Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-02-2023 08:08

General

  • Target

    f2c5b17ddc3745a92d3913cd69b2e0cc88aaf57716fe22ce49f3331a2beebdc6.exe

  • Size

    314KB

  • MD5

    d0da8b99593537e0f528cdbb9349de35

  • SHA1

    86df8cbd120d5f1e953c6e2f623a397d37a28b33

  • SHA256

    f2c5b17ddc3745a92d3913cd69b2e0cc88aaf57716fe22ce49f3331a2beebdc6

  • SHA512

    ab3aa1444e5eca183793a255fc59d6bca83f938461f22240a5ef37d89167a22555fc32e1f2a73093b66b48c6f37f51392736dce93ba91d3602262255a64df161

  • SSDEEP

    3072:YwtqJCK5wXR5o9gWBETrM0hLEeqNL9gYzr4+qyTWByUAl1sJsBWu:Y0qTUo9gWcwocBgwLTWUjPIu

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    260255

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Extracted

Family

djvu

C2

http://bihsy.com/lancer/get.php

Attributes
  • extension

    .erop

  • offline_id

    xVB7l5LcUtDGyghMgGsTvebrKc0RGgDXlN1BoKt1

  • payload_url

    http://uaery.top/dl/build2.exe

    http://bihsy.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-8pCGyFnOj6 Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0641JOsie

rsa_pubkey.plain

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    ad75d4e2e9636ca662a337b6e798d36159f23acfc89bbe9400d0d451bd8d69fd

Signatures

  • Detected Djvu ransomware 10 IoCs
  • Detects Smokeloader packer 1 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f2c5b17ddc3745a92d3913cd69b2e0cc88aaf57716fe22ce49f3331a2beebdc6.exe
    "C:\Users\Admin\AppData\Local\Temp\f2c5b17ddc3745a92d3913cd69b2e0cc88aaf57716fe22ce49f3331a2beebdc6.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4664
  • C:\Users\Admin\AppData\Local\Temp\C691.exe
    C:\Users\Admin\AppData\Local\Temp\C691.exe
    1⤵
    • Checks computer location settings
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:212
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /tn "svcupdater" /tr "C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
      2⤵
      • Creates scheduled task(s)
      PID:1800
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 212 -s 1032
      2⤵
      • Program crash
      PID:996
  • C:\Users\Admin\AppData\Local\Temp\C79B.exe
    C:\Users\Admin\AppData\Local\Temp\C79B.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3080
    • C:\Users\Admin\AppData\Local\Temp\C79B.exe
      C:\Users\Admin\AppData\Local\Temp\C79B.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3624
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\723f008c-5721-438d-bc8d-f09a80dbd7a7" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:3284
      • C:\Users\Admin\AppData\Local\Temp\C79B.exe
        "C:\Users\Admin\AppData\Local\Temp\C79B.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4536
        • C:\Users\Admin\AppData\Local\Temp\C79B.exe
          "C:\Users\Admin\AppData\Local\Temp\C79B.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3944
          • C:\Users\Admin\AppData\Local\8537e92c-901d-4148-8386-ee699fd94fe0\build3.exe
            "C:\Users\Admin\AppData\Local\8537e92c-901d-4148-8386-ee699fd94fe0\build3.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4432
            • C:\Windows\SysWOW64\schtasks.exe
              /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
              6⤵
              • Creates scheduled task(s)
              PID:3020
  • C:\Users\Admin\AppData\Local\Temp\C887.exe
    C:\Users\Admin\AppData\Local\Temp\C887.exe
    1⤵
    • Executes dropped EXE
    PID:4316
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 212 -ip 212
    1⤵
      PID:2740
    • C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe
      C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe
      1⤵
      • Executes dropped EXE
      PID:3156
    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3856
      • C:\Windows\SysWOW64\schtasks.exe
        /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
        2⤵
        • Creates scheduled task(s)
        PID:1272
    • C:\Users\Admin\AppData\Roaming\ttfhibh
      C:\Users\Admin\AppData\Roaming\ttfhibh
      1⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:4904

