Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    162s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 21:01

General

  • Target

    file.exe

  • Size

    193KB

  • MD5

    f0557a599dbe4fcdc93cfac451726ccc

  • SHA1

    b252de02acae4256e348773e4a7b751834175593

  • SHA256

    0d7f4c807220c6b839ee41dd5b41e9e24a2f1b1f503a749dc45504d092f59298

  • SHA512

    1ee89b4b4baba7a0a4bd7ed9ffcf0f22e936e09ba647b99f76b5c3c3f9849a9a1b4863d77891f7793bcef0c0fe28de30ac1c45134edeffbabca5b06fffa8f67d

  • SSDEEP

    3072:OXScc8Lts2wRw/5L2qxpyB3Ksz3Ei9K21tYq0Ky/rhhf/:Wdc8LaLSB2qxgx5RNtV0XVhf

Malware Config

Extracted

Family

djvu

C2

http://winnlinne.com/lancer/get.php

Attributes
  • extension

    .tury

  • offline_id

    Uz66zEbmA32arcxwT81zZhkb23026oHz5iSp8qt1

  • payload_url

    http://rgyui.top/dl/build2.exe

    http://winnlinne.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-o7UXxOstmw Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0585Jhyjd

rsa_pubkey.plain

Extracted

Family

danabot

Attributes
  • embedded_hash

    56951C922035D696BFCE443750496462

  • type

    loader

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Detected Djvu ransomware 10 IoCs
  • Detects Smokeloader packer 3 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 10 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:5008
  • C:\Users\Admin\AppData\Local\Temp\27BC.exe
    C:\Users\Admin\AppData\Local\Temp\27BC.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2620
    • C:\Users\Admin\AppData\Local\Temp\27BC.exe
      C:\Users\Admin\AppData\Local\Temp\27BC.exe
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1400
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\1a62caec-33db-46cf-954d-9785e9832949" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:2992
      • C:\Users\Admin\AppData\Local\Temp\27BC.exe
        "C:\Users\Admin\AppData\Local\Temp\27BC.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3528
        • C:\Users\Admin\AppData\Local\Temp\27BC.exe
          "C:\Users\Admin\AppData\Local\Temp\27BC.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:4360
          • C:\Users\Admin\AppData\Local\fab4f2c9-2b6c-4ad9-a1db-9b6262d450da\build2.exe
            "C:\Users\Admin\AppData\Local\fab4f2c9-2b6c-4ad9-a1db-9b6262d450da\build2.exe"
            5⤵
            • Executes dropped EXE
            PID:2264
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\3DE5.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3264
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\3DE5.dll
      2⤵
      • Loads dropped DLL
      PID:4264
  • C:\Users\Admin\AppData\Local\Temp\6534.exe
    C:\Users\Admin\AppData\Local\Temp\6534.exe
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:2092
  • C:\Users\Admin\AppData\Local\Temp\6804.exe
    C:\Users\Admin\AppData\Local\Temp\6804.exe
    1⤵
    • Executes dropped EXE
    PID:4308
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4308 -s 340
      2⤵
      • Program crash
      PID:4352
  • C:\Users\Admin\AppData\Local\Temp\6A76.exe
    C:\Users\Admin\AppData\Local\Temp\6A76.exe
    1⤵
    • Executes dropped EXE
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:4124
  • C:\Users\Admin\AppData\Local\Temp\6E7E.exe
    C:\Users\Admin\AppData\Local\Temp\6E7E.exe
    1⤵
    • Executes dropped EXE
    PID:2680
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 340
      2⤵
      • Program crash
      PID:3256
  • C:\Windows\SysWOW64\explorer.exe
    C:\Windows\SysWOW64\explorer.exe
    1⤵
    • Accesses Microsoft Outlook profiles
    • outlook_office_path
    • outlook_win_path
    PID:4736
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe
    1⤵
      PID:4696
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2680 -ip 2680
      1⤵
        PID:1296
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4308 -ip 4308
        1⤵
          PID:2576
        • C:\Users\Admin\AppData\Local\Temp\4CAA.exe
          C:\Users\Admin\AppData\Local\Temp\4CAA.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1132
          • C:\Windows\SysWOW64\agentactivationruntimestarter.exe
            C:\Windows\system32\agentactivationruntimestarter.exe
            2⤵
              PID:4220
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k AarSvcGroup -p -s AarSvc
            1⤵
              PID:2352

