Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    19-05-2024 05:24

General

  • Target

    58c285c3df955356b0de4fd8366aafca_JaffaCakes118.ps1

  • Size

    903KB

  • MD5

    58c285c3df955356b0de4fd8366aafca

  • SHA1

    4573f3abf225c00fddeb3ebdace7bf77bbe04b15

  • SHA256

    0b1f6d6c3d5008efd67b9eeebbea8c2e04a2fe3f9ee5db01004384c1419cc170

  • SHA512

    c6eb9f8a638f221000783451e4dc3576836a4a34d842c9e8850e2f58e0e5c82b942f31fba8f705532c6cc85057872b2a059e72b40644fdd0c64c3e4a6abb5622

  • SSDEEP

    12288:UlKC3i/930kve4tUwcuVJEb1OK4RtGIyc/ZFvRWwajB16I6WY0aMAnbfMeAoJRxI:o

Malware Config

Extracted

Path

C:\Program Files\Microsoft Office\Office14\35A0AF-Readme.txt

Family

netwalker

Ransom Note
Hi! Your files are encrypted. All encrypted files for this computer has extension: .35a0af -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. Additionally, your data may have been stolen and if you do not cooperate with us, it will become publicly available on our blog. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_35a0af: sW9Q6Sja7AEKkRuAjJDDxgrtuJoTrtEa2YtOp8XWo91Z44JPk7 nYgtPks4ivs7t9SRlYmmI1zwuCf3PeRhqif53UiUZKepRTWGbS 13Hduy9Y8PjT0m4XyVpYjBK+8cBCYT8LKj/yHkQR08GzufJaox O7VU9Q6gmK9baT/l3OyUQYrzG4BF3bUEcw9j31L4oLOEXSYtI1 BSOvccvFLNEewKkzUyZ9CCPl3ahQ9agF2mVNZFKsZScggfPvZq 2Q+KsgSzxokVDJSpY64lbolZgNAGsxkjhRY9P+uQ==}
URLs

http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion

http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion

Signatures

  • Netwalker Ransomware

    Ransomware family with multiple versions. Also known as MailTo.

  • Renames multiple (7416) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\58c285c3df955356b0de4fd8366aafca_JaffaCakes118.ps1
    1⤵
    • Drops file in Program Files directory
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\rgnhujj8.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2544
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES10D3.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC10D2.tmp"
        3⤵
          PID:2656
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\u7mc3gsb.cmdline"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2744
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES118F.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC118E.tmp"
          3⤵
            PID:2736
        • C:\Windows\system32\notepad.exe
          C:\Windows\system32\notepad.exe "C:\Users\Admin\Desktop\35A0AF-Readme.txt"
          2⤵
            PID:10904
        • C:\Windows\system32\vssvc.exe
          C:\Windows\system32\vssvc.exe
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:5972

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Microsoft Office\Office14\35A0AF-Readme.txt

          Filesize

          1KB

          MD5

          453f7f410d53a3ac7a45b15169d7db11

          SHA1

          fe86d1828c878898cc792047d6fbe2afcb569ff9

          SHA256

          11dd05654a6e4a089bf8cd351af7a116bcd391a1e198804ca6a83d83eb450e3a

          SHA512

          2dea25fdbe1d87f0f41381c5e37b2a3e1e51c9b0f34747c93710d033f4d8ff04d15f3f5ce311f0d55d3dc102bc6d1d1ba61557c63604e296c87f986efcfbf523

        • C:\ProgramData\Microsoft\Assistance\Client\1.0\en-US\Help_CValidator.H1D.35a0af

          Filesize

          12KB

          MD5

          69d48e7aa48a8f337c1d58846240cc04

          SHA1

          8965e01ea9ee6ae66fd13586e637c22c584ff84d

          SHA256

          ece4d5bb332a01cb5ccd0cae13d2b74240ed2c7c9868309428e76966ff493b4a

          SHA512

          a90f83bf866c51c750edb55ca13df8224e5ee8147bf00500259a35863aae4921262e1ffffd6820cab53909fa1d5ddc683f8b6e83eac8ab04b33748ae711ebcb8

        • C:\ProgramData\Microsoft\Assistance\Client\1.0\en-US\Help_MKWD_BestBet.H1W.35a0af