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

      Filesize

      2KB

      MD5

      0a0b229200e844dd99e5bd4a96157dc9

      SHA1

      f0d9dd308e562849fba66546c08cb6868613df4d

      SHA256

      01bc83810123b2cf28d2a027a4201f93537daeda3f40c4ef7d83c0bd44baedda

      SHA512

      af4d0a4566bec38a8f1e97ee2a4daf81f1b4ef2a2893dbd09fb4b147f6c86bf37ab24959a7f5550e7c477187c825182e737d04bc6c56647e76a6c027529dac61

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

      Filesize

      1KB

      MD5

      95699a1d2d3132a4067cecdcbc504fca

      SHA1

      0491453351e9eedac59152594e9b5ff0f091b54e

      SHA256

      ec6eb0fbc54c26ddbc5e7a8227b657fa20e0b9d565994001273ba32ccd0c53f4

      SHA512

      93ea4adfa46089cd37bb40077f0c4db111f4a16ae3d312b5d35450462b6228b7cae0e57c2888386041749df2014997cec3e590e436161825a6d42e44f6f694f0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

      Filesize

      488B

      MD5

      d4b16183a57d2c3e7aff4f48a9f14f51

      SHA1

      96ec5763773ff7de0ad201127b9936dfc8aa2855

      SHA256

      83559b4fb5817e12d489af0ecefcbd66b6b55671ade2e0bd7e604cfdb2bf337c

      SHA512

      a955baa9eb8de7697dbdb6a8891460419c420b15ce8b31da17f3fbf86286f298893b3960248806954f8135df01ca0481086fd52ef8f03286d44c35c1329aef46

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

      Filesize

      482B

      MD5

      cf0267d125d1ecffef95da9cf28a1a25

      SHA1

      555b34f04f518db1a1c90235182f6c2768b8d8e3

      SHA256

      fed358a367d0018c6c6666e66c96e3168860f4f03d73f5a7058d1ff8d7658d57

      SHA512

      4cdb85d88fb79b3add5350958c3a3c8b9a181f4af569257ad79d5440975c36da04d0f24545fe422e46979e2d850f6ebb2709eba9557b171b8efd9a6744dace1c

    • C:\Users\Admin\AppData\Local\723f008c-5721-438d-bc8d-f09a80dbd7a7\C79B.exe

      Filesize

      706KB

      MD5

      46909da148de57b2d85591626aedbd76

      SHA1

      8000c3d7b0b33eaa538f8b0e09eff0559af06287

      SHA256

      0ca1867b6e512a1e78d8a00cecf4fdc09b665b31f9af122c78ee4a1e5de5a692

      SHA512

      c3a4c1392e9300c5a9255a8bec4757d8244023f5353d693a9e7a1496da92f1b90482f9201035ab07b669c228f8bedbe467f5c54bfb8f4d50c90350b0f2076603

    • C:\Users\Admin\AppData\Local\8537e92c-901d-4148-8386-ee699fd94fe0\build3.exe

      Filesize

      9KB

      MD5

      9ead10c08e72ae41921191f8db39bc16

      SHA1

      abe3bce01cd34afc88e2c838173f8c2bd0090ae1

      SHA256

      8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

      SHA512

      aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

    • C:\Users\Admin\AppData\Local\8537e92c-901d-4148-8386-ee699fd94fe0\build3.exe

      Filesize

      9KB

      MD5

      9ead10c08e72ae41921191f8db39bc16

      SHA1

      abe3bce01cd34afc88e2c838173f8c2bd0090ae1

      SHA256

      8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

      SHA512

      aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

    • C:\Users\Admin\AppData\Local\Temp\C691.exe

      Filesize

      378KB

      MD5

      b141bc58618c537917cc1da179cbe8ab

      SHA1

      c76d3f5eeae9493e41a272a974b5dfec5f4e4724

      SHA256

      fd999e4a07d8b3d95f9d9231fd496b0125b56094f1b03ddca7a7b074c1d8c03e

      SHA512

      5c72f63124a394602a36a4f985e33a41e8159f54653f431c270b8f0fa8e13131517c31b497a936d5f5d3d27397f40fc7909efc4bfd04c01bcca7f306860c3114

