Analysis

  • max time kernel
    145s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-06-2024 12:46

General

  • Target

    b8af782f98793a4b4ce9171b1b320291_JaffaCakes118.exe

  • Size

    235KB

  • MD5

    b8af782f98793a4b4ce9171b1b320291

  • SHA1

    5fbd09b0a10eca16802880083f9df314b8a18f50

  • SHA256

    6a6e355d48de45bbf5a31ee44455aa0ec5f704421a35c6fc3a63d72b10dd524e

  • SHA512

    d158f22a1d381324e56169bba328247d046dbf26ab641f93acda007de595aeba4c3db5513181c411c0bd184b01af468c521da4553ae0a0aa6575079b897de927

  • SSDEEP

    6144:2wHyslfEpazAAN91h1wOQ/dICSae2c4UJ8ltV2a:NlfcaF7BwOQ/dIqeh4S8l3

Malware Config

Extracted

Path

C:\Users\Admin\Music\# HELP DECRYPT #.html

Ransom Note
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <title>&#067;erber &#082;ansomware</title> <style> a { color: #47c; text-decoration: none; } a:hover { text-decoration: underline; } body { background-color: #e7e7e7; color: #333; font-family: "Helvetica Neue", Helvetica, "Segoe UI", Arial, freesans, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 16px; line-height: 1.6; margin: 0; padding: 0; } hr { background-color: #e7e7e7; border: 0 none; border-bottom: 1px solid #c7c7c7; height: 5px; margin: 30px 0; } li { padding: 0 0 7px 7px; } ol { padding-left: 3em; } .container { background-color: #fff; border: 1px solid #c7c7c7; margin: 40px; padding: 40px 40px 20px 40px; } .info, .tor { background-color: #efe; border: 1px solid #bda; display: block; padding: 0px 20px; } .logo { font-size: 12px; font-weight: bold; line-height: 1; margin: 0; } .upd_on { color: red; display: block; } .upd_off { display: none; float: left; } .tor { padding: 10px 0; text-align: center; } .url { margin-right: 5px; } .warning { background-color: #f5e7e7; border: 1px solid #ebccd1; color: #a44; display: block; padding: 15px 10px; text-align: center; } </style> </head> <body> <div class="container"> <h3>C E R B E R&nbsp;&nbsp;&nbsp;R A N S O M W A R E</h3> <hr> <p>Cannot you find the files you need?<br>Is the content of the files that you looked for not readable?</p> <p>It is normal because the files' names, as well as the data in your files have been encrypted.</p> <p>Great!<br>You have turned to be a part of a big community "#C3rber Ransomware".</p> <hr> <p><span class="warning">If you are reading this message it means the software "Cerber" has been removed from your computer.</span></p> <hr> <h3>What is encryption?</h3> <p>Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users.</p> <p>To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key.</p> <p>But not only it.</p> <p>It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data.</p> <hr> <h3>Everything is clear for me but what should I do?</h3> <p>The first step is reading these instructions to the end.</p> <p>Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you.</p> <p>After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions.</p> <p>It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them.</p> <p><span class="warning">!Any attempts to get back your files with the third-party tools can be fatal for your encrypted files!</span></p> <p>The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files.</p> <p>Finally it will be impossible to decrypt your files!</p> <p>When you make a puzzle, but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly.</p> <p>You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files.</p> <hr> <p><span class="warning">There are several plain steps to restore your files but if you do not follow them we will not be able to help you, and we will not try since you have read this warning already.</span></p> <hr> <p>For your information the software to decrypt your files (as well as the private key provided together) are paid products.</p> <p>After purchase of the software package you will be able to:</p> <ol> <li>decrypt all your files;</li> <li>work with your documents;</li> <li>view your photos and other media;</li> <li>continue your usual and comfortable work at the computer.</li> </ol> <p>If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files.</p> <hr> <div class="info"> <p>There is a list of temporary addresses to go on your personal page below:</p> <ol> <li><span class="upd_off" id="upd_1">Please wait...</span><a class="url" href="http://52uo5k3t73ypjije.gg4dgp.bid/8E9D-1573-329A-029F-57DB" id="url_1" target="_blank">http://52uo5k3t73ypjije.gg4dgp.bid/8E9D-1573-329A-029F-57DB</a>(<a href="#updateUrl" onClick="return updateUrl();" style="color: red;">Get a NEW address!</a>)</li> <li><a href="http://52uo5k3t73ypjije.f0jlbj.bid/8E9D-1573-329A-029F-57DB" target="_blank">http://52uo5k3t73ypjije.f0jlbj.bid/8E9D-1573-329A-029F-57DB</a></li> <li><a href="http://52uo5k3t73ypjije.91006j.bid/8E9D-1573-329A-029F-57DB" target="_blank">http://52uo5k3t73ypjije.91006j.bid/8E9D-1573-329A-029F-57DB</a></li> <li><a href="http://52uo5k3t73ypjije.o8hpwj.top/8E9D-1573-329A-029F-57DB" target="_blank">http://52uo5k3t73ypjije.o8hpwj.top/8E9D-1573-329A-029F-57DB</a></li> <li><a href="http://52uo5k3t73ypjije.onion.to/8E9D-1573-329A-029F-57DB" target="_blank">http://52uo5k3t73ypjije.onion.to/8E9D-1573-329A-029F-57DB</a></li> </ol> </div> <hr> <h3>What should you do with these addresses?</h3> <p>If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it):</p> <ol> <li>take a look at the first address (in this case it is <span class="upd_off" id="upd_2">Please wait...