Analysis

  • max time kernel
    97s
  • max time network
    97s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    12-11-2024 19:54

General

  • Target

    RNSM00314.7z

  • Size

    2.9MB

  • MD5

    26138e381f742d7fc61cc0fa315a41dc

  • SHA1

    ce8e7265ea7327505059359ea56f1ba357d1b6ad

  • SHA256

    94ed1eb77bd9cff40d865edad84a0034224588fc694dd756ee5967717083347c

  • SHA512

    96ec6dbb1589c3622b1e55dd1f6a7b69b7108914b7a8f9213578238bf48931deff4367d124a268bb579e821821565b3ece6261cd17b04355f13ee5fa82b6ed82

  • SSDEEP

    49152:FPsnlnPwN8V5295whbTYd9UYji6iYc7HDuRjSQCmkkIpXxRVTvzARRjor887+1G8:hIt4NU585whbsde56cGNC+0XxI8r/T4L

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1032

C2

okiweqwejqweijqwe.net

nnnvnvnasjdnqwe.net

iaihbqwhebqwehabsd.com

Attributes
  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    worker

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

  • GandCrab payload 3 IoCs
  • Gandcrab

    Gandcrab is a Trojan horse that encrypts files on a computer.

  • Gandcrab family
  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Gozi family
  • Troldesh family
  • Troldesh, Shade, Encoder.858

    Troldesh is a ransomware spread by malspam.

  • Executes dropped EXE 7 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 4 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 53 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1196
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00314.7z"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2408
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3028
      • C:\Users\Admin\Desktop\00314\HEUR-Trojan-Ransom.Win32.Generic-3201b8a148880cd9348f4567f394e57c55e4aba7198dfff43658f4206c5cbf58.exe
        HEUR-Trojan-Ransom.Win32.Generic-3201b8a148880cd9348f4567f394e57c55e4aba7198dfff43658f4206c5cbf58.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        • Suspicious behavior: EnumeratesProcesses
        PID:2968
      • C:\Users\Admin\Desktop\00314\HEUR-Trojan-Ransom.Win32.Generic-4b7d31d943eb9ae9a9515ad8c4ab8efa45365654e2b2de2662f0e4ef0995e85e.exe
        HEUR-Trojan-Ransom.Win32.Generic-4b7d31d943eb9ae9a9515ad8c4ab8efa45365654e2b2de2662f0e4ef0995e85e.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2884
        • C:\Users\Admin\Desktop\00314\HEUR-Trojan-Ransom.Win32.Generic-4b7d31d943eb9ae9a9515ad8c4ab8efa45365654e2b2de2662f0e4ef0995e85e.exe
          "C:\Users\Admin\Desktop\00314\HEUR-Trojan-Ransom.Win32.Generic-4b7d31d943eb9ae9a9515ad8c4ab8efa45365654e2b2de2662f0e4ef0995e85e.exe"
          4⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • outlook_office_path
          • outlook_win_path
          PID:3064
      • C:\Users\Admin\Desktop\00314\Trojan-Ransom.Win32.Blocker.meia-832f19c7a9ea6e21c747fe83fb4eaeaea6215c1217efb162f911e855090d3b8b.exe
        Trojan-Ransom.Win32.Blocker.meia-832f19c7a9ea6e21c747fe83fb4eaeaea6215c1217efb162f911e855090d3b8b.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2696
        • C:\Windows\SysWOW64\explorer.exe
          "C:\Windows\system32\explorer.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1248
      • C:\Users\Admin\Desktop\00314\Trojan-Ransom.Win32.Foreign.nznk-bb95c4d5366696aeda3954d4048ddfb590750f29af157e9ee2d883533ed427ec.exe
        Trojan-Ransom.Win32.Foreign.nznk-bb95c4d5366696aeda3954d4048ddfb590750f29af157e9ee2d883533ed427ec.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:2708
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          PID:1872
      • C:\Users\Admin\Desktop\00314\Trojan-Ransom.Win32.GandCrypt.aah-deebf5053bbc166e9f7167781d393064d4cca8c2e748578790e28f1f4ea7a945.exe
        Trojan-Ransom.Win32.GandCrypt.aah-deebf5053bbc166e9f7167781d393064d4cca8c2e748578790e28f1f4ea7a945.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Enumerates connected drives
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2724
        • C:\Windows\splwow64.exe
          C:\Windows\splwow64.exe 12288
          4⤵
            PID:2736
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup zonealarm.bit ns1.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2076
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup ransomware.bit ns2.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1048
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup zonealarm.bit ns2.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1524
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup ransomware.bit ns1.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1328
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup zonealarm.bit ns1.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1912
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup ransomware.bit ns2.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1536
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup zonealarm.bit ns2.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2128
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup ransomware.bit ns1.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1940
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup zonealarm.bit ns1.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2504
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup ransomware.bit ns2.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2300
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup zonealarm.bit ns2.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1504
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup ransomware.bit ns1.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1720
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup zonealarm.bit ns1.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2496
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup ransomware.bit ns2.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2796
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup zonealarm.bit ns2.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2392
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup ransomware.bit ns1.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2260
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup zonealarm.bit ns1.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2848
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup ransomware.bit ns2.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2856
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup zonealarm.bit ns2.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2852
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup ransomware.bit ns1.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2000
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup zonealarm.bit ns1.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2972
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup ransomware.bit ns2.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2860
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup zonealarm.bit ns2.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3056
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup ransomware.bit ns1.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2904
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup zonealarm.bit ns1.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2864
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup ransomware.bit ns2.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1728
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup zonealarm.bit ns2.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:324
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup ransomware.bit ns1.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2424
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup zonealarm.bit ns1.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2304
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup ransomware.bit ns2.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1996
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup zonealarm.bit ns2.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1688
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup ransomware.bit ns1.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1480
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup zonealarm.bit ns1.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2428
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup ransomware.bit ns2.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2064
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup zonealarm.bit ns2.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2176
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup ransomware.bit ns1.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2336
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup zonealarm.bit ns1.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2120
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup ransomware.bit ns2.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1908
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup zonealarm.bit ns2.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2784
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup ransomware.bit ns1.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2124
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup zonealarm.bit ns1.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2960
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup ransomware.bit ns2.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2364
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup zonealarm.bit ns2.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2256
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup ransomware.bit ns1.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2804
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup zonealarm.bit ns1.corp-servers.ru
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1008
        • C:\Users\Admin\Desktop\00314\Trojan-Ransom.Win32.Shade.oql-14d002fcddb663a0b9b6c1535ef711581c9dd8d6e4d0215499e78fcf44c393e8.exe
          Trojan-Ransom.Win32.Shade.oql-14d002fcddb663a0b9b6c1535ef711581c9dd8d6e4d0215499e78fcf44c393e8.exe
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:2756
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /4
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:880
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\BlockStep.txt
        2⤵
        • Opens file in notepad (likely ransom note)
        PID:1096