    • C:\Users\Admin\AppData\Local\Temp\C691.exe

      Filesize

      378KB

      MD5

      b141bc58618c537917cc1da179cbe8ab

      SHA1

      c76d3f5eeae9493e41a272a974b5dfec5f4e4724

      SHA256

      fd999e4a07d8b3d95f9d9231fd496b0125b56094f1b03ddca7a7b074c1d8c03e

      SHA512

      5c72f63124a394602a36a4f985e33a41e8159f54653f431c270b8f0fa8e13131517c31b497a936d5f5d3d27397f40fc7909efc4bfd04c01bcca7f306860c3114

    • C:\Users\Admin\AppData\Local\Temp\C79B.exe

      Filesize

      706KB

      MD5

      46909da148de57b2d85591626aedbd76

      SHA1

      8000c3d7b0b33eaa538f8b0e09eff0559af06287

      SHA256

      0ca1867b6e512a1e78d8a00cecf4fdc09b665b31f9af122c78ee4a1e5de5a692

      SHA512

      c3a4c1392e9300c5a9255a8bec4757d8244023f5353d693a9e7a1496da92f1b90482f9201035ab07b669c228f8bedbe467f5c54bfb8f4d50c90350b0f2076603

    • C:\Users\Admin\AppData\Local\Temp\C79B.exe

      Filesize

      706KB

      MD5

      46909da148de57b2d85591626aedbd76

      SHA1

      8000c3d7b0b33eaa538f8b0e09eff0559af06287

      SHA256

      0ca1867b6e512a1e78d8a00cecf4fdc09b665b31f9af122c78ee4a1e5de5a692

      SHA512

      c3a4c1392e9300c5a9255a8bec4757d8244023f5353d693a9e7a1496da92f1b90482f9201035ab07b669c228f8bedbe467f5c54bfb8f4d50c90350b0f2076603

    • C:\Users\Admin\AppData\Local\Temp\C79B.exe

      Filesize

      706KB

      MD5

      46909da148de57b2d85591626aedbd76

      SHA1

      8000c3d7b0b33eaa538f8b0e09eff0559af06287

      SHA256

      0ca1867b6e512a1e78d8a00cecf4fdc09b665b31f9af122c78ee4a1e5de5a692

      SHA512

      c3a4c1392e9300c5a9255a8bec4757d8244023f5353d693a9e7a1496da92f1b90482f9201035ab07b669c228f8bedbe467f5c54bfb8f4d50c90350b0f2076603

    • C:\Users\Admin\AppData\Local\Temp\C79B.exe

      Filesize

      706KB

      MD5

      46909da148de57b2d85591626aedbd76

      SHA1

      8000c3d7b0b33eaa538f8b0e09eff0559af06287

      SHA256

      0ca1867b6e512a1e78d8a00cecf4fdc09b665b31f9af122c78ee4a1e5de5a692

      SHA512

      c3a4c1392e9300c5a9255a8bec4757d8244023f5353d693a9e7a1496da92f1b90482f9201035ab07b669c228f8bedbe467f5c54bfb8f4d50c90350b0f2076603

    • C:\Users\Admin\AppData\Local\Temp\C79B.exe

      Filesize

      706KB

      MD5

      46909da148de57b2d85591626aedbd76

      SHA1

      8000c3d7b0b33eaa538f8b0e09eff0559af06287

      SHA256

      0ca1867b6e512a1e78d8a00cecf4fdc09b665b31f9af122c78ee4a1e5de5a692

      SHA512

      c3a4c1392e9300c5a9255a8bec4757d8244023f5353d693a9e7a1496da92f1b90482f9201035ab07b669c228f8bedbe467f5c54bfb8f4d50c90350b0f2076603

    • C:\Users\Admin\AppData\Local\Temp\C887.exe

      Filesize

      172KB

      MD5

      185596291815d84f3894dbeef5ea54e7

      SHA1

      6ff9c5982d02187a4e9961a98ab490ba479ed8e2

      SHA256

      3d723b2eac949a522f1d0d48d060a528cb275ae14803762200a760fdf9720e11

      SHA512

      99f61314609ce59795d7dce5c17a1564a18613d8babe242d192b83911c8baf0f746067e9aee08609da5f0d5514cb761c1364859f082bc1d18c6ecc7208f28eb5

    • C:\Users\Admin\AppData\Local\Temp\C887.exe

      Filesize

      172KB

      MD5

      185596291815d84f3894dbeef5ea54e7

      SHA1

      6ff9c5982d02187a4e9961a98ab490ba479ed8e2

      SHA256

      3d723b2eac949a522f1d0d48d060a528cb275ae14803762200a760fdf9720e11

      SHA512

      99f61314609ce59795d7dce5c17a1564a18613d8babe242d192b83911c8baf0f746067e9aee08609da5f0d5514cb761c1364859f082bc1d18c6ecc7208f28eb5

    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

      Filesize

      9KB

      MD5

      9ead10c08e72ae41921191f8db39bc16

      SHA1

      abe3bce01cd34afc88e2c838173f8c2bd0090ae1

      SHA256

      8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

      SHA512

      aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

      Filesize

      9KB

      MD5

      9ead10c08e72ae41921191f8db39bc16

      SHA1

      abe3bce01cd34afc88e2c838173f8c2bd0090ae1

      SHA256

      8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

      SHA512

      aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

    • C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe

      Filesize

      742.4MB

      MD5

      60acd059bd2eed319b43ca17dc42b5f1

      SHA1

      20a9bc00e833c052c5c76207c7fa04753c9937b7

      SHA256

      33cdc8b2b0a810c4959c4d390435e9d8b941ccd28234d84093b7e9b97dddb8e6

      SHA512

      a0193ab51025caf904a077155de40a9f582fd1758e7fac3d8d7d7f869bbd085a0098150323bf4219992314c9e63e918cf294263e62e96b4876cb3ca3c9824577

    • C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe

      Filesize

      742.4MB

      MD5

      60acd059bd2eed319b43ca17dc42b5f1

      SHA1

      20a9bc00e833c052c5c76207c7fa04753c9937b7

      SHA256

      33cdc8b2b0a810c4959c4d390435e9d8b941ccd28234d84093b7e9b97dddb8e6

      SHA512

      a0193ab51025caf904a077155de40a9f582fd1758e7fac3d8d7d7f869bbd085a0098150323bf4219992314c9e63e918cf294263e62e96b4876cb3ca3c9824577

    • C:\Users\Admin\AppData\Roaming\ttfhibh

      Filesize

      314KB

      MD5

      d0da8b99593537e0f528cdbb9349de35

      SHA1

      86df8cbd120d5f1e953c6e2f623a397d37a28b33

      SHA256

      f2c5b17ddc3745a92d3913cd69b2e0cc88aaf57716fe22ce49f3331a2beebdc6

      SHA512

      ab3aa1444e5eca183793a255fc59d6bca83f938461f22240a5ef37d89167a22555fc32e1f2a73093b66b48c6f37f51392736dce93ba91d3602262255a64df161

    • C:\Users\Admin\AppData\Roaming\ttfhibh

      Filesize

      314KB

      MD5

      d0da8b99593537e0f528cdbb9349de35

      SHA1

      86df8cbd120d5f1e953c6e2f623a397d37a28b33

      SHA256

      f2c5b17ddc3745a92d3913cd69b2e0cc88aaf57716fe22ce49f3331a2beebdc6

      SHA512

      ab3aa1444e5eca183793a255fc59d6bca83f938461f22240a5ef37d89167a22555fc32e1f2a73093b66b48c6f37f51392736dce93ba91d3602262255a64df161

    • memory/212-183-0x0000000000400000-0x000000000047A000-memory.dmp

      Filesize

      488KB

    • memory/212-182-0x00000000020A0000-0x00000000020E7000-memory.dmp

      Filesize

      284KB

    • memory/212-181-0x0000000000719000-0x0000000000743000-memory.dmp

      Filesize

      168KB

    • memory/212-160-0x0000000000000000-mapping.dmp

    • memory/212-205-0x0000000000719000-0x0000000000743000-memory.dmp

      Filesize

      168KB

    • memory/212-206-0x0000000000400000-0x000000000047A000-memory.dmp

      Filesize

      488KB

    • memory/1272-219-0x0000000000000000-mapping.dmp

    • memory/1800-190-0x0000000000000000-mapping.dmp

    • memory/2700-141-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-158-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-251-0x0000000001510000-0x0000000001520000-memory.dmp

      Filesize

      64KB

    • memory/2700-157-0x0000000007EE0000-0x0000000007EF0000-memory.dmp

      Filesize

      64KB

    • memory/2700-250-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-156-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-153-0x0000000007EE0000-0x0000000007EF0000-memory.dmp

