Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    359s
  • max time network
    336s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/07/2024, 15:12

General

  • Target

    Chaos Ransomware Builder v4.exe

  • Size

    550KB

  • MD5

    8b855e56e41a6e10d28522a20c1e0341

  • SHA1

    17ea75272cfe3749c6727388fd444d2c970f9d01

  • SHA256

    f2665f89ba53abd3deb81988c0d5194992214053e77fc89b98b64a31a7504d77

  • SHA512

    eefab442b9c1be379e00c6a7de9d6d7d327ad8fd52d62a5744e104f6caa44f7147a8e74f340870f9c017980a3d8a5a86a05f76434539c01270c442a66b2af908

  • SSDEEP

    3072:9UJAYdi2YcRVm16Pn6tpzqJG/sX9i2YcRPm16Pn6ckCjSH5EyR9aKZt18rTu+i2S:9aiWm162qJEsNiym16ryAiym168

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\read_it.txt

Family

chaos

Ransom Note
----> Chaos is multi language ransomware. Translate your note to any language <---- All of your files have been encrypted Your computer was infected with a ransomware virus. Your files have been encrypted and you won't be able to decrypt them without our help.What can I do to get my files back?You can buy our special decryption software, this software will allow you to recover all of your data and remove the ransomware from your computer.The price for the software is $1,500. Payment can be made in Bitcoin only. How do I pay, where do I get Bitcoin? Purchasing Bitcoin varies from country to country, you are best advised to do a quick google search yourself to find out how to buy Bitcoin. Many of our customers have reported these sites to be fast and reliable: Coinmama - hxxps://www.coinmama.com Bitpanda - hxxps://www.bitpanda.com Payment informationAmount: 0.1473766 BTC Bitcoin Address: bc1qlnzcep4l4ac0ttdrq7awxev9ehu465f2vpt9x0

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 9 IoCs
  • Drops startup file 3 IoCs
  • Executes dropped EXE 26 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Opens file in notepad (likely ransom note) 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Chaos Ransomware Builder v4.exe
    "C:\Users\Admin\AppData\Local\Temp\Chaos Ransomware Builder v4.exe"
    1⤵
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4764
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5b5teebi\5b5teebi.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1056
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3781.tmp" "c:\Users\Admin\Downloads\CSCFA921DB9FAAB40B7B0373418F122BDAB.TMP"
        3⤵
          PID:4168
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ciy3xpv0\ciy3xpv0.cmdline"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4652
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD2B3.tmp" "c:\Users\Admin\Downloads\CSC93B926F2CADA4E11B82357DFB72E606F.TMP"
          3⤵
            PID:760
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\3emxat4l\3emxat4l.cmdline"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3868
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA8CA.tmp" "c:\Users\Admin\Videos\CSC5D3AD5B232A94ED788E06540B1492B70.TMP"
            3⤵
              PID:4612
        • \??\c:\windows\system32\svchost.exe
          c:\windows\system32\svchost.exe -k localservice -s fdPHost
          1⤵
            PID:2996
          • C:\Windows\System32\rundll32.exe
            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
            1⤵
              PID:1592
            • C:\Users\Admin\Downloads\hvh.exe
              "C:\Users\Admin\Downloads\hvh.exe"
              1⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2944
              • C:\Users\Admin\AppData\Roaming\svchost.exe
                "C:\Users\Admin\AppData\Roaming\svchost.exe"
                2⤵
                • Drops startup file
                • Executes dropped EXE
                • Drops desktop.ini file(s)
                • Suspicious behavior: AddClipboardFormatListener
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2616
                • C:\Windows\system32\NOTEPAD.EXE
                  "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt
                  3⤵
                  • Opens file in notepad (likely ransom note)
                  PID:3016
            • C:\Users\Admin\Downloads\hvh2.exe
              "C:\Users\Admin\Downloads\hvh2.exe"
              1⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4100
              • C:\Users\Admin\AppData\Roaming\svchost.exe
                "C:\Users\Admin\AppData\Roaming\svchost.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2964
            • C:\Users\Admin\Downloads\hvh2.exe
              "C:\Users\Admin\Downloads\hvh2.exe"
              1⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4540
              • C:\Users\Admin\AppData\Roaming\svchost.exe
                "C:\Users\Admin\AppData\Roaming\svchost.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:2484
            • C:\Users\Admin\Downloads\hvh2.exe
              "C:\Users\Admin\Downloads\hvh2.exe"
              1⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2156
              • C:\Users\Admin\AppData\Roaming\svchost.exe
                "C:\Users\Admin\AppData\Roaming\svchost.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:2100
            • C:\Users\Admin\Downloads\hvh2.exe
              "C:\Users\Admin\Downloads\hvh2.exe"
              1⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1272
              • C:\Users\Admin\AppData\Roaming\svchost.exe
                "C:\Users\Admin\AppData\Roaming\svchost.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:2192
            • C:\Users\Admin\Downloads\hvh2.exe
              "C:\Users\Admin\Downloads\hvh2.exe"
              1⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1544
              • C:\Users\Admin\AppData\Roaming\svchost.exe
                "C:\Users\Admin\AppData\Roaming\svchost.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:1748
            • C:\Users\Admin\Downloads\hvh2.exe
              "C:\Users\Admin\Downloads\hvh2.exe"
              1⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4280
              • C:\Users\Admin\AppData\Roaming\svchost.exe
                "C:\Users\Admin\AppData\Roaming\svchost.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:3864
            • C:\Windows\system32\NOTEPAD.EXE
              "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\read_it.txt
              1⤵
              • Opens file in notepad (likely ransom note)
              PID:3196
            • C:\Users\Admin\Downloads\hvh2.exe
              "C:\Users\Admin\Downloads\hvh2.exe"
              1⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3984
              • C:\Users\Admin\AppData\Roaming\svchost.exe
                "C:\Users\Admin\AppData\Roaming\svchost.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:4336
            • C:\Users\Admin\Videos\hh.exe
              "C:\Users\Admin\Videos\hh.exe"
              1⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:992
              • C:\Users\Admin\AppData\Roaming\svchost.exe
                "C:\Users\Admin\AppData\Roaming\svchost.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:4196
            • C:\Windows\system32\NOTEPAD.EXE
              "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Videos\read_it.txt
              1⤵
              • Opens file in notepad (likely ransom note)
              PID:420
            • C:\Users\Admin\Videos\hh.exe
              "C:\Users\Admin\Videos\hh.exe"
              1⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2552
              • C:\Users\Admin\AppData\Roaming\svchost.exe
                "C:\Users\Admin\AppData\Roaming\svchost.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:4428
            • C:\Users\Admin\Videos\hh.exe
              "C:\Users\Admin\Videos\hh.exe"
              1⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1236
              • C:\Users\Admin\AppData\Roaming\svchost.exe
                "C:\Users\Admin\AppData\Roaming\svchost.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:4452
            • C:\Users\Admin\Videos\hh.exe
              "C:\Users\Admin\Videos\hh.exe"
              1⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1704
              • C:\Users\Admin\AppData\Roaming\svchost.exe
                "C:\Users\Admin\AppData\Roaming\svchost.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:1940
            • C:\Users\Admin\Videos\hh.exe
              "C:\Users\Admin\Videos\hh.exe"
              1⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:604
              • C:\Users\Admin\AppData\Roaming\svchost.exe
                "C:\Users\Admin\AppData\Roaming\svchost.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:4124