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

              Filesize

              2KB

              MD5

              bc68c4ccb08d2c94eb10c1918865ccae

              SHA1

              8256faeec3f3ec799819d5370195a60f0ec2bdb0

              SHA256

              79313c35e9f5655225ab6d4564a396cf9d473d04909c04db10935c27959f677d

              SHA512

              f6baa632cd93126c31a495e340e8f42e3f9b171b0975877e7a6725677fe57c8b51784be5366cedba022fea273cfe9ecfc5fce8546f2a76e1e6516e5865666933

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

              Filesize

              1KB

              MD5

              ee895cd37d1bbafdf7a736b85dd47348

              SHA1

              5c182ae0d6ffc54c386763ad882256cedd8d0e7c

              SHA256

              939346daba2e0757e14e822fd55350189708ac8d2d782b148e1744ee85c49aa5

              SHA512

              b2f86fa2f14864ab155693804f0d5da4f13e0c9257743eb7376d49a6ce77d950f6e98bbda24030386578c0edb58f4ad3e50eaec2dcc10803a7dd314d703cf740

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

              Filesize

              488B

              MD5

              dec620fc54ed2187f1467e0c1a6c5f3f

              SHA1

              58b7919f0eee9aa54f87de72c6e69ba5aefed938

              SHA256

              b2842104fb4cb45f525af99161bae6cb8c9921fab44ebae45eaf08afff8ef5cb

              SHA512

              0307d75e47eaba3ed2d80755f3a3c17497c6cff5e94ad19621680543676f4c822e74bb0797d19a14faaa7b1cd1cfbd3540bf2f53b3d0fa7c436395d860bb22c5

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

              Filesize

              482B

              MD5

              fa53999391a8857cee5abd7322d75880

              SHA1

              758302cbb04dc2956302f9c27faaff119ebbc07f

              SHA256

              6a75150374ae9a5f77c3c7e37659ef0a2a39076776ea20cd578e0b035f582dc7

              SHA512

              99c0c2a0a72397027311f989ad70d5e5e15ff2c493f0a9eb172ba79a07f2727b9ac2893f641ee2894142074be62826120f336b387767f961cb40d74006671c1c

            • C:\Users\Admin\AppData\Local\1a62caec-33db-46cf-954d-9785e9832949\27BC.exe

              Filesize

              713KB

              MD5

              b7bc860cee7201e0c810642890a03246

              SHA1

              d9edc9d61baf9d8cad3f840bba699ffd9219cce0

              SHA256

              ee58c869d7a419d55fe3e6a8cf001ffff107d5d922951b3999b79b2b6c7e1c27

              SHA512

              5e65e33f02c937167a03d283ab6510aab82f221d11ef3c65833bbf669df89136418889e09c5d2d6b6221fe3a47da3bb363a485b9f5ea210cfde35d7b50f7a594

            • C:\Users\Admin\AppData\Local\Temp\27BC.exe

              Filesize

              713KB

              MD5

              b7bc860cee7201e0c810642890a03246

              SHA1

              d9edc9d61baf9d8cad3f840bba699ffd9219cce0

              SHA256

              ee58c869d7a419d55fe3e6a8cf001ffff107d5d922951b3999b79b2b6c7e1c27

              SHA512

              5e65e33f02c937167a03d283ab6510aab82f221d11ef3c65833bbf669df89136418889e09c5d2d6b6221fe3a47da3bb363a485b9f5ea210cfde35d7b50f7a594