</span><a class="url" href="http://52uo5k3t73ypjije.gg4dgp.bid/8E9D-1573-329A-029F-57DB" id="url_2" target="_blank">http://52uo5k3t73ypjije.gg4dgp.bid/8E9D-1573-329A-029F-57DB</a>);</li> <li>select it with the mouse cursor holding the left mouse button and moving the cursor to the right;</li> <li>release the left mouse button and press the right one;</li> <li>select "Copy" in the appeared menu;</li> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>move the mouse cursor to the address bar of the browser (this is the place where the site address is written);</li> <li>click the right mouse button in the field where the site address is written;</li> <li>select the button "Insert" in the appeared menu;</li> <li>then you will see the address <span class="upd_off" id="upd_3">Please wait...</span><a class="url" href="http://52uo5k3t73ypjije.gg4dgp.bid/8E9D-1573-329A-029F-57DB" id="url_3" target="_blank">http://52uo5k3t73ypjije.gg4dgp.bid/8E9D-1573-329A-029F-57DB</a> appeared there;</li> <li>press ENTER;</li> <li>the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions.</p> <p>If you browse the instructions in HTML format:</p> <ol> <li>click the left mouse button on the first address (in this case it is <span class="upd_off" id="upd_4">Please wait...</span><a class="url" href="http://52uo5k3t73ypjije.gg4dgp.bid/8E9D-1573-329A-029F-57DB" id="url_4" target="_blank">http://52uo5k3t73ypjije.gg4dgp.bid/8E9D-1573-329A-029F-57DB</a>);</li> <li>in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet.</p> <hr> <p>Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products.</p> <p>Unlike them we are ready to help you always.</p> <p>If you need our help but the temporary sites are not available:</p> <ol> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>enter or copy the address <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> into the address bar of your browser and press ENTER;</li> <li>wait for the site loading;</li> <li>on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed;</li> <li>run Tor Browser;</li> <li>connect with the button "Connect" (if you use the English version);</li> <li>a normal Internet browser window will be opened after the initialization;</li> <li>type or copy the address <span class="tor">http://52uo5k3t73ypjije.onion/8E9D-1573-329A-029F-57DB</span> in this browser address bar;</li> <li>press ENTER;</li> <li>the site should be loaded; if for some reason the site is not loading wait for a moment and try again.</li> </ol> <p>If you have any problems during installation or operation of Tor Browser, please, visit <a href="https://www.youtube.com/results?search_query=install+tor+browser+windows" target="_blank">https://www.youtube.com/</a> and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation.</p> <p>If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files.</p> <hr> <h3>Additional information:</h3> <p>You will find the instructions for restoring your files in those folders where you have your encrypted files only.</p> <p>The instructions are made in two file formats - HTML and TXT for your convenience.</p> <p>Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files.</p> <p>The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company.</p> <hr> <p>Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data.</p> <p>The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection.</p> <p>Together we make the Internet a better and safer place.</p> <hr> <p>If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support.</p> <hr> <p>Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.</p> </div> <script> function getXMLHttpRequest() { if (window.XMLHttpRequest) { return new window.XMLHttpRequest; } else { try { return new ActiveXObject("MSXML2.XMLHTTP.3.0"); } catch(error) { return null; } } } function getUrlContent(url, callback) { var xhttp = getXMLHttpRequest(); if (xhttp) { xhttp.onreadystatechange = function() { if (xhttp.readyState == 4) { if (xhttp.status == 200) { return callback(xhttp.responseText.replace(/[\s ]+/gm, ""), null); } else { return callback(null, true); } } }; xhttp.open("GET", url + '?_=' + new Date().getTime(), true); xhttp.send(); } else { return callback(null, true); } } function server1(address, callback) { getUrlContent("http://btc.blockr.io/api/v1/address/txs/" + address, function(result, error) { if (!error) { var tx = /"tx":"([\w]+)","time_utc":"[\w-:]+","confirmations":[\d]+,"amount":-/.exec(result); if (tx) { getUrlContent("http://btc.blockr.io/api/v1/tx/info/" + tx[1], function(result, error) { if (!error) { var address = /"vouts":\[{"address":"([\w]+)"/.exec(result); if (address) { return callback(address[1], null); } else { return callback(null, true); } } else { return callback(null, true); } }); } else { return callback(null, true); } } else { return callback(null, true); } }); } function server2(address, callback) { getUrlContent("http://api.blockcypher.com/v1/btc/main/addrs/" + address, function(result, error) { if (!error) { var tx = /"tx_hash":"([\w]+)","block_height":[\d]+,"tx_input_n":[\d-]+,"tx_output_n":-/.exec(result); if (tx) { getUrlContent("http://api.blockcypher.com/v1/btc/main/txs/" + tx[1], function(result, error) { if (!error) { var address = /"outputs":\[{"value":[\d]+,"script":"[\w]+","spent_by":"[\w]+","addresses":\["([\w]+)"/.exec(result); if (address) { return callback(address[1], null); } else { return callback(null, true); } } else { return callback(null, true); } }); } else { return callback(null, true); } } else { return callback(null, true);

