Analysis

  • max time kernel
    153s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-02-2024 08:33

General

  • Target

    7425a083398b17d64cfb52a00d48db50.exe

  • Size

    223KB

  • MD5

    7425a083398b17d64cfb52a00d48db50

  • SHA1

    ef24f4394fe0ccfe21c5e0c025c2b04884c3d295

  • SHA256

    ea73f95c11dc2dee2df70f6cdf91f2283ed93f02e7d374e1ced51adb1e8aa2c2

  • SHA512

    3e38161eb5c845b287374c095246b96ae885140b9696d39a59ddbccd761f7f4e1e460e8a4a2931e070bacfa93aa8117a70334d5f237a51b94ebabf0f616c684b

  • SSDEEP

    3072:mIZ8zlfJWGW3dRyjg0CIWEYjmdIQUaIB/MnRiIWDWAUo2th4gjaaSpGq/B:mplfJadAj1CxEYjmWQ/wMnsF0389p7

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Extracted

Family

djvu

C2

http://habrafa.com/test1/get.php

Attributes
  • extension

    .cdcc

  • offline_id

    LBxKKiegnAy53rpqH3Pj2j46vwldiEt9kqHSuMt1

  • payload_url

    http://brusuax.com/dl/build2.exe

    http://habrafa.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-iVcrVFVRqu Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0846ASdw

rsa_pubkey.plain

Extracted

Family

risepro

C2

193.233.132.62:50500

Signatures

  • Detect Socks5Systemz Payload 3 IoCs
  • Detected Djvu ransomware 9 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Socks5Systemz

    Socks5Systemz is a botnet written in C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7425a083398b17d64cfb52a00d48db50.exe
    "C:\Users\Admin\AppData\Local\Temp\7425a083398b17d64cfb52a00d48db50.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:624
  • C:\Users\Admin\AppData\Local\Temp\DCF2.exe
    C:\Users\Admin\AppData\Local\Temp\DCF2.exe
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:2224
  • C:\Users\Admin\AppData\Local\Temp\F02D.exe
    C:\Users\Admin\AppData\Local\Temp\F02D.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2864
    • C:\Users\Admin\AppData\Local\Temp\F02D.exe
      C:\Users\Admin\AppData\Local\Temp\F02D.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3424
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\4a050be4-7cfd-4ccd-9712-6c6b862cb6f9" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:804
      • C:\Users\Admin\AppData\Local\Temp\F02D.exe
        "C:\Users\Admin\AppData\Local\Temp\F02D.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1644
        • C:\Users\Admin\AppData\Local\Temp\F02D.exe
          "C:\Users\Admin\AppData\Local\Temp\F02D.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Executes dropped EXE
          PID:4648
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4648 -s 568
            5⤵
            • Program crash
            PID:2328
  • C:\Users\Admin\AppData\Local\Temp\76F.exe
    C:\Users\Admin\AppData\Local\Temp\76F.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:4856
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
          PID:2304
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 1212
            3⤵
            • Program crash
            PID:1396
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4648 -ip 4648
        1⤵
          PID:4476
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2304 -ip 2304
          1⤵
            PID:2192
          • C:\Users\Admin\AppData\Local\Temp\607D.exe
            C:\Users\Admin\AppData\Local\Temp\607D.exe
            1⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            PID:2644
          • C:\Users\Admin\AppData\Local\Temp\6B7B.exe
            C:\Users\Admin\AppData\Local\Temp\6B7B.exe
            1⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3612
            • C:\Users\Admin\AppData\Local\Temp\is-JQ0Q0.tmp\6B7B.tmp
              "C:\Users\Admin\AppData\Local\Temp\is-JQ0Q0.tmp\6B7B.tmp" /SL5="$B0180,7390120,54272,C:\Users\Admin\AppData\Local\Temp\6B7B.exe"
              2⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of WriteProcessMemory
              PID:4336
              • C:\Users\Admin\AppData\Local\Key Signatures verification\ksverify.exe
                "C:\Users\Admin\AppData\Local\Key Signatures verification\ksverify.exe" -i
                3⤵
                • Executes dropped EXE
                PID:412
              • C:\Users\Admin\AppData\Local\Key Signatures verification\ksverify.exe
                "C:\Users\Admin\AppData\Local\Key Signatures verification\ksverify.exe" -s
                3⤵
                • Executes dropped EXE
                PID:4088

