Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
21-01-2024 14:54
Behavioral task
behavioral1
Sample
8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe
Resource
win10-20231220-en
Behavioral task
behavioral3
Sample
8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe
Resource
win11-20231222-en
General
-
Target
8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe
-
Size
1.1MB
-
MD5
1cd4ab809fb2a9eebb801ab9c9d4a545
-
SHA1
ce4f4ba93ec1adf8b5c3bac8552fbafd8dcddf27
-
SHA256
8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0
-
SHA512
db0476d3193a89104c116805eb34be5ea46774d77745b1e1ecfe48ec5a573e96150e9e48fcd630384c9bb88847ef12b46bd124b4b8ef1a072be4c1b319a76264
-
SSDEEP
12288:CU5s41o+T7VmjE2Tz23vxO3jWhn370VPWJFwBybD3Y5WrxqnuskDq4:t5swNmjEoujhn3wVPWJFwEQWV+u75
Malware Config
Signatures
-
Detects Trigona ransomware 14 IoCs
Processes:
resource yara_rule behavioral1/memory/1032-0-0x0000000000400000-0x0000000000526000-memory.dmp family_trigona behavioral1/memory/1032-1-0x0000000000400000-0x0000000000526000-memory.dmp family_trigona behavioral1/memory/1032-2-0x0000000000400000-0x0000000000526000-memory.dmp family_trigona behavioral1/memory/1032-4-0x0000000000400000-0x0000000000526000-memory.dmp family_trigona behavioral1/memory/1032-9-0x0000000000400000-0x0000000000526000-memory.dmp family_trigona behavioral1/memory/1032-217-0x0000000000400000-0x0000000000526000-memory.dmp family_trigona behavioral1/memory/1032-2131-0x0000000000400000-0x0000000000526000-memory.dmp family_trigona behavioral1/memory/1032-2132-0x0000000000400000-0x0000000000526000-memory.dmp family_trigona behavioral1/memory/1032-2136-0x0000000000400000-0x0000000000526000-memory.dmp family_trigona behavioral1/memory/1032-2291-0x0000000000400000-0x0000000000526000-memory.dmp family_trigona behavioral1/memory/1032-2691-0x0000000000400000-0x0000000000526000-memory.dmp family_trigona behavioral1/memory/1032-6052-0x0000000000400000-0x0000000000526000-memory.dmp family_trigona behavioral1/memory/1032-10367-0x0000000000400000-0x0000000000526000-memory.dmp family_trigona behavioral1/memory/1032-10368-0x0000000000400000-0x0000000000526000-memory.dmp family_trigona -
Trigona
A ransomware first seen at the beginning of the 2022.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\E396C5B5AD52FD722237798B9483D478 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe" 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe -
Drops desktop.ini file(s) 11 IoCs
Processes:
8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exedescription ioc process File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3427588347-1492276948-3422228430-1000\desktop.ini 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\desktop.ini 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Microsoft Games\FreeCell\desktop.ini 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Microsoft Games\Hearts\desktop.ini 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Microsoft Games\Purble Place\desktop.ini 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\$Recycle.Bin\S-1-5-21-3427588347-1492276948-3422228430-1000\desktop.ini 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Microsoft Games\Chess\desktop.ini 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Microsoft Games\Mahjong\desktop.ini 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Microsoft Games\Solitaire\desktop.ini 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe -
Drops file in Program Files directory 64 IoCs
Processes:
8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exedescription ioc process File created \??\c:\Program Files (x86)\Common Files\microsoft shared\VSTA\how_to_decrypt.hta 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File created \??\c:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\css\how_to_decrypt.hta 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\DVD Maker\Shared\DvdStyles\Memories\btn-next-static.png 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Novokuznetsk 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Java\jre7\lib\zi\America\Danmarkshavn 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\settings.html 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File created \??\c:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\how_to_decrypt.hta 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\NavigationRight_SelectionSubpicture.png 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-text_zh_CN.jar 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Java\jre7\lib\plugin.jar 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Java\jre7\lib\zi\Europe\Vienna 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\VideoLAN\VLC\lua\playlist\appletrailers.luac 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Windows Mail\it-IT\msoeres.dll.mui 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File created \??\c:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\js\how_to_decrypt.hta 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File created \??\c:\Program Files\VideoLAN\VLC\locale\ca\LC_MESSAGES\how_to_decrypt.hta 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File created \??\c:\Program Files\VideoLAN\VLC\plugins\audio_mixer\how_to_decrypt.hta 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_babypink_Thumbnail.bmp 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.browser.jdp_5.5.0.165303.jar 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Java\jre7\lib\zi\Atlantic\South_Georgia 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Windows Media Player\it-IT\wmpnetwk.exe.mui 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\square_dot.png 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File created \??\c:\Program Files\Microsoft Games\More Games\de-DE\how_to_decrypt.hta 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File created \??