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Desktop\00314\HEUR-Trojan-Ransom.Win32.Generic-3201b8a148880cd9348f4567f394e57c55e4aba7198dfff43658f4206c5cbf58.exe

      Filesize

      727KB

      MD5

      6633c99b2c5bebfc2b32aa2c3d8667aa

      SHA1

      d00bf2fbcbbab2aa5ea1931a8ee1a34f913f2cb2

      SHA256

      3201b8a148880cd9348f4567f394e57c55e4aba7198dfff43658f4206c5cbf58

      SHA512

      f74f0a1abc7d915d9b6fd0d1ec6c24ed4ea062867e8dbba799ecb554c8d4730d5de6de91563ae8b9dcf2723c07b000355e1582901fae2588d598579c2f634888

    • C:\Users\Admin\Desktop\00314\HEUR-Trojan-Ransom.Win32.Generic-4b7d31d943eb9ae9a9515ad8c4ab8efa45365654e2b2de2662f0e4ef0995e85e.exe

      Filesize

      260KB

      MD5

      ddb2fe695edb5ded29389ad905cbe749

      SHA1

      0a52fa3ceecd90d2b224a76827acfc3c5cdab19a

      SHA256

      4b7d31d943eb9ae9a9515ad8c4ab8efa45365654e2b2de2662f0e4ef0995e85e

      SHA512

      96def7e9b311528ca4cb4ef13cd212f14824e835ceddd58cb923bb46f6981d29b38d59afd57e79218900e5d461f12ac0374cf2052c5281f91e9a48d47707fa9f

    • C:\Users\Admin\Desktop\00314\Trojan-Ransom.Win32.Blocker.meia-832f19c7a9ea6e21c747fe83fb4eaeaea6215c1217efb162f911e855090d3b8b.exe

      Filesize

      63KB

      MD5

      c1824e58a621f1573f5dde0ed419b3f9

      SHA1

      73233526af2d45896d8293f4234b68eee82f0af4

      SHA256

      832f19c7a9ea6e21c747fe83fb4eaeaea6215c1217efb162f911e855090d3b8b

      SHA512

      b8007bfd84d21461a4d8acc8277899241fd9722e3c63a398687961dfd962d52933d439415a64eb7fcc6c63c28a34423801f35e12c02e559604daa27492c64731

    • C:\Users\Admin\Desktop\00314\Trojan-Ransom.Win32.Foreign.nznk-bb95c4d5366696aeda3954d4048ddfb590750f29af157e9ee2d883533ed427ec.exe

      Filesize

      2.7MB

      MD5

      b99927b1f16dae0fb29dfa86599b7a86

      SHA1

      ab5a059416dab9f06c5d9a7de5c3af7a98669288

      SHA256

      bb95c4d5366696aeda3954d4048ddfb590750f29af157e9ee2d883533ed427ec

      SHA512

      fb772b44c9c7adee53ec8e6878bda28f7b98a6c32d4156327fcf026d6ec7c514b14cda8bbc9072322f01724a743c9ce93587fb56cf1cd93ae3d9719a26798151

    • C:\Users\Admin\Desktop\00314\Trojan-Ransom.Win32.GandCrypt.aah-deebf5053bbc166e9f7167781d393064d4cca8c2e748578790e28f1f4ea7a945.exe

