f52cf502341d285d51e203df37de7e4092b873b712d17dea96b3e1bba6073ec0e212b96a09a40f82ea05f0c280e882e2d720e15ca2f05517bb15ccf

                              • C:\Users\Admin\AppData\Local\Temp\9905.dll

                                Filesize

                                1.7MB

                                MD5

                                11fedcc03c7ca6bdefb0323870da3cf6

                                SHA1

                                4c36be2e3ad93396b91fbcc958ad939bdf021de4

                                SHA256

                                4a44c573dde12af8398b15a241b813f66c383a0ea791369b6d3a3171678dcdb7

                                SHA512

                                111ab62b9f52cf502341d285d51e203df37de7e4092b873b712d17dea96b3e1bba6073ec0e212b96a09a40f82ea05f0c280e882e2d720e15ca2f05517bb15ccf

                              • C:\Users\Admin\AppData\Local\Temp\CC6A.exe

                                Filesize

                                752KB

                                MD5

                                93e80cf200afb6eb3aef34afa206af0b

                                SHA1

                                fc15242b02094520aa7698927242f38b92d35035

                                SHA256

                                11e540177faa07c038cefed9710578df667f5b0f9466d8437d76aa0c29e8061e

                                SHA512

                                bfebe204bbff1494fb1648c9e2f9f07f669d468a6505fd48c6482292809996cb397f363fb164fefc0cdf6613216430ab62c92cf2f616e4afcddb58da9601c08d

                              • C:\Users\Admin\AppData\Local\Temp\CC6A.exe

                                Filesize

                                752KB

                                MD5

                                93e80cf200afb6eb3aef34afa206af0b

                                SHA1

                                fc15242b02094520aa7698927242f38b92d35035

                                SHA256

                                11e540177faa07c038cefed9710578df667f5b0f9466d8437d76aa0c29e8061e

                                SHA512

                                bfebe204bbff1494fb1648c9e2f9f07f669d468a6505fd48c6482292809996cb397f363fb164fefc0cdf6613216430ab62c92cf2f616e4afcddb58da9601c08d

                              • C:\Users\Admin\AppData\Local\Temp\CC6A.exe

                                Filesize

                                752KB

                                MD5

                                93e80cf200afb6eb3aef34afa206af0b

                                SHA1

                                fc15242b02094520aa7698927242f38b92d35035

                                SHA256

                                11e540177faa07c038cefed9710578df667f5b0f9466d8437d76aa0c29e8061e

                                SHA512

                                bfebe204bbff1494fb1648c9e2f9f07f669d468a6505fd48c6482292809996cb397f363fb164fefc0cdf6613216430ab62c92cf2f616e4afcddb58da9601c08d

                              • C:\Users\Admin\AppData\Roaming\gvgsivb

                                Filesize

                                232KB

                                MD5

                                52ffaf10efe8795445a3df86abd0ded2

                                SHA1

                                c1daa480214146034e1bdb20286196246b7a7428

                                SHA256

                                10670270d9e09c0b5b515ad8fe190c975ac0427fb1f4a8257445ee0dbb7db2bd

                                SHA512

                                77db60f3fd3f930e7244f7728a1bc029fefbaa8f2161a040961c1256691eaf8fb6f4100dc0faea1d1ee96f5f3f828861fa977650cb0e87e58777f4fb2e4df4c6

                              • C:\Users\Admin\AppData\Roaming\gvgsivb

                                Filesize

                                232KB

                                MD5

                                52ffaf10efe8795445a3df86abd0ded2

                                SHA1

                                c1daa480214146034e1bdb20286196246b7a7428

                                SHA256

                                10670270d9e09c0b5b515ad8fe190c975ac0427fb1f4a8257445ee0dbb7db2bd

                                SHA512

                                77db60f3fd3f930e7244f7728a1bc029fefbaa8f2161a040961c1256691eaf8fb6f4100dc0faea1d1ee96f5f3f828861fa977650cb0e87e58777f4fb2e4df4c6