            • C:\Users\Admin\AppData\Local\Temp\27BC.exe

              Filesize

              713KB

              MD5

              b7bc860cee7201e0c810642890a03246

              SHA1

              d9edc9d61baf9d8cad3f840bba699ffd9219cce0

              SHA256

              ee58c869d7a419d55fe3e6a8cf001ffff107d5d922951b3999b79b2b6c7e1c27

              SHA512

              5e65e33f02c937167a03d283ab6510aab82f221d11ef3c65833bbf669df89136418889e09c5d2d6b6221fe3a47da3bb363a485b9f5ea210cfde35d7b50f7a594

            • C:\Users\Admin\AppData\Local\Temp\27BC.exe

              Filesize

              713KB

              MD5

              b7bc860cee7201e0c810642890a03246

              SHA1

              d9edc9d61baf9d8cad3f840bba699ffd9219cce0

              SHA256

              ee58c869d7a419d55fe3e6a8cf001ffff107d5d922951b3999b79b2b6c7e1c27

              SHA512

              5e65e33f02c937167a03d283ab6510aab82f221d11ef3c65833bbf669df89136418889e09c5d2d6b6221fe3a47da3bb363a485b9f5ea210cfde35d7b50f7a594

            • C:\Users\Admin\AppData\Local\Temp\27BC.exe

              Filesize

              713KB

              MD5

              b7bc860cee7201e0c810642890a03246

              SHA1

              d9edc9d61baf9d8cad3f840bba699ffd9219cce0

              SHA256

              ee58c869d7a419d55fe3e6a8cf001ffff107d5d922951b3999b79b2b6c7e1c27

              SHA512

              5e65e33f02c937167a03d283ab6510aab82f221d11ef3c65833bbf669df89136418889e09c5d2d6b6221fe3a47da3bb363a485b9f5ea210cfde35d7b50f7a594

            • C:\Users\Admin\AppData\Local\Temp\27BC.exe

              Filesize

              713KB

              MD5

              b7bc860cee7201e0c810642890a03246

              SHA1

              d9edc9d61baf9d8cad3f840bba699ffd9219cce0

              SHA256

              ee58c869d7a419d55fe3e6a8cf001ffff107d5d922951b3999b79b2b6c7e1c27

              SHA512

              5e65e33f02c937167a03d283ab6510aab82f221d11ef3c65833bbf669df89136418889e09c5d2d6b6221fe3a47da3bb363a485b9f5ea210cfde35d7b50f7a594

            • C:\Users\Admin\AppData\Local\Temp\3DE5.dll

              Filesize

              1.8MB

              MD5

              4dca89f3a66ae9ac204beea85d7a3d75

              SHA1

              5cc81459e35f27a79047c4e041a65739cc91a067

              SHA256

              223759e9e0c53c73d5255e47c1b455d7ccda1d050809446300485c0747d16981

              SHA512

              67dd36ca578ae7bfe3ebd167f193fe35513841aaa3a5f3124c4a1ae04241c554a0ff26a9afcee4e3ad4aaa8528b96e99a89192c7f1fc22dead81ad9af36a4906

            • C:\Users\Admin\AppData\Local\Temp\3DE5.dll

              Filesize

              1.8MB

              MD5

              4dca89f3a66ae9ac204beea85d7a3d75

              SHA1

              5cc81459e35f27a79047c4e041a65739cc91a067

              SHA256

              223759e9e0c53c73d5255e47c1b455d7ccda1d050809446300485c0747d16981

              SHA512

              67dd36ca578ae7bfe3ebd167f193fe35513841aaa3a5f3124c4a1ae04241c554a0ff26a9afcee4e3ad4aaa8528b96e99a89192c7f1fc22dead81ad9af36a4906

            • C:\Users\Admin\AppData\Local\Temp\4CAA.exe

              Filesize

              1.2MB

              MD5

              126ab2a3f29d4fcc19197b48551c0745

              SHA1

              120d2b163bc0748db5f776edcadfd922396d4d12

              SHA256

              fae6ecff0005977007f1e38c6f9f574b5ead530a3fd4e006e985e1a324860c05

              SHA512

              8a2f26969a14ca7b78becbd6af1f555fc9686566bd84a37f92f3f2ab9cd2f368c0c9eb184a0b2fa0bee2491c9ed54dbda76e72718794284193c890b381640b33