Extracted

Path

C:\Users\Admin\Music\# HELP DECRYPT #.txt

Ransom Note
C_E_R_B_E_R R_A_N_S_O_M_W_A_R_E ######################################################################### Cannot you find the files you need? Is the content of the files that you looked for not readable??? It is normal because the files' names, as well as the data in your files have been encrypted. Great! You have turned to be a part of a big community "#Cerb3r Ransomware". ######################################################################### !!! If you are reading this message it means the software "Cerber" has !!! been removed from your computer. !!! HTML instruction ("# DECRYPT MY FILES #.html") always contains a !!! working domain of your personal page! ######################################################################### What is encryption? ------------------- Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users. To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key. But not only it. It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data. ######################################################################### Everything is clear for me but what should I do? ------------------------------------------------ The first step is reading these instructions to the end. Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you. After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions. It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them. !!! Any attempts to return your files with the third-party tools can !!! be fatal for your encrypted files. The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files. Finally it will be impossible to decrypt your files. When you make a puzzle, but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly. You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files. ######################################################################### !!! There are several plain steps to restore your files but if you do !!! not follow them we will not be able to help you, and we will not try !!! since you have read this warning already. ######################################################################### For your information the software to decrypt your files (as well as the private key provided together) are paid products. After purchase of the software package you will be able to: 1. decrypt all your files; 2. work with your documents; 3. view your photos and other media; 4. continue your usual and comfortable work at the computer. If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files. ######################################################################### There is a list of temporary addresses to go on your personal page below: _______________________________________________________________________ | | 1. http://52uo5k3t73ypjije.gg4dgp.bid/8E9D-1573-329A-029F-57DB | | 2. http://52uo5k3t73ypjije.f0jlbj.bid/8E9D-1573-329A-029F-57DB | | 3. http://52uo5k3t73ypjije.91006j.bid/8E9D-1573-329A-029F-57DB | | 4. http://52uo5k3t73ypjije.o8hpwj.top/8E9D-1573-329A-029F-57DB | | 5. http://52uo5k3t73ypjije.onion.to/8E9D-1573-329A-029F-57DB |_______________________________________________________________________ ######################################################################### What should you do with these addresses? ---------------------------------------- If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it): 1. take a look at the first address (in this case it is http://52uo5k3t73ypjije.gg4dgp.bid/8E9D-1573-329A-029F-57DB); 2. select it with the mouse cursor holding the left mouse button and moving the cursor to the right; 3. release the left mouse button and press the right one; 4. select "Copy" in the appeared menu; 5. run your Internet browser (if you do not know what it is run the Internet Explorer); 6. move the mouse cursor to the address bar of the browser (this is the place where the site address is written); 7. click the right mouse button in the field where the site address is written; 8. select the button "Insert" in the appeared menu; 9. then you will see the address http://52uo5k3t73ypjije.gg4dgp.bid/8E9D-1573-329A-029F-57DB appeared there; 10. press ENTER; 11. the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling. If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions. If you browse the instructions in HTML format: 1. click the left mouse button on the first address (in this case it is http://52uo5k3t73ypjije.gg4dgp.bid/8E9D-1573-329A-029F-57DB); 2. in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address. If for some reason the site cannot be opened check the connection to the Internet. ######################################################################### Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products. Unlike them we are ready to help you always. If you need our help but the temporary sites are not available: 1. run your Internet browser (if you do not know what it is run the Internet Explorer); 2. enter or copy the address https://www.torproject.org/download/download-easy.html.en into the address bar of your browser and press ENTER; 3. wait for the site loading; 4. on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed; 5. run Tor Browser; 6. connect with the button "Connect" (if you use the English version); 7. a normal Internet browser window will be opened after the initialization; 8. type or copy the address ________________________________________________________ | | | http://52uo5k3t73ypjije.onion/8E9D-1573-329A-029F-57DB | |________________________________________________________| in this browser address bar; 9. press ENTER; 10. the site should be loaded; if for some reason the site is not loading wait for a moment and try again. If you have any problems during installation or operation of Tor Browser, please, visit https://www.youtube.com/ and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation. If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files. ######################################################################### Additional information: You will find the instructions for restoring your files in those folders where you have your encrypted files only. The instructions are made in two file formats - HTML and TXT for your convenience. Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files. The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company. ######################################################################### Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data. The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection. Together we make the Internet a better and safer place. ######################################################################### If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support. ######################################################################### Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.
URLs