          Network

          MITRE ATT&CK Matrix ATT&CK v13

          Persistence

          Boot or Logon Autostart Execution

          1
          T1547

          Registry Run Keys / Startup Folder

          1
          T1547.001

          Privilege Escalation

          Boot or Logon Autostart Execution

          1
          T1547

          Registry Run Keys / Startup Folder

          1
          T1547.001

          Defense Evasion

          Virtualization/Sandbox Evasion

          2
          T1497

          File and Directory Permissions Modification

          1
          T1222

          Modify Registry

          1
          T1112

          Discovery

          Query Registry

          7
          T1012

          Virtualization/Sandbox Evasion

          2
          T1497

          System Information Discovery

          4
          T1082

          Peripheral Device Discovery

          1
          T1120

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Key Signatures verification\ksverify.exe
            Filesize

            2.9MB

            MD5

            6936a45ddd0b7ca33e8de3533f629640

            SHA1

            22082a6bd02761f7350f58f51d1ce936ed033b31

            SHA256

            f5ab766ada6141971442080f8f6c7577d2fb2520ebd078146d21cd779eb1f0c4

            SHA512

            c28689e92d64fa2fdd95c933d8389489d708de2b45fd49d7fa941216800bbfdb7c8af4b2e91f3052e814aedbba2e8f6a5c4bdedb9c9fee6c75714d833a5d6d1e

          • C:\Users\Admin\AppData\Local\Temp\607D.exe
            Filesize

            2.2MB

            MD5

            631417d758a28c436fdb13a7f3365117

            SHA1

            6443a00953d6823fa922e590c17774b6c398af29

            SHA256

            04dc7e7bda691cfe893123023ebc84848233d4d5c7be8c32ecddab1fcd71f2a8

            SHA512

            6048361f59aca6126366c8e9671143dd20dc0f3c125dab2861e61d312e4b193b573405699f6fe7503f3c930ec908b6d7313e27e6ea242117161e904bbf19a5dc

          • C:\Users\Admin\AppData\Local\Temp\6B7B.exe
            Filesize

            7.3MB

            MD5

            a9043e70386b92b6c09b31934a40c944

            SHA1

            0844bafea3882c369931a955cf122033ca923187

            SHA256

            299c732cff86a55ed5ea9a040efd014750652e1e14a02e7a7ea6a15127c74045

            SHA512

            483b1eb6babd5960646e77c325ef18674c14336e9b48c55be4054d142ccbb18b616781ba1e037fae6bef4a9703f30d25384382de2293b142dd1d05c02093ea83

          • C:\Users\Admin\AppData\Local\Temp\76F.exe
            Filesize

            630KB

            MD5

            8806217d770aceb98510c8a6a3324c33

            SHA1

            86194acf54b0546d981ceab5986c578372af1664

            SHA256

            85aa304fcb04d0bcf5aa14a9fedc4c820f9d0bb3dc5fda3219c29e876300bd03

            SHA512

            40d8229af81ea635e2a5d9ffeb2d891645797f63f549362ab406d164e64d9414df989f1a07a194df6e5b412884829df636eb77d74aa1316fa9a0f330f11f1ee5

          • C:\Users\Admin\AppData\Local\Temp\DCF2.exe
            Filesize

            208KB

            MD5

            3459e4e3b8c2023cb721b547fda205f6

            SHA1

            c4cc7eb4d2e016b762e685a87b16144fda258f9c

            SHA256

            9e5c6920cc755310726ff3ba27373a487206238dd24667a58c0c67219db79cbd

            SHA512

            eba48ac97ca9d2ca6626cd7fbcdb17f5a7173e03f6d8164c9b0c91902741e38043800d8815e0385ee3e57690fcc5a77d71f2c811b859e3e5d8a886b96a0070bc

