Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    30-08-2024 18:36

General

  • Target

    cb6cde58d5a246fcef6a2b1f9ad96dbb_JaffaCakes118.ps1

  • Size

    908KB

  • MD5

    cb6cde58d5a246fcef6a2b1f9ad96dbb

  • SHA1

    1c311562eee808d0af5270beb9cb077893efb066

  • SHA256

    b3dcd6e523ce44cf15638ca1f0de17554758f38ed8b7e7965b868fd28cb797dc

  • SHA512

    d2cd44fc69252fd3de34497d753ceb5db72e28cff920a2d649456abf98e57d232dedb982e09a5954532389f2cad5a0d986c1f1c0512b0a6f16a470110a5eec59

  • SSDEEP

    6144:y/WXp13E8LFVy9KrE0zxiRgvLK9HvsG8todmCn4q/FVv4fTYnGu9TKC8+3KI:y2rbVvdtqzZdKC8+3KI

Malware Config

Extracted

Path

C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\33BD29-Readme.txt

Family

netwalker

Ransom Note
Hi! Your files are encrypted. All encrypted files for this computer has extension: .33bd29 -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. Additionally, your data may have been stolen and if you do not cooperate with us, it will become publicly available on our blog. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_33bd29: 9dVIZXS0tcIpokmXpbpHO4WmN8rRQ2D4xJreEMeXJKW1uoqgTW +4UVSbpJmhyC1m8inEYq+ml+ZJyAEvD30puG3td4pRIiorDDvF yCzoA+WJVrbjukAjdGrYq1JSlIwVz35zzlI4XIUscn6Qddrtpr 4u+PSeDxGrbT65NgR5t8JXCNeReYp1Xp5SY6sgtnKcUwqFYXV/ CfdLOtcets/FjvbTAG2SNDPfNLJME1QpwF87Q7JBa6PuMiiq3A Xs03paNlbMeopbK5HOQA+cI/6YGrGSrUlSeMfwVg==}
URLs

http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion

http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion

Signatures

  • Netwalker Ransomware

    Ransomware family with multiple versions. Also known as MailTo.

  • Renames multiple (7466) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1184
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\cb6cde58d5a246fcef6a2b1f9ad96dbb_JaffaCakes118.ps1
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2280
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\xnrpqp-0.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2708
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEA7F.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCEA7E.tmp"
          4⤵
            PID:2852
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\8hrvcbtv.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2436
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEC91.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCEC90.tmp"
            4⤵
              PID:2860
        • C:\Windows\system32\notepad.exe
          C:\Windows\system32\notepad.exe "C:\Users\Admin\Desktop\33BD29-Readme.txt"
          2⤵
            PID:11664
        • C:\Windows\system32\vssvc.exe
          C:\Windows\system32\vssvc.exe
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1560

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\33BD29-Readme.txt

          Filesize

          1KB

          MD5

          dd3fd96542f33fe3156758f7aa77c407

          SHA1

          7b1d6f0acbe63d3260e72aa779252ce8c1fe5c64

          SHA256

          a5c35fb9f3e9eb720c26e893c8ea69a69784fcd0914e58ab7521d13191c76651

          SHA512

          230745a0e317ffdd4d0051700a935c622d9632be6999447a5c5ac667418db70ad0c6ad6484a68059717c15af0245c03a4fb70187c89ef40707c5903abdca92a9

        • C:\ProgramData\Microsoft\Assistance\Client\1.0\it-IT\Help_CValidator.H1D.33bd29

          Filesize

          12KB

          MD5

          b1b18060befcf3108704533e77ed047a

          SHA1

          2999720f12d054197cb9c5d6487697694fd3991a

          SHA256

          f75677eba4e025e1b9020c5275fcb4da79a3ba884ad6319135f0ae364f9e4257

          SHA512

          f1170812613a20d860cdb1071ef4f289ebd5b07ac69f318d00749cad37eee1b5971b5215b7fd51a49d95ac9c38bc3bbb89355635d66d1a808d2876db80a3ce2b

        • C:\ProgramData\Microsoft\Assistance\Client\1.0\it-IT\Help_MKWD_AssetId.H1W.33bd29

          Filesize

          229KB

          MD5

          9718409f37cdee2ac30b5efe9d1aaf40

          SHA1

          dfa5acb35ffdf90068508327458e1bf612e5ae01

          SHA256

          0647d00ebb8f891995c4553895623d4173b1ea17c97f674f946eb720e9f2bc13

          SHA512

          c39acca71cd941df20088f79d4d600514ebeea8675bba660e3ee8747b914e9e90ac71356149154b28995a5d9d3e82b6929234679450c519004cab8f15f76776d