          Filesize

          201KB

          MD5

          07569cb13e6a5b682adb0e45f44fb017

          SHA1

          e5375478d280a58b497dd295505099b36efd96d3

          SHA256

          84685bb2c5de1f7079f1d74e049a8e29cf7eec063bbdca99e4624603825ba335

          SHA512

          508a2a25b6c1261b9cd40bc834df8d099714dcf3c96981599dfeeb86c4288b06dfbcb17c045a1664f67ebb4b0c17607cf5e9caa71252313e7c3962b7ee3aebbb

        • C:\ProgramData\Microsoft\Assistance\Client\1.0\en-US\Help{9DAA54E8-CD95-4107-8E7F-BA3F24732D95}.H1Q.35a0af

          Filesize

          864KB

          MD5

          76f5226a41f2528b15620156f24fdbc0

          SHA1

          9688eeff3b7a927ba4454628b1fcc6247aac7920

          SHA256

          bf2de366f9fb09cecef9aa41878ec3d0873314b7b62b492ee65af512561b5fc9

          SHA512

          1af0bfeedaaa279c75108a03794bc5500de81dc2953de503ccff394574e3ae774a9fedc6ff65ec7e4c4b88abfcd100c997180a701a4d23bfc6e4f11e8d1f8eec

        • C:\ProgramData\Microsoft\Windows\Ringtones\Ringtone 01.wma.35a0af

          Filesize

          197KB

          MD5

          6a17f1e83b869aaa6ac9b08dede88084

          SHA1

          b8557f50a11ac66f7c2f84e579c0863858dbfe44

          SHA256

          f5d0d7c5a0a3a4bb6f2e41274216d24aafb758d627ef7bdd44f6781001e2fe91

          SHA512

          5f794cc508458e8d06e5152c54cfd6cc5f3957057cbca0b970b2bf87b3d6d5ee41c74c138f041ec314f06efa6946c730a7bdb0d247d04485a7c1dfed3e169881

        • C:\ProgramData\Microsoft\Windows\Ringtones\Ringtone 03.wma.35a0af

          Filesize

          92KB

          MD5

          9091c17dcac4e576bc5e358c3b72ed33

          SHA1

          881c5ceb3f45c43f5de55d2a6037b0fdde891789

          SHA256

          8a0812a9ae312aafb0a1bab3522a4a61d42164cf5a613e4e140ce475d1895506

          SHA512

          e0e07e8d86f339dcc6ebe8e0030cc7ce8c3ba386c7c1749bd29f2dd56b5525db0eb6c840f52ae97a4cbf1ed4e98fec59eb730cfdfc43e480b9e2b2517a7dd597

        • C:\Users\Admin\AppData\Local\Temp\RES10D3.tmp

          Filesize

          1KB

          MD5

          3ca821ac403b0e6b52c25dbf0fcb2453

          SHA1

          a333d01afebd8af43ca8ddd2ecb5e949e428789c

          SHA256

          9548df1e40961a1d59506145ea42303d5318171417821fd8758a47303c926814

          SHA512

          e2140a5641fc448a8145800de4fcb8557c27994797b761a33027ce604deff10c350b43053b395b0291c32885bc43b6a23cdb7687daf03af9dab30dc386921765

        • C:\Users\Admin\AppData\Local\Temp\RES118F.tmp

          Filesize

          1KB

          MD5

          ffd41661f060c3e9f72bec47edce3729

          SHA1

          6c2d69987c3119fc6a71901ef103a7aa16e7cb28

          SHA256

          f6edc865af41f30ee27fa9e3eb851131bb5c4e50313dae6003b6f483d059a491

          SHA512

          f3668f97db31cfb48ea307ba3beb80891fbbd1dbb1d70d285689133eb2b73817054ebbfdb5612d98dd4663d4319212f6fab3ddcbe2a7c1b697ce7c941cae3f8b

        • C:\Users\Admin\AppData\Local\Temp\rgnhujj8.dll

          Filesize

          6KB

          MD5

          e317b4070219e92adf0078e492a09bcd

          SHA1

          893a7a62887f55f13a151cd407c25601c1e87bba

          SHA256

          a17d1748021cea1cb10666b417c84b18e656204e19d18e813a54d052e14af99c

          SHA512

          b404a4abdbd83a32523b655b567635341daad43d568a25f314b5b4eb816914fd587f59f8855f0345e757267c023d241131e1bf188fb259cdbd3119e12c066b08

        • C:\Users\Admin\AppData\Local\Temp\rgnhujj8.pdb

          Filesize

          7KB

          MD5

          b7c898226333c870c47e89902f4899ef

          SHA1

          dc113f192c87889e5fb190fa4e122daa49b8a88e

          SHA256

          fba5fd89e390b2ed9aad0386ddf82a70fbb6453d856489e2792355111c8d3fed

          SHA512

          7eaa3723fc4bda8cc7d1a356d139e813ea88d646469422f08feef26a5cac37ab217ec554f53e55a86f1da29fe23bd3aa1afc061de3217cc37c424053921713a6

        • C:\Users\Admin\AppData\Local\Temp\u7mc3gsb.dll

          Filesize

          4KB

          MD5

          f38d09fde0834e07d30f1204bdf8e134

          SHA1

          2453d2b286f9452e4c2264f4b3a8d7fa28a2034f

          SHA256

          274ce8e6f6c14cacb3b3bdc1e3f5067afe089bc8f4b6d61087d76553f85647d3

          SHA512

          4fee917dcac23b2faa95049e89b7fa58e316f2fe5ff780d1335caa6cffcc58b601d9e82d4fc7768dac9f35470ca847076c1f691f52d6ceea9452348351cd1d96

        • C:\Users\Admin\AppData\Local\Temp\u7mc3gsb.pdb

          Filesize

          7KB

          MD5

          585f3a043066df2a13e829e8be14025e

          SHA1

          105d55232557c18fcdc3d35dfe7eb9ae8b15643a

          SHA256

          c3034199a710c12b7234561e34dc1bfb9eedaffca2d1c29465d67fb74c527bdc

          SHA512

          978d69c471b4ca1d005f15e627c5e753eb936801e3ba2095e210e4b09e8bc1d929a2168894ae42276a675da1f1f9be07d573e1ae39babe52a71903af649a900b

        • \??\c:\Users\Admin\AppData\Local\Temp\CSC10D2.tmp

          Filesize

          652B

          MD5

          1e9b8fa041fefa3a8c88895f700b1827

          SHA1

          649032dec487e568ce31e8da72c1f53a21fdf276

          SHA256

          5240227e663e59a28fcb9bcfe278042f5fdf469fa0b09657d9d7c86bb72515f2

          SHA512

          8cdebaa43380b45c9a1da2f169f791d1cf335d6efb608dadab27e2faf1d9245e39d152354a6a27fff636f04ddaa15ab887da1ec08e2bdbabdd5834426054d6cf

        • \??\c:\Users\Admin\AppData\Local\Temp\CSC118E.tmp

          Filesize

          652B

          MD5

          835dcde695bfc6ec3af9d004e7232fee

          SHA1

          df071dc3ff7b2dcbbbcff9f7819593a88887b953

          SHA256

          2d39d183f9752992e4b7dd3e61724e62eaf9f9fdea0fe2432550df90775947f9

          SHA512

          ada66aebc75b86782c9732d02c1ad5f9faa42c21766af91a9fcd0ae6a8b2229c434b09c3792474b637da42db9d9c316dc258d7c91a82513a266066dbc441fc3e

        • \??\c:\Users\Admin\AppData\Local\Temp\rgnhujj8.0.cs

          Filesize

          8KB

          MD5

          07086ea98fed0079427b7f0710fe62e0

          SHA1

          8bd780bdb9a03d88f32ebef8549509a697fe0102

          SHA256

          eab011089366b76f3f371a62efbe22340ed3adbd2cd5a46a5558c3faac101fff

          SHA512

          d1b4741ca1d09f5b8e72e43c6d08a8f6d69d14cac46bf3c42004e0105e18e892f2ea44f3b28a984779c3c047f5641431148c39bf0eb09093473d2c105c4d2d97

        • \??\c:\Users\Admin\AppData\Local\Temp\rgnhujj8.cmdline

          Filesize

          309B

          MD5

          edb4ab9f5fe3bd4d3333463940a0e22d

          SHA1

          11d575b68f017ee0aa7e8cfc205009a77b71934e

          SHA256

          aebeb067d09af438228e7f33fbc356265a34728471e8c79d90f4c28e0807b199

          SHA512

          193e8db6fc8e9f63f37f083cf01cb6c648fab6b8a33b1b2470b05c4b2b0d5cdbc84cbac46c2b59e6fcebb29f9fc67f8ea6569fb30351bf948d9a635239789cf5

        • \??\c:\Users\Admin\AppData\Local\Temp\u7mc3gsb.0.cs

          Filesize

          2KB

          MD5

          c97bbb0991bdcc70f6cd23e863029f03

          SHA1

          3f21d01b0970a323b090056e285b4261c784cb19

          SHA256

          c59ec8f208e5dd9e310b3ca6a2148c22ff52ada68d15e2cd0ade4a819a20208a

          SHA512

          436100ea9f52ae49a6c5179d12464a1e18bb0cbfddb4545774d582fe2d5c269efdf6bce97ad84deb3419f29f4ba0572a1ccebd5beb70ecd98c7c59ed77f4196d

        • \??\c:\Users\Admin\AppData\Local\Temp\u7mc3gsb.cmdline

          Filesize

          309B

          MD5

          b351082ff318e4493396edf3f9f0534d

          SHA1

          c172f5c2e4fc1d93724b943ce2d8b8c2b6ea3335

          SHA256

          af2494826a7b5896e6be54f9883f5b00a5983c01a2f18683b329d24daa15ee39

          SHA512

          a1ec8b6e6724db5460068d427e5058bd058eedb6aee91e1cc1580ae6d7c25d806bec070a031e45870907df1cd11ee16650fcb9b88bc9cadc7e247042078a0ef9

        • memory/1240-70-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-92-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-25445-0x000007FEF5B90000-0x000007FEF652D000-memory.dmp

          Filesize

          9.6MB

        • memory/1240-4-0x000007FEF5E4E000-0x000007FEF5E4F000-memory.dmp

          Filesize

          4KB

        • memory/1240-27-0x00000000029E0000-0x00000000029E8000-memory.dmp

          Filesize

          32KB

        • memory/1240-11-0x000007FEF5B90000-0x000007FEF652D000-memory.dmp

          Filesize

          9.6MB

        • memory/1240-49-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-48-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-47-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-46-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-53-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-52-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-51-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-50-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-54-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-58-0x000007FEF5B90000-0x000007FEF652D000-memory.dmp

          Filesize

          9.6MB

        • memory/1240-59-0x000007FEF5E4E000-0x000007FEF5E4F000-memory.dmp

          Filesize

          4KB

        • memory/1240-62-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-61-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-64-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-63-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-66-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-65-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-75-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-73-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-72-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-71-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-79-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-10-0x000007FEF5B90000-0x000007FEF652D000-memory.dmp

          Filesize

          9.6MB

        • memory/1240-69-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-68-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-67-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-80-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-81-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-86-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-88-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-89-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-43-0x00000000029F0000-0x00000000029F8000-memory.dmp

          Filesize

          32KB

        • memory/1240-78-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-77-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-76-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-82-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-83-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-85-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-84-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-87-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-91-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-95-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-93-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-96-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-97-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-90-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-98-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-99-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-112-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-111-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-110-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-109-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-108-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-107-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-106-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-105-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-104-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-103-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-102-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-101-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-100-0x0000000002AE0000-0x0000000002B02000-memory.dmp

          Filesize

          136KB

        • memory/1240-9-0x000007FEF5B90000-0x000007FEF652D000-memory.dmp

          Filesize

          9.6MB

        • memory/1240-6-0x0000000001D90000-0x0000000001D98000-memory.dmp

          Filesize

          32KB

        • memory/1240-8-0x000007FEF5B90000-0x000007FEF652D000-memory.dmp

          Filesize

          9.6MB

        • memory/1240-7-0x000007FEF5B90000-0x000007FEF652D000-memory.dmp

          Filesize

          9.6MB

        • memory/1240-5-0x000000001B730000-0x000000001BA12000-memory.dmp

          Filesize

          2.9MB

        • memory/2544-17-0x000007FEF5B90000-0x000007FEF652D000-memory.dmp

          Filesize

          9.6MB

        • memory/2544-25-0x000007FEF5B90000-0x000007FEF652D000-memory.dmp

          Filesize

          9.6MB