          • C:\Users\Admin\AppData\Local\Temp\F02D.exe
            Filesize

            686KB

            MD5

            77c4f6bb281f77975dcafa34ac349790

            SHA1

            d7f9091c80970c92769ec6ef76b67609afabe1eb

            SHA256

            135698647c6708059999b677fcd123b3255cdb3020842db103dbe990f4cc0593

            SHA512

            ed0b9f4fba640134402a034bc7eabdf2ab6f276c2e145a8a83b54bb592d992f9b6b47e759f4a3ae5dcd3eb6d5c56c09b66f612334d335c03c4c502aaeb16ccb0

          • C:\Users\Admin\AppData\Local\Temp\F02D.exe
            Filesize

            336KB

            MD5

            1d3d243dc87e0db0f7af4573e4513e48

            SHA1

            c9c8bfd42833b04d32631682adbd155032728bc2

            SHA256

            fd9571aba28f023087da108a6664486766a03acb7cb62b1bb19b84d9b370109f

            SHA512

            fc529aa689bc73f7f858c7ee1169f5baf07700b455cc3966fb70d95fa5e5dd3987ee4fa373d4bd651becd2058f4ac95e0bd12b6f7bb52876680c62797211683f

          • C:\Users\Admin\AppData\Local\Temp\is-D7PGD.tmp\_isetup\_iscrypt.dll
            Filesize

            2KB

            MD5

            a69559718ab506675e907fe49deb71e9

            SHA1

            bc8f404ffdb1960b50c12ff9413c893b56f2e36f

            SHA256

            2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

            SHA512

            e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

          • C:\Users\Admin\AppData\Local\Temp\is-D7PGD.tmp\_isetup\_isdecmp.dll
            Filesize

            19KB

            MD5

            3adaa386b671c2df3bae5b39dc093008

            SHA1

            067cf95fbdb922d81db58432c46930f86d23dded

            SHA256

            71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

            SHA512

            bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

          • C:\Users\Admin\AppData\Local\Temp\is-JQ0Q0.tmp\6B7B.tmp
            Filesize

            692KB

            MD5

            558517932afff8def7d6c9e9a2a51668

            SHA1

            69f1830a41bf3c5f9d3e578b85071d05faefc934

            SHA256

            464ff8248e06554c0d76b162e9c10968648013091c93869b3c93be6d086b632e

            SHA512

            d23badd9d1dd0bbb370fdb4f46dca6ebf176d42f126d7ebf751f25498a047eda3f1c0e6fd93fcfaba0df29b177961201ab869cf0e14e2f360da47e7a756d69db

          • memory/412-168-0x0000000000400000-0x00000000006E1000-memory.dmp
            Filesize

            2.9MB

          • memory/412-166-0x0000000000400000-0x00000000006E1000-memory.dmp
            Filesize

            2.9MB

          • memory/412-165-0x0000000000400000-0x00000000006E1000-memory.dmp
            Filesize

            2.9MB

          • memory/412-169-0x0000000000400000-0x00000000006E1000-memory.dmp
            Filesize

            2.9MB

          • memory/624-1-0x00000000006A0000-0x00000000007A0000-memory.dmp
            Filesize

            1024KB

          • memory/624-2-0x00000000005A0000-0x00000000005AB000-memory.dmp
            Filesize

            44KB

          • memory/624-3-0x0000000000400000-0x000000000043D000-memory.dmp
            Filesize

            244KB

          • memory/624-5-0x0000000000400000-0x000000000043D000-memory.dmp
            Filesize

            244KB

          • memory/1644-51-0x0000000004720000-0x00000000047B7000-memory.dmp
            Filesize

            604KB

          • memory/2224-16-0x0000000002D00000-0x0000000002E00000-memory.dmp
            Filesize

            1024KB

          • memory/2224-26-0x0000000000400000-0x0000000002B0D000-memory.dmp
            Filesize

            39.1MB

          • memory/2224-17-0x0000000000400000-0x0000000002B0D000-memory.dmp
            Filesize

            39.1MB

          • memory/2304-67-0x0000000000400000-0x000000000048B000-memory.dmp
            Filesize

            556KB

          • memory/2304-77-0x0000000000400000-0x000000000048B000-memory.dmp
            Filesize

            556KB

          • memory/2304-63-0x0000000000400000-0x000000000048B000-memory.dmp
            Filesize

            556KB

          • memory/2304-72-0x0000000000DA0000-0x0000000000DE0000-memory.dmp
            Filesize

            256KB

          • memory/2304-69-0x0000000000DA0000-0x0000000000DE0000-memory.dmp
            Filesize

            256KB

          • memory/2304-71-0x0000000000400000-0x000000000048B000-memory.dmp
            Filesize

            556KB

          • memory/2304-73-0x0000000000DE0000-0x0000000000DE1000-memory.dmp
            Filesize

            4KB

          • memory/2616-58-0x0000000000350000-0x00000000003F2000-memory.dmp
            Filesize

            648KB

          • memory/2616-59-0x0000000074F80000-0x0000000075730000-memory.dmp
            Filesize

            7.7MB

          • memory/2616-60-0x00000000027B0000-0x00000000027C0000-memory.dmp
            Filesize

            64KB

          • memory/2616-66-0x0000000002900000-0x0000000004900000-memory.dmp
            Filesize

            32.0MB

          • memory/2616-70-0x0000000074F80000-0x0000000075730000-memory.dmp
            Filesize

            7.7MB

          • memory/2644-89-0x0000000004C10000-0x0000000004C11000-memory.dmp
            Filesize

            4KB

          • memory/2644-214-0x0000000000B20000-0x00000000010CC000-memory.dmp
            Filesize

            5.7MB

          • memory/2644-210-0x0000000000B20000-0x00000000010CC000-memory.dmp
            Filesize

            5.7MB

          • memory/2644-82-0x0000000000B20000-0x00000000010CC000-memory.dmp
            Filesize

            5.7MB

          • memory/2644-83-0x00000000779F4000-0x00000000779F6000-memory.dmp
            Filesize

            8KB

          • memory/2644-84-0x0000000004C60000-0x0000000004C61000-memory.dmp
            Filesize

            4KB

          • memory/2644-86-0x0000000004CA0000-0x0000000004CA1000-memory.dmp
            Filesize

            4KB

          • memory/2644-87-0x0000000004C20000-0x0000000004C21000-memory.dmp
            Filesize

            4KB

          • memory/2644-85-0x0000000004C30000-0x0000000004C31000-memory.dmp
            Filesize

            4KB

          • memory/2644-88-0x0000000000B20000-0x00000000010CC000-memory.dmp
            Filesize

            5.7MB

          • memory/2644-91-0x0000000004CC0000-0x0000000004CC1000-memory.dmp
            Filesize

            4KB

          • memory/2644-92-0x0000000004CB0000-0x0000000004CB1000-memory.dmp
            Filesize

            4KB

          • memory/2644-93-0x0000000004C50000-0x0000000004C51000-memory.dmp
            Filesize

            4KB

          • memory/2644-95-0x0000000004CE0000-0x0000000004CE2000-memory.dmp
            Filesize

            8KB

          • memory/2644-94-0x0000000004C80000-0x0000000004C81000-memory.dmp
            Filesize

            4KB

          • memory/2644-90-0x0000000004C70000-0x0000000004C71000-memory.dmp
            Filesize

            4KB

          • memory/2644-178-0x0000000000B20000-0x00000000010CC000-memory.dmp
            Filesize

            5.7MB

          • memory/2644-206-0x0000000000B20000-0x00000000010CC000-memory.dmp
            Filesize

            5.7MB

          • memory/2644-197-0x0000000000B20000-0x00000000010CC000-memory.dmp
            Filesize

            5.7MB

          • memory/2644-193-0x0000000000B20000-0x00000000010CC000-memory.dmp
            Filesize

            5.7MB

          • memory/2644-179-0x0000000000B20000-0x00000000010CC000-memory.dmp
            Filesize

            5.7MB

          • memory/2644-189-0x0000000000B20000-0x00000000010CC000-memory.dmp
            Filesize