        • C:\ProgramData\Microsoft\Assistance\Client\1.0\it-IT\Help_MKWD_BestBet.H1W.33bd29

          Filesize

          422KB

          MD5

          f2188455c8f45ae62db051e8af5bf7c1

          SHA1

          06f5fee48c62cba195bfd31b73b3600c154bbad8

          SHA256

          1db7918c45ca74f2a15eb35aa63f6d6e11e5fcbe33a34c168c1b9800179f43c3

          SHA512

          b7e59296cbe6f9d9c7ecccf6f015bac26dcdfdb82428b6020841b6d82e44d4a7ab65de3f2d59658a9ba74d51d38ad963a0d65182d526e755801d14c00a4375af

        • C:\ProgramData\Microsoft\Assistance\Client\1.0\it-IT\Help_MValidator.Lck.33bd29

          Filesize

          284B

          MD5

          addcbe9e0a21628bcbe73e65bfb53e7b

          SHA1

          fa2b508c8472fe90ca47be474d6003a2a0071df7

          SHA256

          ac23976b9d7848d3b64cfb1ced8bfc47a23fec7b059eafd0313119222a9ba31f

          SHA512

          5801b86277c41e770cb8b0f2d783189909d64f26f80746408a7d6f4856c4461dfa9ff3145966f35b499adf8e4a14af7dbf259460fd65d3dd46127f1d48aa4da9

        • C:\ProgramData\Microsoft\Assistance\Client\1.0\ja-JP\Help_CValidator.H1D.33bd29

          Filesize

          12KB

          MD5

          687e282e19b4df11ad9f79ba75a893e3

          SHA1

          4d1f31d6e9f10743081d33184597b3452c39248e

          SHA256

          9d33e041a8d5cd7daddb3419afe72138d3c4cf8547ef33fa1fd1e2fee9372505

          SHA512

          9d16777c27dffe15d202ae4cb77833469c3bc3a9f568409f907228cc3cc952c4635903a7ca394dcb8b2f4decbf762c90f16f73ff80236ab83ab109c90093d543

        • C:\ProgramData\Microsoft\Assistance\Client\1.0\ja-JP\Help_MKWD_AssetId.H1W.33bd29

          Filesize

          229KB

          MD5

          2818b3ca931341a1a182cb12470ee03e

          SHA1

          6bdd8f3bcda4392054e5e5f525ebf5648bcb68da

          SHA256

          82833f7e45ba6e3f01feb0f2de4d57b02bd78ed848668b2f4a2b523f05325224

          SHA512

          ce366550f331c6e591436ac8e9bc492c29f76bb40fa9f6ffb7f8ba879c43babe26a065f0f07e6c6ba574b010127cf18fd1578e0ad428b81b17dc84189cc2b595

        • C:\ProgramData\Microsoft\Assistance\Client\1.0\ja-JP\Help_MTOC_help.H1H.33bd29

          Filesize

          352KB

          MD5

          dcfc920a3812d14ae92de6d9d06df32f

          SHA1

          f915e2966318d4beb15dbf5de65bab739bea608c

          SHA256

          5ee34cacb138a29c109d45803f31cd84be9d487710f020673a77258f973ba174

          SHA512

          e87cb2afd4925f0cba6885d9f0a27091acefa30e24a375fee71c2408fa39ba5fa130c3b9aaebf870bc907870360134aa458013da490ded5019087df1f8d9dd5b

        • C:\ProgramData\Microsoft\Assistance\Client\1.0\ja-JP\Help_MValidator.H1D.33bd29

          Filesize

          14KB

          MD5

          76650117bec87d0264989917b6ab1b75

          SHA1

          8c0475c498d6e6127ca345ac6a9b25cd40a7afa6

          SHA256

          bfa19ba8b4fe33373dbf8eba841aef0f910a47aed49a51c7b2b179937a51cce0

          SHA512

          4dee8ec607ba06f9dfdc39486c84e4b9f7c6b96a8558f0c446eab3ce668fef24eb0b36e94ded1113fe044c16bece098a6f2415156e5fc1ed829160925a3c09f7

        • C:\ProgramData\Microsoft\Assistance\Client\1.0\ja-JP\Help_MValidator.Lck.33bd29