http://52uo5k3t73ypjije.gg4dgp.bid/8E9D-1573-329A-029F-57DB

http://52uo5k3t73ypjije.f0jlbj.bid/8E9D-1573-329A-029F-57DB

http://52uo5k3t73ypjije.91006j.bid/8E9D-1573-329A-029F-57DB

http://52uo5k3t73ypjije.o8hpwj.top/8E9D-1573-329A-029F-57DB

http://52uo5k3t73ypjije.onion.to/8E9D-1573-329A-029F-57DB

http://52uo5k3t73ypjije.onion/8E9D-1573-329A-029F-57DB

Signatures

  • Cerber

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Contacts a large (514) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 1 IoCs
  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8af782f98793a4b4ce9171b1b320291_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b8af782f98793a4b4ce9171b1b320291_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Users\Admin\AppData\Local\Temp\b8af782f98793a4b4ce9171b1b320291_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\b8af782f98793a4b4ce9171b1b320291_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1528
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4252
        • C:\Windows\system32\vssadmin.exe
          C:\Windows\system32\vssadmin.exe delete shadows /all /quiet
          4⤵
          • Interacts with shadow copies
          PID:4748
        • C:\Windows\system32\wbem\WMIC.exe
          C:\Windows\system32\wbem\wmic.exe shadowcopy delete
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3688
        • C:\Windows\system32\bcdedit.exe
          C:\Windows\system32\bcdedit.exe /set {default} recoveryenabled no
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:4752
        • C:\Windows\system32\bcdedit.exe
          C:\Windows\system32\bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:3724
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# HELP DECRYPT #.html
        3⤵
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1720
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc19c346f8,0x7ffc19c34708,0x7ffc19c34718
          4⤵
            PID:4108
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,4302460349384765700,12945850710993970212,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:2
            4⤵
              PID:5052
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,4302460349384765700,12945850710993970212,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 /prefetch:3
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:3552
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,4302460349384765700,12945850710993970212,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:8
              4⤵
                PID:1560
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,4302460349384765700,12945850710993970212,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:1
                4⤵
                  PID:1876
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,4302460349384765700,12945850710993970212,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:1
                  4⤵
                    PID:4292
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,4302460349384765700,12945850710993970212,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4452 /prefetch:1
                    4⤵
                      PID:2388
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,4302460349384765700,12945850710993970212,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 /prefetch:8
                      4⤵
                        PID:1368
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,4302460349384765700,12945850710993970212,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 /prefetch:8
                        4⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3056
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,4302460349384765700,12945850710993970212,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:1
                        4⤵
                          PID:3940
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,4302460349384765700,12945850710993970212,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:1
                          4⤵
                            PID:3464
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,4302460349384765700,12945850710993970212,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:1
                            4⤵
                              PID:2164
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,4302460349384765700,12945850710993970212,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:1
                              4⤵
                                PID:3624
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,4302460349384765700,12945850710993970212,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:1
                                4⤵
                                  PID:300
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,4302460349384765700,12945850710993970212,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:1
                                  4⤵
                                    PID:1992
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,4302460349384765700,12945850710993970212,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:1
                                    4⤵
                                      PID:4808
                                  • C:\Windows\system32\NOTEPAD.EXE
                                    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# HELP DECRYPT #.txt
                                    3⤵
                                      PID:1400
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://52uo5k3t73ypjije.gg4dgp.bid/8E9D-1573-329A-029F-57DB?auto