\c:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\how_to_decrypt.hta 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File created \??\c:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\how_to_decrypt.hta 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\ink\ipsesp.xml 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\Stationery\Psychedelic.jpg 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Jerusalem 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\VideoLAN\VLC\locale\lg\LC_MESSAGES\vlc.mo 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\VideoLAN\VLC\NEWS.txt 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File created \??\c:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp_5.5.0.165303\how_to_decrypt.hta 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File created \??\c:\Program Files (x86)\Windows NT\TableTextService\how_to_decrypt.hta 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\Stationery\SoftBlue.jpg 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\203x8subpicture.png 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages_ja.properties 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\LucidaTypewriterBold.ttf 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\jre\LICENSE 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-sampler_zh_CN.jar 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File created \??\c:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\how_to_decrypt.hta 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\browser\VisualElements\PrivateBrowsing_150.png 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Windows Photo Viewer\ja-JP\ImagingDevices.exe.mui 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Java\jre7\lib\zi\Asia\Irkutsk 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\ink\hwrdeush.dat 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\tipresx.dll.mui 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\navSubpicture.png 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\DVD Maker\Shared\DvdStyles\Travel\play-background.png 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\EST5 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Java\jre7\lib\zi\Atlantic\Stanley 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\calendar_double.png 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File created \??\c:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\how_to_decrypt.hta 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Internet Explorer\SIGNUP\install.ins 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\jre\lib\jsse.jar 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Urumqi 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Kwajalein 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-actions.xml 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-application.jar 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File created \??\c:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\how_to_decrypt.hta 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\Cordoba 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.common_5.5.0.165303.jar 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Java\jre7\lib\fonts\LucidaSansRegular.ttf 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Java\jre7\lib\management\jmxremote.access 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File opened for modification \??\c:\Program Files\Java\jre7\lib\zi\Pacific\Tahiti 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File created \??\c:\Program Files\Microsoft Games\Minesweeper\it-IT\how_to_decrypt.hta 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File created \??\c:\Program Files\Java\jdk1.7.0_80\jre\lib\cmm\how_to_decrypt.hta 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe File created \??\c:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\how_to_decrypt.hta 8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe"C:\Users\Admin\AppData\Local\Temp\8804d34b7cf7bd2fc6e20c0dc27da287cee9fccbc52a5630c4752f9cfc6d6cd0.exe"1⤵
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\$Recycle.Bin\S-1-5-21-3427588347-1492276948-3422228430-1000\desktop.iniFilesize
2KB
MD500603293f211500dfd81e192e0933d25
SHA17ddd705597a89769ea367407fb4d0b3d8a2a49c1
SHA25610e9df6b0591b10f1f05f74d186ddf14ea1306bd7128c2096c735a901b09d4c7
SHA512b5345a7736034ecae770b3ce065882c0e67c767a253f536395046385a53a0e8ee0a6e78e5421bba2015b64b272be079cab6a128f2fa352ba6203d3835a2d733f
-
C:\$Recycle.Bin\S-1-5-21-3427588347-1492276948-3422228430-1000\how_to_decrypt.htaFilesize
12KB
MD54ddbb53d3c34edbd201a59b98d2423b4
SHA113e3880dbb1b9a49ebececdbb11731ef6dee29a3
SHA256782477449f3eba9d16c6786dea7e045dd3cb7941116603ddd9190ab1c22db43e
SHA5121a497db5552f958a471fe65a0fa9c53b853c1d0b42fe3bf7b1bfb0fbbeab3c564f61139e8d94871b946d3c4a494196b753a6231e757aeb3a6a503d284ef7a919
-
memory/1032-2132-0x0000000000400000-0x0000000000526000-memory.dmpFilesize
1.1MB
-
memory/1032-2136-0x0000000000400000-0x0000000000526000-memory.dmpFilesize
1.1MB
-
memory/1032-9-0x0000000000400000-0x0000000000526000-memory.dmpFilesize
1.1MB
-
memory/1032-2-0x0000000000400000-0x0000000000526000-memory.dmpFilesize
1.1MB
-
memory/1032-217-0x0000000000400000-0x0000000000526000-memory.dmpFilesize
1.1MB
-
memory/1032-2131-0x0000000000400000-0x0000000000526000-memory.dmpFilesize
1.1MB
-
memory/1032-0-0x0000000000400000-0x0000000000526000-memory.dmpFilesize
1.1MB
-
memory/1032-4-0x0000000000400000-0x0000000000526000-memory.dmpFilesize
1.1MB
-
memory/1032-1-0x0000000000400000-0x0000000000526000-memory.dmpFilesize
1.1MB
-
memory/1032-2291-0x0000000000400000-0x0000000000526000-memory.dmpFilesize
1.1MB
-
memory/1032-2691-0x0000000000400000-0x0000000000526000-memory.dmpFilesize
1.1MB
-
memory/1032-6052-0x0000000000400000-0x0000000000526000-memory.dmpFilesize
1.1MB
-
memory/1032-10367-0x0000000000400000-0x0000000000526000-memory.dmpFilesize
1.1MB
-
memory/1032-10368-0x0000000000400000-0x0000000000526000-memory.dmpFilesize
1.1MB