          Filesize

          284B

          MD5

          97bae8b50fd99dc00d4fb68a4afcf902

          SHA1

          a046105cedbd48314e38520cf94c56f73062f122

          SHA256

          ef45761f9a41e7b48554fce09588e39727d4e4e1133d5e5e94d6b08fba2438bb

          SHA512

          094f1e61a6cd39a9c416eb67257153bddff85db3bcf2f1aa10e47f998c3c1c3db609e09446565f363b990cc2a0c302490af5b25e0efe8ece441dab4b2fe987e5

        • C:\ProgramData\Microsoft\OFFICE\UICaptions\3082\PUB6INTL.REST.trx_dll.33bd29

          Filesize

          544KB

          MD5

          026dfde440f96216cd7ba5c3cdb18d7d

          SHA1

          9711c6c913dd8b6607386263a8dd3e6fcb95bcc9

          SHA256

          27bc496770ad2a9c40e7da4a9f75d7fbee39ae77642baee056ffa8fa179dccce

          SHA512

          76118cf15e08fe75d1d4b3e5561284f780f6cb944da635cedaafb6d71c34aeb4407f0544ee008a8aa116cb548ec6a71c44ec9c286e5a57704a00c65c84d206e7

        • C:\ProgramData\Microsoft\OFFICE\UICaptions\3082\SGRES.DLL.trx_dll.33bd29

          Filesize

          13KB

          MD5

          36c9476f4e4345dc1703044bc4758f09

          SHA1

          80afb790146bfe597514fcb2e2eb2ffcbbdca1f1

          SHA256

          ecc483b0a690dc4c0ea05d2e0db2133e1bcb420667f6bec552a02c1270b0382d

          SHA512

          bae128f462da3f9aa16d24a1a4669b29ec02f2cd56c0339ce0b2d9237f2aefe600429300bad838f149961772e5c59526e09909ae3726e0bc426ed9cdf86a2756

        • C:\ProgramData\Microsoft\OFFICE\UICaptions\3082\VISBRRES.DLL.trx_dll.33bd29

          Filesize

          26KB

          MD5

          b187a83865a9cbf7bd642f72d6107ceb

          SHA1

          91c654effb15497dd75af28923843b3107d102d2

          SHA256

          63db56a7cd0056d837d4d8b9e45e848067b1e04c41f1d9016c899c37507d3436

          SHA512

          ef0bd58d75dc3fdd46d0d65f84212f64ef5ec907e3ae3160a4ddb49917414e506665008afbc86ffeacdb6836785a9b2acfaf93496771dc4a5da88f39c1900007

        • C:\ProgramData\Microsoft\OFFICE\UICaptions\3082\WWINTL.REST.trx_dll.33bd29

          Filesize

          1.1MB

          MD5

          8a0474ea75aebd613714d3737e85d572

          SHA1

          b7f0052ce8a8a57edc57b3b2347aefbdf53503f4

          SHA256

          e795e6811b2dcae9d8e529a0f9424de81b01878c34a0626eed29994b8c92d941

          SHA512

          a213b500548ee2c4c511ea1be632750e7e0b4f51997077f7acc1fac0f2887e4bef44023b83d08fdfded4ec022d1f2a2f7191757bd90c73b5cd38c40fe81cc774

        • C:\ProgramData\Microsoft\OFFICE\UICaptions\3082\XLSLICER.DLL.trx_dll.33bd29

          Filesize

          14KB

          MD5

          695d5c2ccf397c17737806e36a202d6a

          SHA1

          0be4613b37ddea3c1e54d627a1aa104904d90bce

          SHA256

          ff85bbe0a2987922511335245962cf9598ca448c27b6d8c21e2c9227f71daaf8

          SHA512

          f60479b2fe09a3bf27509929822eae2bc8162044c2675dec2f742e49683310873d4c0ebdd721237c56a592644eee164feda54d50693049c41aaa621a76a4141d

        • C:\ProgramData\Microsoft\Windows\WER\ReportQueue\NonCritical_x64_7e7688eac2ab845272f4daac96479e93e0f0a5_cab_07543c63\DMI3C63.tmp.log.xml.33bd29

          Filesize

          7KB

          MD5

          8c65f6416de35f11c74dfb9ad8227b59

          SHA1

          01fa08f0c937fd9443afe6f1718989f9d15b6f95

          SHA256

          24488bcb051b718700a3a4416ec941270b2028e3603a22e85a8d9f47bfe35c16

          SHA512

          fc8ad6eed156f92df0a1105c897d5a7899ab393fcd9df88cefbb6a7b677de5e221ea244d0e3703dfc5f8a4362b8600f7114d49750db82665d8ef60ce0df08f74