                                      3⤵
                                        PID:2948
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x10c,0x110,0x114,0xe0,0x118,0x7ffc19c346f8,0x7ffc19c34708,0x7ffc19c34718
                                          4⤵
                                            PID:3316
                                        • C:\Windows\system32\cmd.exe
                                          "C:\Windows\system32\cmd.exe"
                                          3⤵
                                            PID:612
                                            • C:\Windows\system32\taskkill.exe
                                              taskkill /f /im "b8af782f98793a4b4ce9171b1b320291_JaffaCakes118.exe"
                                              4⤵
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4852
                                            • C:\Windows\system32\PING.EXE
                                              ping -n 1 127.0.0.1
                                              4⤵
                                              • Runs ping.exe
                                              PID:1372
                                      • C:\Windows\system32\vssvc.exe
                                        C:\Windows\system32\vssvc.exe
                                        1⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4544
                                      • C:\Windows\system32\AUDIODG.EXE
                                        C:\Windows\system32\AUDIODG.EXE 0x308 0x46c
                                        1⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3032
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:2256
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:4776

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            4158365912175436289496136e7912c2

                                            SHA1

                                            813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59

                                            SHA256

                                            354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1

                                            SHA512

                                            74b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            ce4c898f8fc7601e2fbc252fdadb5115

                                            SHA1

                                            01bf06badc5da353e539c7c07527d30dccc55a91

                                            SHA256

                                            bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa

                                            SHA512

                                            80fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            fa5d36c976e0e620544da5f166ab14a4

                                            SHA1

                                            84e82e8bdb9fa1f80ff5aedb492fe46aaf7d4800

                                            SHA256

                                            366af0480334f42e9781290bd382de5f5814e1cedf231a936468e4451e923a6a

                                            SHA512

                                            2e47cba9d5b83d13c58f6621e5f5c7404ebde12cf1b98bcc37a3baec8901c3613c706293355552737295305ccbb3dad9e7c9485150afe1b8ab1b1815718bc3ed

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            6KB

                                            MD5

                                            d456fdb2abe84907c83995836bd1d52a

                                            SHA1

                                            1fb0e653bf20000ead9c709fa53ceca3f37fefec

                                            SHA256

                                            1c95292110dffb8af0e953d8333c71782c2231c2fac2516cb787986315c6302a

                                            SHA512

                                            6b8d0edded1b3e1390db7e9fec9950e4a53114caf89f9d001a8846459ac48a79706e1dfb373b42433e710985cda7587d9ef1d15aed91df5816f6e5bf9e7b6417

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                            Filesize

                                            16B

                                            MD5

                                            6752a1d65b201c13b62ea44016eb221f

                                            SHA1

                                            58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                            SHA256

                                            0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                            SHA512

                                            9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            8KB

                                            MD5

                                            0f65bddf92c8e0cd4a027c15a12a05f8

                                            SHA1

                                            a6ed1b25e1feb92dbbf31fb007027f864476f97e

                                            SHA256

                                            92b41bb75bb9c29f6e9005da1ff993f2b53b847f16f1ca91c80d2c6c15e13a36

                                            SHA512

                                            a8ff9a79f12f77a2f82e6d34acfb59c1f70506aed11c80fe5d4c8973785750683c919a15dc1a7e239e0d074d1a18ae1dbc844976b1906a4b7a4d3ef930ddd8a7

                                          • C:\Users\Admin\AppData\Local\Temp\nsu5FF3.tmp\System.dll

                                            Filesize

                                            11KB

                                            MD5

                                            6f5257c0b8c0ef4d440f4f4fce85fb1b

                                            SHA1

                                            b6ac111dfb0d1fc75ad09c56bde7830232395785

                                            SHA256

                                            b7ccb923387cc346731471b20fc3df1ead13ec8c2e3147353c71bb0bd59bc8b1

                                            SHA512

                                            a3cc27f1efb52fb8ecda54a7c36ada39cefeabb7b16f2112303ea463b0e1a4d745198d413eebb3551e012c84a20dcdf4359e511e51bc3f1a60b13f1e3bad1aa8

                                          • C:\Users\Admin\AppData\Roaming\Perl.dll

                                            Filesize

                                            102KB

                                            MD5

                                            7c433e47ecfd8e776a8551eaa3566331

                                            SHA1

                                            03061c1f3844edeb6e0f3d86fa5b3cefdbf81357

                                            SHA256

                                            3696f8856be929b28f8db7902369251019168ef9d05c74e617f48a8f9d04ad01

                                            SHA512

                                            33162aa80cc4ce511e2fe61ca4059067b264619d825afa66b791e3e0cacd7197e35ebfd1b257ba8d05e30209ce36822e1935eff6664e1c8a96e45ce7f3fbff7d

                                          • C:\Users\Admin\AppData\Roaming\btn-next-static.png

                                            Filesize

                                            3KB

                                            MD5

                                            20418349e7f8244ea53bc174b2ff9576

                                            SHA1

                                            edb9087b6d85247ea0cad0060f540b0f890a80e1

                                            SHA256

                                            35d36d6619e249e8bf4838098fd1770c78617e3019162aaca092f8fa37c82dcb

                                            SHA512

                                            b12946ca17bb23403e106d561ae42d15695efde73eb4efb4099b57824c7ba0d2e331850022405f1d5da9502b568a217c06f259600cbbacc0d1c2b7210b31081f

                                          • C:\Users\Admin\AppData\Roaming\exsl.node.set.available.xml

                                            Filesize

                                            1KB

                                            MD5

                                            071a1115b4bee1776b294f16b5fba1b3

                                            SHA1

                                            e0e3b51c9953b8331362c02c6c4f70fde8564085

                                            SHA256

                                            83af83872069d50c0ccf28ea695dfc1b66da57bdb58cd921d3de15b5ca515a56

                                            SHA512

                                            71836cb043ef9726ef8a16d1b8c5f224c0d9b6584d452e59bd0d947ce8149018d8f2e34f9180ec324ba0fea12d7169b4bbfacebca8fcc1deedc47b1f5990bdd5

                                          • C:\Users\Admin\Music\# HELP DECRYPT #.html

                                            Filesize

                                            19KB

                                            MD5

                                            c666afd35a9fd7fed9376f571fa1559f

                                            SHA1

                                            95852b3ff673421447f076382870776b29a7cff0

                                            SHA256

                                            b122710236b674c0d7263ceb6b15e9ebe6d95732e7dec83a03440fffd2ca191c

                                            SHA512

                                            ea78efef2ec688fa484d6b11718e1dcb8958dd96bf35d2eb7427be312cba53201dca7f6220132506585439de20b6b6fce70b36a1b7b4996ec8dc289fefafa918

                                          • C:\Users\Admin\Music\# HELP DECRYPT #.txt

                                            Filesize

                                            10KB

                                            MD5

                                            db144eadea0f6760a01a980422049359

                                            SHA1

                                            c02f32ed9af43335ed4c4bb4e84387824212e6ae

                                            SHA256

                                            768612f40d78c2a54fb1327ca31496c7d6591197fa5dca8b2c9b68cedd9f8ac9

                                            SHA512

                                            af180a9b75fcb1bb994a29dd5fe3f53e157c82f64870433dac6ced4323d81db4ae57ceb3bb9b33008d2cb373a456077c58e2173ffd57d5b1d0748b4249590309