            5.7MB

          • memory/2644-174-0x0000000000B20000-0x00000000010CC000-memory.dmp
            Filesize

            5.7MB

          • memory/2644-173-0x0000000000B20000-0x00000000010CC000-memory.dmp
            Filesize

            5.7MB

          • memory/2644-184-0x0000000000B20000-0x00000000010CC000-memory.dmp
            Filesize

            5.7MB

          • memory/2864-28-0x0000000004880000-0x000000000499B000-memory.dmp
            Filesize

            1.1MB

          • memory/2864-27-0x00000000047D0000-0x0000000004863000-memory.dmp
            Filesize

            588KB

          • memory/3424-29-0x0000000000400000-0x0000000000537000-memory.dmp
            Filesize

            1.2MB

          • memory/3424-31-0x0000000000400000-0x0000000000537000-memory.dmp
            Filesize

            1.2MB

          • memory/3424-32-0x0000000000400000-0x0000000000537000-memory.dmp
            Filesize

            1.2MB

          • memory/3424-33-0x0000000000400000-0x0000000000537000-memory.dmp
            Filesize

            1.2MB

          • memory/3424-43-0x0000000000400000-0x0000000000537000-memory.dmp
            Filesize

            1.2MB

          • memory/3504-23-0x0000000006D20000-0x0000000006D36000-memory.dmp
            Filesize

            88KB

          • memory/3504-4-0x00000000021C0000-0x00000000021D6000-memory.dmp
            Filesize

            88KB

          • memory/3612-175-0x0000000000400000-0x0000000000414000-memory.dmp
            Filesize

            80KB

          • memory/3612-102-0x0000000000400000-0x0000000000414000-memory.dmp
            Filesize

            80KB

          • memory/3612-100-0x0000000000400000-0x0000000000414000-memory.dmp
            Filesize

            80KB

          • memory/4088-196-0x0000000000400000-0x00000000006E1000-memory.dmp
            Filesize

            2.9MB

          • memory/4088-209-0x0000000000400000-0x00000000006E1000-memory.dmp
            Filesize

            2.9MB

          • memory/4088-172-0x0000000000400000-0x00000000006E1000-memory.dmp
            Filesize

            2.9MB

          • memory/4088-187-0x0000000000400000-0x00000000006E1000-memory.dmp
            Filesize

            2.9MB

          • memory/4088-188-0x0000000000400000-0x00000000006E1000-memory.dmp
            Filesize

            2.9MB

          • memory/4088-215-0x00000000007D0000-0x0000000000872000-memory.dmp
            Filesize

            648KB

          • memory/4088-192-0x0000000000400000-0x00000000006E1000-memory.dmp
            Filesize

            2.9MB

          • memory/4088-213-0x0000000000400000-0x00000000006E1000-memory.dmp
            Filesize

            2.9MB

          • memory/4088-177-0x0000000000400000-0x00000000006E1000-memory.dmp
            Filesize

            2.9MB

          • memory/4088-183-0x0000000000400000-0x00000000006E1000-memory.dmp
            Filesize

            2.9MB

          • memory/4088-200-0x0000000000400000-0x00000000006E1000-memory.dmp
            Filesize

            2.9MB

          • memory/4088-201-0x00000000007D0000-0x0000000000872000-memory.dmp
            Filesize

            648KB

          • memory/4088-202-0x00000000007D0000-0x0000000000872000-memory.dmp
            Filesize

            648KB

          • memory/4336-176-0x0000000000400000-0x00000000004BD000-memory.dmp
            Filesize

            756KB

          • memory/4336-182-0x0000000000650000-0x0000000000651000-memory.dmp
            Filesize

            4KB

          • memory/4336-110-0x0000000000650000-0x0000000000651000-memory.dmp
            Filesize

            4KB

          • memory/4648-57-0x0000000000400000-0x0000000000537000-memory.dmp
            Filesize

            1.2MB

          • memory/4648-55-0x0000000000400000-0x0000000000537000-memory.dmp
            Filesize

            1.2MB

          • memory/4648-54-0x0000000000400000-0x0000000000537000-memory.dmp
            Filesize

            1.2MB