            • C:\Users\Admin\AppData\Local\Temp\4CAA.exe

              Filesize

              1.2MB

              MD5

              126ab2a3f29d4fcc19197b48551c0745

              SHA1

              120d2b163bc0748db5f776edcadfd922396d4d12

              SHA256

              fae6ecff0005977007f1e38c6f9f574b5ead530a3fd4e006e985e1a324860c05

              SHA512

              8a2f26969a14ca7b78becbd6af1f555fc9686566bd84a37f92f3f2ab9cd2f368c0c9eb184a0b2fa0bee2491c9ed54dbda76e72718794284193c890b381640b33

            • C:\Users\Admin\AppData\Local\Temp\6534.exe

              Filesize

              195KB

              MD5

              dec9250f99f41e0f5bb969e4d22c2cd4

              SHA1

              b3ece4bdcdadf2ee77c92b6000cb51431379be22

              SHA256

              9956a179fea738e50c94d1bcd8a4e4d78a6c5c10e3d9dabeae851819d020beae

              SHA512

              d17ec18b2ba5f6e776bb2079f1e19b62c6c0804cd4e2fc37207264adf6f96a2ea8157531ba3763604e6bbdb42b894ef2296fb964e1366c761640f8572751a576

            • C:\Users\Admin\AppData\Local\Temp\6534.exe

              Filesize

              195KB

              MD5

              dec9250f99f41e0f5bb969e4d22c2cd4

              SHA1

              b3ece4bdcdadf2ee77c92b6000cb51431379be22

              SHA256

              9956a179fea738e50c94d1bcd8a4e4d78a6c5c10e3d9dabeae851819d020beae

              SHA512

              d17ec18b2ba5f6e776bb2079f1e19b62c6c0804cd4e2fc37207264adf6f96a2ea8157531ba3763604e6bbdb42b894ef2296fb964e1366c761640f8572751a576

            • C:\Users\Admin\AppData\Local\Temp\6804.exe

              Filesize

              193KB

              MD5

              c1bf74789ae95f35dcf98ab453acbff3

              SHA1

              78cfde9b320ad6ca9219e7221e2b6342fb13ee63

              SHA256

              7abaebf4d3807453b2e2a0ef250101b1087e291010b9f69124272af30f540d4a

              SHA512

              38e8f2d4a4731b55fed60af7a0e102ccdaacfdd3dd204a53d2e0573cd19c66adfa6ae889e2a016bfed660db278355ebfd47dd81acdac73c502cf9d4bf1fa0f00

            • C:\Users\Admin\AppData\Local\Temp\6804.exe

              Filesize

              193KB

              MD5

              c1bf74789ae95f35dcf98ab453acbff3

              SHA1

              78cfde9b320ad6ca9219e7221e2b6342fb13ee63

              SHA256

              7abaebf4d3807453b2e2a0ef250101b1087e291010b9f69124272af30f540d4a

              SHA512

              38e8f2d4a4731b55fed60af7a0e102ccdaacfdd3dd204a53d2e0573cd19c66adfa6ae889e2a016bfed660db278355ebfd47dd81acdac73c502cf9d4bf1fa0f00

            • C:\Users\Admin\AppData\Local\Temp\6A76.exe

              Filesize

              103KB

              MD5

              b389787c2afa664b07383c9b655732e5

              SHA1

              227dcf02b647d31bba648c7e9402de7250161d16

              SHA256

              59b9eb8336740e545bcc0f12ae6d3db658496bc6ed79a4087eb134d78cd687fa

              SHA512

              320c02c7ed68e1d965de26813fbccba16e1406b22793734d39042a41304b62cf561436f21f9b5bbac8119b26ae07982e369b407b91b706153695aec9daa27ff7