                                          • C:\Users\Admin\Music\# HELP DECRYPT #.url

                                            Filesize

                                            90B

                                            MD5

                                            2159c37b0848ae92b32d4efb42285af2

                                            SHA1

                                            901d88a9d0f3f45d74c4dd4e35cac6f171a7eb70

                                            SHA256

                                            5f2cd1e3ce7eeba20cc27ac5219ff97dc5da5087b8b440f195c6e29aa4d895a8

                                            SHA512

                                            b1a1af2bc77b3edb47099bc8fffbf44a72fd0d3c42393410acb6a6543a79b920f12ebb6a0dc5b94bb5767686c226eec99415da78e5daef0afb273cd47076fa0e

                                          • memory/1528-782-0x0000000000400000-0x0000000000430000-memory.dmp

                                            Filesize

                                            192KB

                                          • memory/1528-809-0x0000000000400000-0x0000000000430000-memory.dmp

                                            Filesize

                                            192KB

                                          • memory/1528-26-0x0000000000400000-0x0000000000430000-memory.dmp

                                            Filesize

                                            192KB

                                          • memory/1528-773-0x0000000000400000-0x0000000000430000-memory.dmp

                                            Filesize

                                            192KB

                                          • memory/1528-776-0x0000000000400000-0x0000000000430000-memory.dmp

                                            Filesize

                                            192KB

                                          • memory/1528-779-0x0000000000400000-0x0000000000430000-memory.dmp

                                            Filesize

                                            192KB

                                          • memory/1528-23-0x0000000000400000-0x0000000000430000-memory.dmp

                                            Filesize

                                            192KB

                                          • memory/1528-785-0x0000000000400000-0x0000000000430000-memory.dmp

                                            Filesize

                                            192KB

                                          • memory/1528-788-0x0000000000400000-0x0000000000430000-memory.dmp

                                            Filesize

                                            192KB

                                          • memory/1528-791-0x0000000000400000-0x0000000000430000-memory.dmp

                                            Filesize

                                            192KB

                                          • memory/1528-794-0x0000000000400000-0x0000000000430000-memory.dmp

                                            Filesize

                                            192KB

                                          • memory/1528-797-0x0000000000400000-0x0000000000430000-memory.dmp

                                            Filesize

                                            192KB

                                          • memory/1528-800-0x0000000000400000-0x0000000000430000-memory.dmp

                                            Filesize

                                            192KB

                                          • memory/1528-803-0x0000000000400000-0x0000000000430000-memory.dmp

                                            Filesize

                                            192KB

                                          • memory/1528-806-0x0000000000400000-0x0000000000430000-memory.dmp

                                            Filesize

                                            192KB

                                          • memory/1528-28-0x0000000000400000-0x0000000000430000-memory.dmp

                                            Filesize

                                            192KB

                                          • memory/1528-812-0x0000000000400000-0x0000000000430000-memory.dmp

                                            Filesize

                                            192KB

                                          • memory/1528-815-0x0000000000400000-0x0000000000430000-memory.dmp

                                            Filesize

                                            192KB

                                          • memory/1528-818-0x0000000000400000-0x0000000000430000-memory.dmp

                                            Filesize

                                            192KB

                                          • memory/1528-819-0x0000000000400000-0x0000000000430000-memory.dmp

                                            Filesize

                                            192KB

                                          • memory/1528-824-0x0000000000400000-0x0000000000430000-memory.dmp

                                            Filesize

                                            192KB

                                          • memory/1528-22-0x0000000000400000-0x0000000000430000-memory.dmp

                                            Filesize

                                            192KB

                                          • memory/1528-21-0x0000000000400000-0x0000000000430000-memory.dmp

                                            Filesize

                                            192KB

                                          • memory/1528-20-0x0000000000400000-0x0000000000430000-memory.dmp

                                            Filesize

                                            192KB

                                          • memory/1528-857-0x0000000000400000-0x0000000000430000-memory.dmp

                                            Filesize

                                            192KB

                                          • memory/1528-18-0x0000000000400000-0x0000000000430000-memory.dmp

                                            Filesize

                                            192KB

                                          • memory/1528-14-0x0000000000400000-0x0000000000430000-memory.dmp

                                            Filesize

                                            192KB

                                          • memory/2924-15-0x0000000068640000-0x0000000068662000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/2924-17-0x0000000068640000-0x0000000068662000-memory.dmp

                                            Filesize

                                            136KB