Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

14/11/2023, 17:31

231114-v3qg7acf42 10

14/11/2023, 17:21

231114-vxdw7sdg61 10

28/10/2023, 19:29

231028-x7cs1age56 10

24/10/2023, 13:29

231024-qrn3rsdb6z 10

18/10/2023, 12:04

231018-n8ybnaeb31 10

07/09/2023, 12:10

230907-pce1wahe2x 10

Analysis

  • max time kernel
    81s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/10/2023, 13:29

General

  • Target

    81b49d3c6151419a242ba8491dff24bc345ba1dc696ff9c6aaf3c698bacefea9.exe

  • Size

    1.1MB

  • MD5

    5b3c8242aab49db13a10b3454bf14ac8

  • SHA1

    9667f4b95635d6e464963b47a2b559ca8a6add94

  • SHA256

    81b49d3c6151419a242ba8491dff24bc345ba1dc696ff9c6aaf3c698bacefea9

  • SHA512

    4aa7493a8a978e67b3e7a6f2f6008b74ca92e7a2bf34846bec189180ffce1022c38b80af39d52713c36e026ff20c9e660c6f80157fc05de4c25b502f35a2be32

  • SSDEEP

    24576:mABwP/lOtVi7TlVvmgwdaeiQAAJLqnVd:5W4q5wg6HZJG

Malware Config

Extracted

Family

djvu

C2

http://dell1.ug/Asjd74ywuhodfgdfgpenelop5/45y87hzjdfg/get.php

Attributes
  • extension

    .boot

  • offline_id

    zZyLTRlsJ8hv1HPF6BPmiyHxTSON3B8vILboott1

  • payload_url

    http://dell1.ug/files/penelop/updatewin1.exe

    http://dell1.ug/files/penelop/updatewin2.exe

    http://dell1.ug/files/penelop/updatewin.exe

    http://dell1.ug/files/penelop/3.exe

    http://dell1.ug/files/penelop/4.exe

    http://dell1.ug/files/penelop/5.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-JeLOm18e5g Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0167A73uHsdfs89