            • C:\Users\Admin\AppData\Local\Temp\6A76.exe

              Filesize

              103KB

              MD5

              b389787c2afa664b07383c9b655732e5

              SHA1

              227dcf02b647d31bba648c7e9402de7250161d16

              SHA256

              59b9eb8336740e545bcc0f12ae6d3db658496bc6ed79a4087eb134d78cd687fa

              SHA512

              320c02c7ed68e1d965de26813fbccba16e1406b22793734d39042a41304b62cf561436f21f9b5bbac8119b26ae07982e369b407b91b706153695aec9daa27ff7

            • C:\Users\Admin\AppData\Local\Temp\6E7E.exe

              Filesize

              194KB

              MD5

              71efcf6744318ba8dff53729acc2f821

              SHA1

              1adf3caa79b66a799aaf8fe52fcb9fbede4a51b1

              SHA256

              4a5eadfc176749a508c86d1e8875a5e3a48f9a971a7b7b7b5219719daddc7c02

              SHA512

              258bcf0b5ff01d3cab8cc2eb574bf7c764da9150a6494dd5320e4f338a601b348cd0a64b1edeb28063d16ca36e5eb42fe08a92a0fa785fd8fcad142dffc24671

            • C:\Users\Admin\AppData\Local\Temp\6E7E.exe

              Filesize

              194KB

              MD5

              71efcf6744318ba8dff53729acc2f821

              SHA1

              1adf3caa79b66a799aaf8fe52fcb9fbede4a51b1

              SHA256

              4a5eadfc176749a508c86d1e8875a5e3a48f9a971a7b7b7b5219719daddc7c02

              SHA512

              258bcf0b5ff01d3cab8cc2eb574bf7c764da9150a6494dd5320e4f338a601b348cd0a64b1edeb28063d16ca36e5eb42fe08a92a0fa785fd8fcad142dffc24671

            • C:\Users\Admin\AppData\Local\fab4f2c9-2b6c-4ad9-a1db-9b6262d450da\build2.exe

              Filesize

              325KB

              MD5

              e4e90e1dda4b51d199d449fa936db902

              SHA1

              70de6b213f872ba782ba11cad5a5d1294ca9e741

              SHA256

              8ecc0426ea37a5c9e59d00b4fde1508175a950372ec3870965f1e527634b3419

              SHA512

              3958e1c40d69d5439b5e85bdb5765bb38ec5bba24f38a8aafb9a53c167ebaffb5c202441613af3f2d968c9c902de35036f67d87f7777efeb4c66869a7fc3c4ed

            • C:\Users\Admin\AppData\Local\fab4f2c9-2b6c-4ad9-a1db-9b6262d450da\build2.exe

              Filesize

              325KB

              MD5

              e4e90e1dda4b51d199d449fa936db902

              SHA1

              70de6b213f872ba782ba11cad5a5d1294ca9e741

              SHA256

              8ecc0426ea37a5c9e59d00b4fde1508175a950372ec3870965f1e527634b3419

              SHA512

              3958e1c40d69d5439b5e85bdb5765bb38ec5bba24f38a8aafb9a53c167ebaffb5c202441613af3f2d968c9c902de35036f67d87f7777efeb4c66869a7fc3c4ed

            • memory/1132-201-0x00000000021C0000-0x00000000022DE000-memory.dmp

              Filesize

              1.1MB

            • memory/1132-202-0x0000000002420000-0x00000000026E2000-memory.dmp

              Filesize

              2.8MB

            • memory/1132-203-0x0000000000400000-0x00000000006CE000-memory.dmp

              Filesize

              2.8MB

            • memory/1132-216-0x0000000000400000-0x00000000006CE000-memory.dmp

              Filesize

              2.8MB

            • memory/1400-199-0x0000000000400000-0x0000000000537000-memory.dmp

              Filesize

              1.2MB

            • memory/1400-161-0x0000000000400000-0x0000000000537000-memory.dmp

              Filesize

              1.2MB

            • memory/1400-149-0x0000000000400000-0x0000000000537000-memory.dmp

              Filesize

              1.2MB

            • memory/1400-145-0x0000000000400000-0x0000000000537000-memory.dmp

              Filesize

              1.2MB

            • memory/1400-155-0x0000000000400000-0x0000000000537000-memory.dmp

              Filesize

              1.2MB

            • memory/2092-179-0x0000000000440000-0x0000000000540000-memory.dmp

              Filesize

              1024KB

            • memory/2092-181-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2092-180-0x0000000002030000-0x0000000002039000-memory.dmp

              Filesize

              36KB

            • memory/2092-187-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2620-140-0x0000000001FFE000-0x0000000002090000-memory.dmp

              Filesize

              584KB

            • memory/2620-141-0x00000000021B0000-0x00000000022CB000-memory.dmp

              Filesize

              1.1MB

            • memory/2680-186-0x0000000000400000-0x0000000000436000-memory.dmp

              Filesize

              216KB

            • memory/2680-184-0x0000000000569000-0x000000000057A000-memory.dmp

              Filesize

              68KB

            • memory/2680-185-0x0000000000470000-0x0000000000479000-memory.dmp

              Filesize

              36KB

            • memory/3528-207-0x0000000001FC1000-0x0000000002053000-memory.dmp

              Filesize

              584KB

            • memory/4124-165-0x0000000005C80000-0x0000000005D12000-memory.dmp

              Filesize

              584KB

            • memory/4124-189-0x0000000005A40000-0x0000000005A52000-memory.dmp

              Filesize

              72KB

            • memory/4124-190-0x0000000007870000-0x00000000078AC000-memory.dmp

              Filesize

              240KB

            • memory/4124-191-0x0000000007920000-0x0000000007986000-memory.dmp

              Filesize

              408KB

            • memory/4124-167-0x00000000062D0000-0x0000000006874000-memory.dmp

              Filesize

              5.6MB

            • memory/4124-160-0x0000000000CD0000-0x0000000000CF0000-memory.dmp

              Filesize

              128KB

            • memory/4264-164-0x00000000030C0000-0x00000000031EC000-memory.dmp

              Filesize

              1.2MB

            • memory/4264-163-0x00000000031F0000-0x00000000032B2000-memory.dmp

              Filesize

              776KB

            • memory/4264-162-0x0000000002E60000-0x0000000002F8C000-memory.dmp

              Filesize

              1.2MB

            • memory/4264-171-0x00000000032C0000-0x000000000336E000-memory.dmp

              Filesize

              696KB

            • memory/4308-183-0x0000000000400000-0x0000000000435000-memory.dmp

              Filesize

              212KB

            • memory/4308-182-0x0000000000479000-0x000000000048A000-memory.dmp

              Filesize

              68KB

            • memory/4360-217-0x0000000000400000-0x0000000000537000-memory.dmp

              Filesize

              1.2MB

            • memory/4360-215-0x0000000000400000-0x0000000000537000-memory.dmp

              Filesize

              1.2MB

            • memory/4360-208-0x0000000000400000-0x0000000000537000-memory.dmp

              Filesize

              1.2MB

            • memory/4360-209-0x0000000000400000-0x0000000000537000-memory.dmp

              Filesize

              1.2MB

            • memory/4696-177-0x00000000008F0000-0x00000000008F7000-memory.dmp

              Filesize

              28KB

            • memory/4696-178-0x00000000008E0000-0x00000000008EC000-memory.dmp

              Filesize

              48KB

            • memory/4736-176-0x0000000000C40000-0x0000000000CAB000-memory.dmp

              Filesize

              428KB

            • memory/4736-175-0x0000000000CB0000-0x0000000000D25000-memory.dmp

              Filesize

              468KB

            • memory/4736-188-0x0000000000C40000-0x0000000000CAB000-memory.dmp

              Filesize

              428KB

            • memory/5008-135-0x0000000000400000-0x0000000000435000-memory.dmp

              Filesize

              212KB

            • memory/5008-132-0x0000000000579000-0x000000000058A000-memory.dmp

              Filesize

              68KB

            • memory/5008-134-0x0000000000400000-0x0000000000435000-memory.dmp

              Filesize

              212KB

            • memory/5008-133-0x00000000004D0000-0x00000000004D9000-memory.dmp

              Filesize

              36KB