      Filesize

      64KB

    • memory/2700-249-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-248-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-247-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-246-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-244-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-154-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-245-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-243-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-240-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-241-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-239-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-152-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-150-0x0000000003360000-0x0000000003370000-memory.dmp

      Filesize

      64KB

    • memory/2700-151-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-148-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-237-0x0000000001500000-0x0000000001510000-memory.dmp

      Filesize

      64KB

    • memory/2700-149-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-238-0x0000000001500000-0x0000000001510000-memory.dmp

      Filesize

      64KB

    • memory/2700-187-0x0000000007EE0000-0x0000000007EF0000-memory.dmp

      Filesize

      64KB

    • memory/2700-189-0x0000000007EE0000-0x0000000007EF0000-memory.dmp

      Filesize

      64KB

    • memory/2700-235-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-140-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-236-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-234-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-233-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-230-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-231-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-146-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-145-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-144-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-143-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-229-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-228-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-142-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-159-0x0000000007EE0000-0x0000000007EF0000-memory.dmp

      Filesize

      64KB

    • memory/2700-147-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-155-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-188-0x0000000007EE0000-0x0000000007EF0000-memory.dmp

      Filesize

      64KB

    • memory/2700-139-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-227-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-226-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-138-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-137-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/2700-136-0x0000000003340000-0x0000000003350000-memory.dmp

      Filesize

      64KB

    • memory/3020-211-0x0000000000000000-mapping.dmp

    • memory/3080-163-0x0000000000000000-mapping.dmp

    • memory/3080-176-0x00000000022C0000-0x00000000023DB000-memory.dmp

      Filesize

      1.1MB

    • memory/3080-175-0x0000000002226000-0x00000000022B7000-memory.dmp

      Filesize

      580KB

    • memory/3156-215-0x0000000000797000-0x00000000007C1000-memory.dmp

      Filesize

      168KB

    • memory/3156-220-0x0000000000797000-0x00000000007C1000-memory.dmp

      Filesize

      168KB

    • memory/3156-216-0x0000000000400000-0x000000000047A000-memory.dmp

      Filesize

      488KB

    • memory/3284-179-0x0000000000000000-mapping.dmp

    • memory/3624-171-0x0000000000000000-mapping.dmp

    • memory/3624-172-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/3624-186-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/3624-178-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/3624-174-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/3624-177-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/3944-212-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/3944-201-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/3944-195-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/3944-194-0x0000000000400000-0x0000000000537000-memory.dmp

      Filesize

      1.2MB

    • memory/3944-191-0x0000000000000000-mapping.dmp

    • memory/4316-170-0x00000000003B0000-0x00000000003BE000-memory.dmp

      Filesize

      56KB

    • memory/4316-166-0x0000000000000000-mapping.dmp

    • memory/4316-202-0x0000000000770000-0x000000000077D000-memory.dmp

      Filesize

      52KB

    • memory/4316-169-0x0000000000740000-0x0000000000751000-memory.dmp

      Filesize

      68KB

    • memory/4316-207-0x00000000003B0000-0x00000000003BE000-memory.dmp

      Filesize

      56KB

    • memory/4432-208-0x0000000000000000-mapping.dmp

    • memory/4536-184-0x0000000000000000-mapping.dmp

    • memory/4536-196-0x00000000022AF000-0x0000000002340000-memory.dmp

      Filesize

      580KB

    • memory/4664-135-0x0000000000400000-0x00000000004CA000-memory.dmp

      Filesize

      808KB

    • memory/4664-133-0x0000000000620000-0x0000000000629000-memory.dmp

      Filesize

      36KB

    • memory/4664-134-0x0000000000400000-0x00000000004CA000-memory.dmp

      Filesize

      808KB

    • memory/4664-132-0x00000000006EE000-0x0000000000703000-memory.dmp

      Filesize

      84KB

    • memory/4904-225-0x0000000000400000-0x00000000004CA000-memory.dmp

      Filesize

      808KB

    • memory/4904-224-0x0000000000400000-0x00000000004CA000-memory.dmp

      Filesize

      808KB

    • memory/4904-223-0x000000000061E000-0x0000000000633000-memory.dmp

      Filesize

      84KB