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\hvh2.exe.log

              Filesize

              226B

              MD5

              d78293ab15ad25b5d6e8740fe5fd3872

              SHA1

              51b70837f90f2bff910daee706e6be8d62a3550e

              SHA256

              4d64746f8d24ec321b1a6c3a743946b66d8317cbc6bac6fed675a4bf6fa181f3

              SHA512

              1127435ef462f52677e1ef4d3b8cfdf9f5d95c832b4c9f41526b7448d315f25d96d3d5454108569b76d66d78d07ea5ba4a1ba8baee108e8c1b452ba19cc04925

            • C:\Users\Admin\AppData\Local\Temp\RES3781.tmp

              Filesize

              1KB

              MD5

              2814d1c4b8a6a3d732792e1d552006df

              SHA1

              1c3afdf9da77539f3795897c6faf453e3ddcbb6b

              SHA256

              6b7d703a09d34cf5fb03e281e42705debbe04052df6b63d1006a9fd305418217

              SHA512

              766d191bcec2e0b7e32abe97cfc2734dd2771149e57fe9b87fcc0391db623b574bb9d40c2738e8583abb287341a247f67c62be68a3adba0d11d597eda9a27a80

            • C:\Users\Admin\AppData\Local\Temp\RESA8CA.tmp

              Filesize

              1KB

              MD5

              446909f931ce5e5dbce23a698406cd8c

              SHA1

              94ed6442c0b4a9969cdefb23598e3fb2666daa56

              SHA256

              d52937ffe989768a623b39981fead41fad242b44a9a1f3b1071551766c3c86e5

              SHA512

              8093b42a02b329a26d62186378bbcde2a56a3427d7999be0ad4b70d0a3c287a09b6ae1595ca870822dfc25034d3259d3f02dba700978dec36a917489eb8b4f1c

            • C:\Users\Admin\AppData\Local\Temp\RESD2B3.tmp

              Filesize

              1KB

              MD5

              fb87da658fc19c301ddb96b67d696901

              SHA1

              36eb536642a608b737c485d5594c9b00fe269918

              SHA256

              695fef2f05da4e3bec28b87f869d35de63156381b21e001b0301c174234f0bae

              SHA512

              26077b5c3c65a91b4c54486d1549c3982cb05f469c3ff0255538b315759a8c247b25dfab07924def7bf0e4aad82cd6c5d95b94fd479c17922d7dea216d5f3111