      Filesize

      221KB

      MD5

      83f8243f44d844337d11e278d5b4ac2b

      SHA1

      8f13e86188314c7752da1ed570ceacd9eff40ed9

      SHA256

      deebf5053bbc166e9f7167781d393064d4cca8c2e748578790e28f1f4ea7a945

      SHA512

      79cb8699065bd37b5d479d9302eb81fb4dfe1cf73da0596ad4e156575292a48d39388b1e793e4ccd298e36319ee98723c7b4e946ef5aa5b8fee57b890351cbe6

    • C:\Users\Admin\Desktop\00314\Trojan-Ransom.Win32.Shade.oql-14d002fcddb663a0b9b6c1535ef711581c9dd8d6e4d0215499e78fcf44c393e8.exe

      Filesize

      1.4MB

      MD5

      e5d04ea03b0724443d9a04c57971419e

      SHA1

      89270c7fcbee4e1947c613651d32f93e4f11e1ae

      SHA256

      14d002fcddb663a0b9b6c1535ef711581c9dd8d6e4d0215499e78fcf44c393e8

      SHA512

      ad7687527fcad48e75b9e90a8dcbb7163cdd6b48a0a9f07341730b024dee8a5a167d8de9dbe808eddf26ea50b8a3f6fb76ad10e73956ebce61d5ea2b89db8446

    • memory/880-56-0x0000000140000000-0x00000001405E8000-memory.dmp

      Filesize

      5.9MB

    • memory/880-55-0x0000000140000000-0x00000001405E8000-memory.dmp

      Filesize

      5.9MB

    • memory/880-74-0x0000000140000000-0x00000001405E8000-memory.dmp

      Filesize

      5.9MB

    • memory/880-73-0x0000000140000000-0x00000001405E8000-memory.dmp

      Filesize

      5.9MB

    • memory/1196-89-0x0000000002B50000-0x0000000002BD9000-memory.dmp

      Filesize

      548KB

    • memory/1196-98-0x0000000002B50000-0x0000000002BD9000-memory.dmp

      Filesize

      548KB

    • memory/1196-99-0x0000000002B50000-0x0000000002BD9000-memory.dmp

      Filesize

      548KB

    • memory/1196-100-0x0000000002B50000-0x0000000002BD9000-memory.dmp

      Filesize

      548KB

    • memory/1196-96-0x0000000002B50000-0x0000000002BD9000-memory.dmp

      Filesize

      548KB

    • memory/1196-101-0x0000000002B50000-0x0000000002BD9000-memory.dmp

      Filesize

      548KB

    • memory/1196-104-0x0000000002B50000-0x0000000002BD9000-memory.dmp

      Filesize

      548KB

    • memory/1248-52-0x0000000000080000-0x0000000000093000-memory.dmp

      Filesize

      76KB

    • memory/1248-26-0x0000000000080000-0x0000000000093000-memory.dmp

      Filesize

      76KB

    • memory/1872-82-0x000007FFFFFD9000-0x000007FFFFFDA000-memory.dmp

      Filesize

      4KB

    • memory/1872-93-0x0000000000280000-0x0000000000309000-memory.dmp

      Filesize

      548KB

    • memory/1872-83-0x0000000000280000-0x0000000000309000-memory.dmp

      Filesize

      548KB

    • memory/2696-45-0x0000000000210000-0x0000000000223000-memory.dmp

      Filesize

      76KB

    • memory/2708-64-0x0000000000400000-0x00000000006D1000-memory.dmp

      Filesize

      2.8MB

    • memory/2708-65-0x00000000022F0000-0x000000000232A000-memory.dmp

      Filesize

      232KB

    • memory/2708-72-0x00000000022F0000-0x000000000232A000-memory.dmp

      Filesize

      232KB

    • memory/2708-85-0x00000000022F0000-0x000000000232A000-memory.dmp

      Filesize

      232KB

    • memory/2708-75-0x0000000000400000-0x00000000006D1000-memory.dmp

      Filesize

      2.8MB

    • memory/2724-53-0x0000000000400000-0x0000000005227000-memory.dmp

      Filesize

      78.2MB

    • memory/2724-42-0x0000000000400000-0x0000000005227000-memory.dmp

      Filesize

      78.2MB

    • memory/2724-43-0x0000000000330000-0x0000000000347000-memory.dmp

      Filesize

      92KB

    • memory/2756-80-0x0000000000400000-0x0000000000606000-memory.dmp

      Filesize

      2.0MB

    • memory/2756-77-0x0000000000400000-0x0000000000606000-memory.dmp

      Filesize

      2.0MB

    • memory/2756-106-0x0000000000400000-0x0000000000606000-memory.dmp

      Filesize

      2.0MB

    • memory/2756-63-0x0000000000400000-0x0000000000606000-memory.dmp

      Filesize

      2.0MB

    • memory/2756-57-0x0000000000400000-0x0000000000606000-memory.dmp

      Filesize

      2.0MB

    • memory/2968-27-0x0000000000400000-0x00000000004BC000-memory.dmp

      Filesize

      752KB

    • memory/3064-35-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3064-33-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3064-37-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/3064-38-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3064-40-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3064-41-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3064-29-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/3064-31-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB