Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/06/2024, 21:30

General

  • Target

    VirusShare_1b4fe263910ddda19b73d160c655051e.exe

  • Size

    311KB

  • MD5

    1b4fe263910ddda19b73d160c655051e

  • SHA1

    ee29de3b4d84b6a40bf880adaaa8cc4182c22edd

  • SHA256

    e0dd4011e20b1891e8a9d8b2bdf474b2567b9b12228c3071697b329d1ea9fe33

  • SHA512

    8da58bf888ea8c17f337e8092fb88595291b4702411265986cc1c883e42a4b68fd4b0935d401ec43a462a83ec8a364d2b70564c7a7cdb315cd9c9fc6670dc2a9

  • SSDEEP

    6144:3gwtAiwoPwjx2X8sc94NCcbZkOxUmRAFabXA5FwwtcUpfUOcrPWiPuXT5+:3uoPwjxkhkOxUmNrAPwwtftUPWieU

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\restore_files_kpoga.txt

Ransom Note
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! What happened to your files ? All of your files were protected by a strong encryption with RSA-2048. More information about the encryption keys using RSA-2048 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) What does this mean ? This means that the structure and data within your files have been irrevocably changed, you will not be able to work with them, read them or see them, it is the same thing as losing them forever, but with our help, you can restore them. How did this happen ? Especially for you, on our server was generated the secret key pair RSA-2048 - public and private. All your files were encrypted with the public key, which has been transferred to your computer via the Internet. Decrypting of your files is only possible with the help of the private key and decrypt program, which is on our secret server. What do I do ? Alas, if you do not take the necessary measures for the specified time then the conditions for obtaining the private key will be changed. If you really value your data, then we suggest you do not waste valuable time searching for other solutions because they do not exist. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://rtldkdh6.kghw88gh3eu.net/DB3AEAA157663AA6 2. http://jsdf2wevw2.wrt23wqw34.net/DB3AEAA157663AA6 3. https://7vhbukzxypxh3xfy.onion.to/DB3AEAA157663AA6 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser and wait for initialization. 3. Type in the address bar: 7vhbukzxypxh3xfy.onion/DB3AEAA157663AA6 4. Follow the instructions on the site. IMPORTANT INFORMATION: Your personal pages: http://rtldkdh6.kghw88gh3eu.net/DB3AEAA157663AA6 http://jsdf2wevw2.wrt23wqw34.net/DB3AEAA157663AA6 https://7vhbukzxypxh3xfy.onion.to/DB3AEAA157663AA6 Your personal page (using TOR): 7vhbukzxypxh3xfy.onion/DB3AEAA157663AA6 Your personal identification number (if you open the site (or TOR 's) directly): DB3AEAA157663AA6
URLs

http://rtldkdh6.kghw88gh3eu.net/DB3AEAA157663AA6

http://jsdf2wevw2.wrt23wqw34.net/DB3AEAA157663AA6

https://7vhbukzxypxh3xfy.onion.to/DB3AEAA157663AA6

http://7vhbukzxypxh3xfy.onion/DB3AEAA157663AA6

Signatures

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (885) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirusShare_1b4fe263910ddda19b73d160c655051e.exe
    "C:\Users\Admin\AppData\Local\Temp\VirusShare_1b4fe263910ddda19b73d160c655051e.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Users\Admin\AppData\Roaming\vcwtrv.exe
      C:\Users\Admin\AppData\Roaming\vcwtrv.exe
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3908
      • C:\Windows\System32\vssadmin.exe
        "C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet
        3⤵
        • Interacts with shadow copies
        PID:4196
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RESTORE_FILES.TXT
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:1852
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RESTORE_FILES.HTML
        3⤵
        • Enumerates system info in registry
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2696
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe76fe46f8,0x7ffe76fe4708,0x7ffe76fe4718
          4⤵
            PID:4404
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,10574677421853450628,17485832927554293119,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:2
            4⤵
              PID:2644
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,10574677421853450628,17485832927554293119,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:3
              4⤵
                PID:4520
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,10574677421853450628,17485832927554293119,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:8
                4⤵
                  PID:2004
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,10574677421853450628,17485832927554293119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:1
                  4⤵
                    PID:2316
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,10574677421853450628,17485832927554293119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:1
                    4⤵
                      PID:4100
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,10574677421853450628,17485832927554293119,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4732 /prefetch:8
                      4⤵
                        PID:3028
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,10574677421853450628,17485832927554293119,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4732 /prefetch:8
                        4⤵
                          PID:3300
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,10574677421853450628,17485832927554293119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:1
                          4⤵
                            PID:1204
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,10574677421853450628,17485832927554293119,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:1
                            4⤵
                              PID:4188
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,10574677421853450628,17485832927554293119,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:1
                              4⤵
                                PID:3636
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,10574677421853450628,17485832927554293119,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3756 /prefetch:1
                                4⤵
                                  PID:4936
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,10574677421853450628,17485832927554293119,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2988 /prefetch:2
                                  4⤵
                                    PID:3068
                                • C:\Windows\System32\vssadmin.exe
                                  "C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet
                                  3⤵
                                  • Interacts with shadow copies
                                  PID:2288
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Roaming\vcwtrv.exe >> NUL
                                  3⤵
                                    PID:4584
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\VIRUSS~1.EXE >> NUL
                                  2⤵
                                    PID:2208
                                • C:\Windows\system32\vssvc.exe
                                  C:\Windows\system32\vssvc.exe
                                  1⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1068
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:3716
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:4172

                                    Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Program Files\7-Zip\Lang\restore_files_kpoga.html

                                            Filesize

                                            5KB

                                            MD5

                                            f382f8ac7e899ef554e77878c2ec4733

                                            SHA1

                                            e2d9e6f1daf4d197ab2fd92355ffab0d17803a32

                                            SHA256

                                            74cebbcd04a6797cc57eeefba429abac0358a5420858c692a1515c6a3ef547fc

                                            SHA512

                                            49bda692a62754d3d8f8add7a9e05646b7a53e943ad71b08fc856d1dc924df42c271b12fc99a1d1cad6158676ec0cb3c40a48a7cddcde0414529357d88524db6

                                          • C:\Program Files\7-Zip\Lang\restore_files_kpoga.txt

                                            Filesize

                                            2KB

                                            MD5

                                            f2d57d0862b4f2e6f22f201ec333e712

                                            SHA1

                                            51e17d4394782afbddbc619109c326f14a9ca05d

                                            SHA256

                                            9bf7c7f0632bc66d30a08cf2d093ff9f4a89bfbce8e86feb9aa08973599b8204

                                            SHA512

                                            5be40954abb9f1557728c93106ee5f698b9fd5bc4aba32ea5e2c8f142c33e692e0a22b704cd3c109ab52205fe6a2a0e20fca981b5e1b7d0b6684e659be5ddc6d

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            4158365912175436289496136e7912c2

                                            SHA1

                                            813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59

                                            SHA256

                                            354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1

                                            SHA512

                                            74b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            ce4c898f8fc7601e2fbc252fdadb5115

                                            SHA1

                                            01bf06badc5da353e539c7c07527d30dccc55a91

                                            SHA256

                                            bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa

                                            SHA512

                                            80fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            3f1ae9335eabcd631a13e051b76489e6

                                            SHA1

                                            5d141715f3f328d0db27fa23cff1fd9ae272f2c4

                                            SHA256

                                            5f6e32c1ffcb48e359bf1421983eb23d832658c105b5cd64f432fe9c494bcf2f

                                            SHA512

                                            0ef86475209f23f723d48461246fe50f956d3deccfe7940ee38b25978e5c37af58bff4e87b1b0a5199d4c8a38a0f2fddd37f124e0d811e3ec533157ee9909436

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            6KB

                                            MD5

                                            2df0e40598656e66d0af675b2636a1e7

                                            SHA1

                                            899635b20a40f0980709fedff28f64bbbd013086

                                            SHA256

                                            a111bbd518da8a170ec1f206dd00ebdc32a2912b091c2dcdeea384a5c6721b72

                                            SHA512

                                            fd5505491d3ce72b062bd4d727e3aae5ad3bce66e124821518edddefec5d66d56dba83519285cb21433e98aa8efa5dbe0c5f52ebaa55fdbcc5e5d0457a487692

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                            Filesize

                                            16B

                                            MD5

                                            6752a1d65b201c13b62ea44016eb221f

                                            SHA1

                                            58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                            SHA256

                                            0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                            SHA512

                                            9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            8KB

                                            MD5

                                            661b5e7643487d546c53037d9f9af359

                                            SHA1

                                            f1b70926f5fbe9102fc6abcc3b6c3e9424232a8e

                                            SHA256

                                            00d7a29bf2f65e107a219bd3f47fd74be545ae47eced13409a08e666ab1df546

                                            SHA512

                                            c2e4efc29eb7f1caf77568bfb27e2c20ec9c04485bbd7cbb8496e845f45927669d3652a8013b2b0d76c30c2604cc69de387e8e66934dc80a4f29a0b68c54c35e

                                          • C:\Users\Admin\AppData\Roaming\vcwtrv.exe

                                            Filesize

                                            311KB

                                            MD5

                                            1b4fe263910ddda19b73d160c655051e

                                            SHA1

                                            ee29de3b4d84b6a40bf880adaaa8cc4182c22edd

                                            SHA256

                                            e0dd4011e20b1891e8a9d8b2bdf474b2567b9b12228c3071697b329d1ea9fe33

                                            SHA512

                                            8da58bf888ea8c17f337e8092fb88595291b4702411265986cc1c883e42a4b68fd4b0935d401ec43a462a83ec8a364d2b70564c7a7cdb315cd9c9fc6670dc2a9

                                          • memory/2408-15-0x0000000074DB0000-0x0000000074DE9000-memory.dmp

                                            Filesize

                                            228KB

                                          • memory/2408-14-0x0000000000400000-0x0000000000534000-memory.dmp

                                            Filesize

                                            1.2MB

                                          • memory/2408-0-0x00000000009F0000-0x00000000009F3000-memory.dmp

                                            Filesize

                                            12KB

                                          • memory/2408-5-0x0000000074DB0000-0x0000000074DE9000-memory.dmp

                                            Filesize

                                            228KB

                                          • memory/2408-4-0x0000000000A00000-0x0000000000A03000-memory.dmp

                                            Filesize

                                            12KB

                                          • memory/2408-1-0x0000000000400000-0x0000000000534000-memory.dmp

                                            Filesize

                                            1.2MB

                                          • memory/3908-10-0x0000000000400000-0x0000000000534000-memory.dmp

                                            Filesize

                                            1.2MB

                                          • memory/3908-7643-0x0000000074DB0000-0x0000000074DE9000-memory.dmp

                                            Filesize

                                            228KB

                                          • memory/3908-7642-0x0000000000400000-0x0000000000534000-memory.dmp

                                            Filesize

                                            1.2MB

                                          • memory/3908-7629-0x0000000000400000-0x0000000000534000-memory.dmp

                                            Filesize

                                            1.2MB

                                          • memory/3908-6752-0x0000000000400000-0x0000000000534000-memory.dmp

                                            Filesize

                                            1.2MB

                                          • memory/3908-16-0x0000000074DB0000-0x0000000074DE9000-memory.dmp

                                            Filesize

                                            228KB

                                          • memory/3908-13-0x00000000008B0000-0x00000000008B3000-memory.dmp

                                            Filesize

                                            12KB