            • C:\Users\Admin\Desktop\read_it.txt

              Filesize

              964B

              MD5

              4217b8b83ce3c3f70029a056546f8fd0

              SHA1

              487cdb5733d073a0427418888e8f7070fe782a03

              SHA256

              7d767e907be373c680d1f7884d779588eb643bebb3f27bf3b5ed4864aa4d8121

              SHA512

              2a58c99fa52f99c276e27eb98aef2ce1205f16d1e37b7e87eb69e9ecda22b578195a43f1a7f70fead6ba70421abf2f85c917551c191536eaf1f3011d3d24f740

            • C:\Users\Admin\Downloads\hvh.exe

              Filesize

              22KB

              MD5

              e9dc585ab8f95b9f729b56ca42cca9ba

              SHA1

              c5cb88cccf8d3670429dfda773fee2ca4f42a5eb

              SHA256

              f513cf9d3ee246a8ebc2f2d042fd38b6322a11d45fad06ee6d8b588cc1475f4a

              SHA512

              c7f8aba38636b3f05654eb99323a42f0e3978cee075df8cb4a72081c31dc899d4f82d99bc5d646027d5b267786b297b934860f763f5346fa47805463d3890476

            • C:\Users\Admin\Downloads\hvh2.exe

              Filesize

              23KB

              MD5

              a55063d63b7941c46ce307ade2127466

              SHA1

              2c3060b127b350520ee438d8e27e48abaad69624

              SHA256

              53d34689f921600a0c83153b71846639213462cfb425272f88840265202a0671

              SHA512

              d548806e47e2a79c4036cce2073128a80cd036a399058223c69a2d6d098192163c3d988ce9d2017424af7db99ecb8ee75bb44218f8a96730f97c8eb09146fd9a

            • C:\Users\Admin\Videos\hh.exe

              Filesize

              23KB

              MD5

              4e6b22236ac97a727f4f90ead2f2bbf9

              SHA1

              3a3f45aea9241660f4b4ee565645d69991779df2

              SHA256

              42fa99e7d3d6c693ceb75e464474456382a98734bbfcef40c3f6481fd15f3a46

              SHA512

              581884fa3e4053d284491a26dfe5bcfdfa3d9d2ac81f0dd7de292be75839702b26f4ecc8c9dcd7c9b9f5f487e7ebcc6b29e2f68e8fa19d240fa10d6192b09cda

            • \??\c:\Users\Admin\AppData\Local\Temp\3emxat4l\3emxat4l.cmdline

              Filesize

              327B

              MD5

              e305cd011f0fb399b8d7227ea2f8bd48

              SHA1

              d69799afe5522cb3844f687d54b374e1398f67c8

              SHA256

              14d9f8973f1312cdec9242fa24dd4ff837b3f772af9db5492d28517e226ecd2d

              SHA512

              d502f0a773f402ad7f28e727d5c655238cdfa8030ca5f10fe2997ebd071d6e8d671da1b27c67e7c3e8a5afaa00d6b2cd8794284aedecdae4c59aa2a5d332f054

            • \??\c:\Users\Admin\AppData\Local\Temp\5b5teebi\5b5teebi.0.cs

              Filesize

              30KB

              MD5

              76e03563ee3ab915bce443d213332ee7

              SHA1

              145d7da3c060b50eec81085a8fd05fcc3d849e78

              SHA256

              4c83fba26f2af551ca9044aca13e24ee109228b0c06563ebe75e36a0d294c607

              SHA512

              d40bb7d1d1427557198332d7ccd82182179a5cf2d61d0674f16d1b80104d6a1b111473f32965bbdb48f9e98ac386be5bf0bff7a0f80121bed58e6a482731bc1f

            • \??\c:\Users\Admin\AppData\Local\Temp\5b5teebi\5b5teebi.cmdline

              Filesize

              331B

              MD5

              45d84f41f3467d73c157a994696db721

              SHA1

              7406887d2bde4f9da094ddab05b5cd33ade0a619

              SHA256

              2491ed569d5e1ce3915a923d0c2eb0c94643eb92860466fceca64a7ea2880085

              SHA512

              71c60f34f04e5301d697004ce0c7917ff6ff22c0b4e61db5380b8d85b65b40be76519634b4dc6491d79ade87d8fcb0da9730587db5cc75fb23a4011d2d1cc463