rsa_pubkey.plain

Signatures

  • Detected Djvu ransomware 13 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 33 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81b49d3c6151419a242ba8491dff24bc345ba1dc696ff9c6aaf3c698bacefea9.exe
    "C:\Users\Admin\AppData\Local\Temp\81b49d3c6151419a242ba8491dff24bc345ba1dc696ff9c6aaf3c698bacefea9.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1168
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 832
      2⤵
      • Program crash
      PID:2924
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 852
      2⤵
      • Program crash
      PID:1572
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 852
      2⤵
      • Program crash
      PID:5016
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 888
      2⤵
      • Program crash
      PID:3692
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 984
      2⤵
      • Program crash
      PID:4252
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 992
      2⤵
      • Program crash
      PID:3484
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 1524
      2⤵
      • Program crash
      PID:4260
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 1528
      2⤵
      • Program crash
      PID:3192
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 1804
      2⤵
      • Program crash
      PID:2248
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 1660
      2⤵
      • Program crash
      PID:4160
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 1596
      2⤵
      • Program crash
      PID:676
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 1640
      2⤵
      • Program crash
      PID:4208
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 1532
      2⤵
      • Program crash
      PID:4768
    • C:\Windows\SysWOW64\icacls.exe
      icacls "C:\Users\Admin\AppData\Local\28f6c368-2b79-4145-893b-9c42f07bbbaf" /deny *S-1-1-0:(OI)(CI)(DE,DC)
      2⤵
      • Modifies file permissions
      PID:1800
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 1600
      2⤵
      • Program crash
      PID:1712
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 2100
      2⤵
      • Program crash
      PID:4320
    • C:\Users\Admin\AppData\Local\Temp\81b49d3c6151419a242ba8491dff24bc345ba1dc696ff9c6aaf3c698bacefea9.exe
      "C:\Users\Admin\AppData\Local\Temp\81b49d3c6151419a242ba8491dff24bc345ba1dc696ff9c6aaf3c698bacefea9.exe" --Admin IsNotAutoStart IsNotTask
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2960
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 792
        3⤵
        • Program crash
        PID:4880
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 832
        3⤵
        • Program crash
        PID:3668
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 820
        3⤵
        • Program crash
        PID:3804
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 864
        3⤵
        • Program crash
        PID:4236
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 1036
        3⤵
        • Program crash
        PID:4080
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 1112
        3⤵
        • Program crash
        PID:3992
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 1040
        3⤵
        • Program crash
        PID:4944
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 1356
        3⤵
        • Program crash
        PID:2204
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 1584
        3⤵
        • Program crash
        PID:2092
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 1660
        3⤵
        • Program crash
        PID:3732
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 1704
        3⤵
        • Program crash
        PID:388
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 1716
        3⤵
        • Program crash
        PID:1532
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 1680
        3⤵
        • Program crash
        PID:4544
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 1732
        3⤵
        • Program crash
        PID:496
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 1756
        3⤵
        • Program crash
        PID:3004
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 1572
        3⤵
        • Program crash
        PID:1640
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 1800
        3⤵
        • Program crash
        PID:2644
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 2112
      2⤵
      • Program crash
      PID:4396
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1168 -ip 1168
    1⤵
      PID:3992
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1168 -ip 1168
      1⤵
        PID:4636
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1168 -ip 1168
        1⤵
          PID:2584
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1168 -ip 1168
          1⤵
            PID:2080
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1168 -ip 1168
            1⤵
              PID:1508
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1168 -ip 1168
              1⤵
                PID:4776
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1168 -ip 1168
                1⤵
                  PID:1448
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1168 -ip 1168
                  1⤵
                    PID:1940
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1168 -ip 1168
                    1⤵
                      PID:4956
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1168 -ip 1168
                      1⤵
                        PID:872
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1168 -ip 1168
                        1⤵
                          PID:3680
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1168 -ip 1168
                          1⤵
                            PID:4824
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1168 -ip 1168
                            1⤵
                              PID:4512
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1168 -ip 1168
                              1⤵
                                PID:4468
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1168 -ip 1168
                                1⤵
                                  PID:940
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1168 -ip 1168
                                  1⤵
                                    PID:4684
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2960 -ip 2960
                                    1⤵
                                      PID:1488
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2960 -ip 2960
                                      1⤵
                                        PID:4996
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2960 -ip 2960
                                        1⤵
                                          PID:1264
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2960 -ip 2960
                                          1⤵
                                            PID:552
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2960 -ip 2960
                                            1⤵
                                              PID:1176
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2960 -ip 2960
                                              1⤵
                                                PID:4808
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2960 -ip 2960
                                                1⤵
                                                  PID:4636
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2960 -ip 2960
                                                  1⤵
                                                    PID:3880
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2960 -ip 2960
                                                    1⤵
                                                      PID:4124
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2960 -ip 2960
                                                      1⤵
                                                        PID:4136
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2960 -ip 2960
                                                        1⤵
                                                          PID:1452
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2960 -ip 2960
                                                          1⤵
                                                            PID:3288
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2960 -ip 2960
                                                            1⤵
                                                              PID:4228
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2960 -ip 2960
                                                              1⤵
                                                                PID:444
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2960 -ip 2960
                                                                1⤵
                                                                  PID:900
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2960 -ip 2960
                                                                  1⤵
                                                                    PID:4468
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2960 -ip 2960
                                                                    1⤵
                                                                      PID:60
                                                                    • C:\Users\Admin\AppData\Local\28f6c368-2b79-4145-893b-9c42f07bbbaf\81b49d3c6151419a242ba8491dff24bc345ba1dc696ff9c6aaf3c698bacefea9.exe
                                                                      C:\Users\Admin\AppData\Local\28f6c368-2b79-4145-893b-9c42f07bbbaf\81b49d3c6151419a242ba8491dff24bc345ba1dc696ff9c6aaf3c698bacefea9.exe --Task
                                                                      1⤵
                                                                      • Executes dropped EXE
                                                                      PID:4264

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v15

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      af6988dbc87cdc5156739e23211b4e3b

                                                                      SHA1

                                                                      764e881de14df4ebd9da60c7115da12f746d3338

                                                                      SHA256

                                                                      2eade990ea964a19eb75cc73578dabe4ccd7e43bd64b94d43d3c7fefcedd9361

                                                                      SHA512

                                                                      4d2e2b88696bf6c1f6567677612d9e4fc0dc17a27f70808580c6c1918625941ab9cf3f6521e7b5d735956d37c920700044e8541655ba3ef6c31467dc69629262

                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

                                                                      Filesize

                                                                      724B

                                                                      MD5

                                                                      8202a1cd02e7d69597995cabbe881a12

                                                                      SHA1

                                                                      8858d9d934b7aa9330ee73de6c476acf19929ff6

                                                                      SHA256

                                                                      58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

                                                                      SHA512

                                                                      97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                                                                      Filesize

                                                                      410B

                                                                      MD5

                                                                      0204d6c7a8052894123808928ef3a7b3

                                                                      SHA1

                                                                      ed47516e93f31cecffda23425742f1b6a2e32f39

                                                                      SHA256

                                                                      02b9ff79a74648f376161bb6804b8f7e4acf52f9a35666d4be4b558e78db9c01

                                                                      SHA512

                                                                      6a956133e733e7ad5a50570c35e1d0eecf2fb12bfc8ef27a995a7eac09200d170420abd8505f1143e6219261fd6b32db5c9f26039a9f5f0f3efe9ca9876a29e2