                              • memory/1028-143-0x0000000000400000-0x000000000049D000-memory.dmp

                                Filesize

                                628KB

                              • memory/1028-142-0x0000000000400000-0x000000000049D000-memory.dmp

                                Filesize

                                628KB

                              • memory/1028-141-0x00000000006EE000-0x00000000006FF000-memory.dmp

                                Filesize

                                68KB

                              • memory/1148-151-0x0000000000400000-0x0000000000537000-memory.dmp

                                Filesize

                                1.2MB

                              • memory/1148-153-0x0000000000400000-0x0000000000537000-memory.dmp

                                Filesize

                                1.2MB

                              • memory/1148-160-0x0000000000400000-0x0000000000537000-memory.dmp

                                Filesize

                                1.2MB

                              • memory/1148-154-0x0000000000400000-0x0000000000537000-memory.dmp

                                Filesize

                                1.2MB

                              • memory/1148-164-0x0000000000400000-0x0000000000537000-memory.dmp

                                Filesize

                                1.2MB

                              • memory/1188-206-0x00000000001C0000-0x000000000022B000-memory.dmp

                                Filesize

                                428KB

                              • memory/1188-210-0x00000000001C0000-0x000000000022B000-memory.dmp

                                Filesize

                                428KB

                              • memory/1188-205-0x0000000000230000-0x00000000002A5000-memory.dmp

                                Filesize

                                468KB

                              • memory/1188-209-0x0000000000230000-0x00000000002A5000-memory.dmp

                                Filesize

                                468KB

                              • memory/1240-162-0x0000000002D20000-0x0000000002E41000-memory.dmp

                                Filesize

                                1.1MB

                              • memory/1240-159-0x00000000022B0000-0x0000000002464000-memory.dmp

                                Filesize

                                1.7MB

                              • memory/1240-161-0x0000000002AD0000-0x0000000002BF1000-memory.dmp

                                Filesize

                                1.1MB

                              • memory/1240-177-0x0000000002E50000-0x0000000002F11000-memory.dmp

                                Filesize

                                772KB

                              • memory/1240-178-0x0000000002F20000-0x0000000002FCC000-memory.dmp

                                Filesize

                                688KB

                              • memory/1240-193-0x0000000002D20000-0x0000000002E41000-memory.dmp

                                Filesize

                                1.1MB

                              • memory/1824-191-0x0000000000400000-0x000000000043F000-memory.dmp

                                Filesize

                                252KB

                              • memory/1824-186-0x0000000000400000-0x000000000043F000-memory.dmp

                                Filesize

                                252KB

                              • memory/1824-185-0x0000000000470000-0x0000000000479000-memory.dmp

                                Filesize

                                36KB

                              • memory/1824-184-0x000000000063E000-0x000000000064F000-memory.dmp

                                Filesize

                                68KB

                              • memory/2452-149-0x00000000021A0000-0x00000000022BB000-memory.dmp

                                Filesize

                                1.1MB

                              • memory/2452-148-0x000000000210C000-0x000000000219D000-memory.dmp

                                Filesize

                                580KB

                              • memory/2632-170-0x0000000140000000-0x0000000140613000-memory.dmp

                                Filesize

                                6.1MB

                              • memory/3160-187-0x0000000000400000-0x000000000049D000-memory.dmp

                                Filesize

                                628KB

                              • memory/3160-188-0x00000000005CE000-0x00000000005DF000-memory.dmp

                                Filesize

                                68KB

                              • memory/3876-196-0x0000000140000000-0x0000000140613000-memory.dmp

                                Filesize

                                6.1MB

                              • memory/4132-203-0x00000000004A0000-0x00000000004AC000-memory.dmp

                                Filesize

                                48KB

                              • memory/4132-207-0x00000000004B0000-0x00000000004B7000-memory.dmp

                                Filesize

                                28KB

                              • memory/4132-202-0x00000000004B0000-0x00000000004B7000-memory.dmp

                                Filesize

                                28KB

                              • memory/4224-134-0x0000000000400000-0x000000000049D000-memory.dmp

                                Filesize

                                628KB

                              • memory/4224-132-0x000000000066E000-0x000000000067F000-memory.dmp

                                Filesize

                                68KB

                              • memory/4224-135-0x0000000000400000-0x000000000049D000-memory.dmp

                                Filesize

                                628KB

                              • memory/4224-133-0x00000000005F0000-0x00000000005F9000-memory.dmp

                                Filesize

                                36KB

                              • memory/4460-165-0x00000000032F0000-0x000000000380F000-memory.dmp

                                Filesize

                                5.1MB

                              • memory/4460-166-0x0000000000400000-0x00000000009DE000-memory.dmp

                                Filesize

                                5.9MB

                              • memory/4460-190-0x0000000000400000-0x00000000009DE000-memory.dmp

                                Filesize

                                5.9MB