            • \??\c:\Users\Admin\AppData\Local\Temp\ciy3xpv0\ciy3xpv0.0.cs

              Filesize

              31KB

              MD5

              b93d9fedf0aa811b180702c955689d32

              SHA1

              eda69f5cf72fd6b585d8ca04ac32cc83f2259cd0

              SHA256

              db542b1ad2ff5cbda54e99bbacd1eb28601d95611a4037688b9fc84f18de367b

              SHA512

              e183c3cad9bc4625e2d6a20b36e5a1c7df4e9a1d3df64f0ba077572198f419e790b4f6fcc9823cd6d7ded4e18d05e309c63efdb2e0cdac1d434104e614a4b33a

            • \??\c:\Users\Admin\AppData\Local\Temp\ciy3xpv0\ciy3xpv0.cmdline

              Filesize

              332B

              MD5

              cf8b004437b296432c6004f8886a3b82

              SHA1

              21b68fa4d20847ed84bdd6c0a62cbba7f646d3f3

              SHA256

              0a2ce1c1f32cbd2ce717fffe3a13ccb12d9c7d90d2f9b1a826c9ad7ac43b3832

              SHA512

              693bc70999823f35e06a84a20f93f3a38b937f7bb31233a96d4475268e219e469e9cab6021a0d0bae0c17468a534a794dfb6e3282d013c082bfb918b0279139f

            • \??\c:\Users\Admin\Downloads\CSC93B926F2CADA4E11B82357DFB72E606F.TMP

              Filesize

              1KB

              MD5

              2d6d577ab2659db54138a9f9c2485ff9

              SHA1

              6b78174240a1b991f26b3f2240270cbff8d69c99

              SHA256

              ca21b81bdf5d7cad77d3b8e4c4bc5ead801d7499618cc2be010082a2de18a02e

              SHA512

              fe1dcf6e14110f1ee6f5e5d2a7f0ceec1e8fea1060505ec5b309a05683ddb69b4b690802e5c70b5a5963abf54806dc30e72c01164b9eb7421874d453c04cfaa7

            • \??\c:\Users\Admin\Downloads\CSCFA921DB9FAAB40B7B0373418F122BDAB.TMP

              Filesize

              1KB

              MD5

              db48332b666058d0db48a5461f5356b4

              SHA1

              27af6df905030477b1feadd0124d5313c1e432e5

              SHA256

              e73451e991906956e4576d56bca26246ff87c5d283f0305e128a72996349bbb5

              SHA512

              8f6729bc3e258edb6794806af3aa6e6f51f44290511405388e1d74cd5b447553a53d07fdd4f0b3a29ad5f2d23c310ac9ab23f980a5ab693201ea883661a600ad

            • \??\c:\Users\Admin\Videos\CSC5D3AD5B232A94ED788E06540B1492B70.TMP

              Filesize

              1KB

              MD5

              2af36729151d1d1bdbb914d4a1c51154

              SHA1

              c0c4595f7e58d91810d4c5c9615c1fd16a3c6006

              SHA256

              95efd991a11ca7a45ffa5e854c784b844e6e132a274c1d1d694d177efb77dc54

              SHA512

              e69107b36c8b8ba98d415208f2c88d822ca6d3d36ed23031e112a7e145865a149b8296c4920b746920eb1dbe95e01c975853811c770aee97c36be89aa08a3988

            • memory/992-141-0x0000000000B10000-0x0000000000B1C000-memory.dmp

              Filesize

              48KB

            • memory/2944-24-0x0000000000A40000-0x0000000000A4C000-memory.dmp

              Filesize

              48KB

            • memory/4100-108-0x0000000000E40000-0x0000000000E4C000-memory.dmp

              Filesize

              48KB

            • memory/4764-8-0x00007FFFF2EF0000-0x00007FFFF38DC000-memory.dmp

              Filesize

              9.9MB

            • memory/4764-7-0x00007FFFF2EF0000-0x00007FFFF38DC000-memory.dmp

              Filesize

              9.9MB

            • memory/4764-0-0x0000000000550000-0x00000000005DE000-memory.dmp

              Filesize

              568KB

            • memory/4764-6-0x00007FFFF2EF0000-0x00007FFFF38DC000-memory.dmp

              Filesize

              9.9MB

            • memory/4764-5-0x00007FFFF2EF0000-0x00007FFFF38DC000-memory.dmp

              Filesize

              9.9MB

            • memory/4764-4-0x00007FFFF2EF0000-0x00007FFFF38DC000-memory.dmp

              Filesize

              9.9MB

            • memory/4764-3-0x00007FFFF2EF0000-0x00007FFFF38DC000-memory.dmp

              Filesize

              9.9MB

            • memory/4764-2-0x00007FFFF2EF0000-0x00007FFFF38DC000-memory.dmp

              Filesize

              9.9MB

            • memory/4764-1-0x00007FFFF2EF3000-0x00007FFFF2EF4000-memory.dmp

              Filesize

              4KB