                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

                                                                      Filesize

                                                                      392B

                                                                      MD5

                                                                      23fdf789f165128c9cd3ffd55b2e0382

                                                                      SHA1

                                                                      ebb6ed0505e7ba5adc546378f562c31f32f07f66

                                                                      SHA256

                                                                      0ac336d636ef44d0588735d779e77686581719e28f37186898858da190867365

                                                                      SHA512

                                                                      8d5b38655cae4099713272c8ffed66282339cb14c6e54989db994f088a177f69e4faccd08d45b3abe9be26c8c29983f314caf9abf175f1d176cde64196479c9a

                                                                    • C:\Users\Admin\AppData\Local\28f6c368-2b79-4145-893b-9c42f07bbbaf\81b49d3c6151419a242ba8491dff24bc345ba1dc696ff9c6aaf3c698bacefea9.exe

                                                                      Filesize

                                                                      1.1MB

                                                                      MD5

                                                                      5b3c8242aab49db13a10b3454bf14ac8

                                                                      SHA1

                                                                      9667f4b95635d6e464963b47a2b559ca8a6add94

                                                                      SHA256

                                                                      81b49d3c6151419a242ba8491dff24bc345ba1dc696ff9c6aaf3c698bacefea9

                                                                      SHA512

                                                                      4aa7493a8a978e67b3e7a6f2f6008b74ca92e7a2bf34846bec189180ffce1022c38b80af39d52713c36e026ff20c9e660c6f80157fc05de4c25b502f35a2be32

                                                                    • C:\Users\Admin\AppData\Local\28f6c368-2b79-4145-893b-9c42f07bbbaf\81b49d3c6151419a242ba8491dff24bc345ba1dc696ff9c6aaf3c698bacefea9.exe

                                                                      Filesize

                                                                      1.1MB

                                                                      MD5

                                                                      5b3c8242aab49db13a10b3454bf14ac8

                                                                      SHA1

                                                                      9667f4b95635d6e464963b47a2b559ca8a6add94

                                                                      SHA256

                                                                      81b49d3c6151419a242ba8491dff24bc345ba1dc696ff9c6aaf3c698bacefea9

                                                                      SHA512

                                                                      4aa7493a8a978e67b3e7a6f2f6008b74ca92e7a2bf34846bec189180ffce1022c38b80af39d52713c36e026ff20c9e660c6f80157fc05de4c25b502f35a2be32

                                                                    • memory/1168-4-0x0000000000400000-0x000000000053B000-memory.dmp

                                                                      Filesize

                                                                      1.2MB

                                                                    • memory/1168-15-0x0000000000D20000-0x0000000000E3A000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/1168-16-0x0000000000400000-0x000000000053B000-memory.dmp

                                                                      Filesize

                                                                      1.2MB

                                                                    • memory/1168-17-0x0000000000400000-0x000000000053B000-memory.dmp

                                                                      Filesize

                                                                      1.2MB

                                                                    • memory/1168-0-0x0000000000400000-0x000000000053B000-memory.dmp

                                                                      Filesize

                                                                      1.2MB

                                                                    • memory/1168-2-0x0000000000B20000-0x0000000000BEC000-memory.dmp

                                                                      Filesize

                                                                      816KB

                                                                    • memory/1168-3-0x0000000000D20000-0x0000000000E3A000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/1168-9-0x0000000000B20000-0x0000000000BEC000-memory.dmp

                                                                      Filesize

                                                                      816KB

                                                                    • memory/2960-19-0x0000000000BC0000-0x0000000000C87000-memory.dmp

                                                                      Filesize

                                                                      796KB

                                                                    • memory/2960-22-0x0000000000BC0000-0x0000000000C87000-memory.dmp

                                                                      Filesize

                                                                      796KB

                                                                    • memory/2960-21-0x0000000000400000-0x000000000053B000-memory.dmp

                                                                      Filesize

                                                                      1.2MB

                                                                    • memory/2960-28-0x0000000000400000-0x000000000053B000-memory.dmp

                                                                      Filesize

                                                                      1.2MB

                                                                    • memory/2960-29-0x0000000000400000-0x000000000053B000-memory.dmp

                                                                      Filesize

                                                                      1.2MB

                                                                    • memory/2960-32-0x0000000000400000-0x000000000053B000-memory.dmp

                                                                      Filesize

                                                                      1.2MB

                                                                    • memory/2960-33-0x0000000000400000-0x000000000053B000-memory.dmp

                                                                      Filesize

                                                                      1.2MB

                                                                    • memory/2960-20-0x0000000000C90000-0x0000000000DAA000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/4264-36-0x00000000006C0000-0x0000000000794000-memory.dmp

                                                                      Filesize

                                                                      848KB