        • C:\Users\Admin\AppData\Local\Temp\8hrvcbtv.dll

          Filesize

          4KB

          MD5

          7b68d84dbafe7b06b6a81e06a11683f5

          SHA1

          20a01f03dd83be6a628125b344dee52fe46fe0de

          SHA256

          478af54bce431bd2f3d55f4cba10f6456412f26cba3e79ed1b1a2fcdabbc378d

          SHA512

          54d244f9d2f35a39c9f7cdfa9ab9a74e742dd7696978a4916fa77f2c720ddc1fb62632254b2015524cf0d0e26c15ecfe7d699c618111830056876815d161d669

        • C:\Users\Admin\AppData\Local\Temp\8hrvcbtv.pdb

          Filesize

          7KB

          MD5

          ec10c1748dcf1c8623a6a6978109df5f

          SHA1

          404f9aa3687a6db39ffd0fb8c315e2c813997c0c

          SHA256

          4108f474668d8feae075a6b76ab3467d323368b29cf59bde8706c2a5336be4be

          SHA512

          e33b36ed3b0561fa9bd529dde7631aa724448cb560702851166bd3eb9fa30d317791aef20ecc161fef7683140b8686e261073ab17562f8a51eeeb186fbfbfa9d

        • C:\Users\Admin\AppData\Local\Temp\RESEA7F.tmp

          Filesize

          1KB

          MD5

          dbebfa14478f1ddbb62fd507fbda1ec2

          SHA1

          a1d71e28f7f4b6f7a6a13f169dd0fb459e3079e3

          SHA256

          97622596d3b42a05259a709d75e57c0b14ed677aa9e621941e10af2f8135e227

          SHA512

          c4391f81a73679fda21a6154ee51df6d200fbe66daa25d648318c8895a301bbd5346eec49b083122ddc197fccba5267f5edf9d55830adc863329ff50d5c8ab75

        • C:\Users\Admin\AppData\Local\Temp\RESEC91.tmp

          Filesize

          1KB

          MD5

          6ea6c37dddab54d1f95bb58ad03088e6

          SHA1

          15f0b5ecd0dfa2f59be776837e4c72a99a4738e8

          SHA256

          2ea5a2f5e568ec81eba73338309c9d6a855e09b9292eb55cb7718f8f6502c3ac

          SHA512

          f93503a696294b7dbb5a6a84d7178fdf4b5d0c965b99592bb307721c9857d800f558c34b4789a4318a3f4dda01ee97433a0327e3a542fcf9f99c29f6171957af

        • C:\Users\Admin\AppData\Local\Temp\xnrpqp-0.dll

          Filesize

          6KB

          MD5

          103e1cbc8e87dff7ed6dbcede282d6a1

          SHA1

          77d3498d06d4cbc614a3bbd34428b64faadbd8e7

          SHA256

          5a8f3ec19b6417faa9117f8614d8cc0f8770571112bfce103e3af93d58a67156

          SHA512

          3054c268a2ae6dd35e5a3549c7cddd70cf8b5db8bb1970d5a182663edf50806b412b15755476e859ac1801e0d0ed85bff015ec0c473b476c8eefbe09b8f35952

        • C:\Users\Admin\AppData\Local\Temp\xnrpqp-0.pdb

          Filesize

          7KB

          MD5

          1b4bb70e7063266b8c8d142884b4965c

          SHA1

          fe5ee9bea54718f56fed8049482ffba9c3b31e10

          SHA256

          584efc5f96b972b545b7f73042ed0210bcbe8829c9fad3970363616b18254c73

          SHA512

          fa03316f5b6323ffb56f585e4b5be7eef81c7abd2e4e08fa3179f66dbc4dd993b0bbc3065286ac2df270a8445706ae37cc9bab40d593d6ed8a33d642eaf6da90

        • \??\c:\Users\Admin\AppData\Local\Temp\8hrvcbtv.0.cs

          Filesize

          2KB

          MD5

          d491bc3537450532785880e98f087e97

          SHA1

          bf5a817e3776cff4554c03206159c54717ca09f2

          SHA256

          7e7bd87416a61d72128f5c5bdeb3b3054631393d22acfd84bc0a351e4cc6b491

          SHA512

          ebbd7f91049304640f30697cadea49eb8f69a26dc1581dc2e58fbf16421769ed5df67b4fe4bfc1dd6c58367adea0449c52aa26c0286e7ab153c6571b7fd59856

        • \??\c:\Users\Admin\AppData\Local\Temp\8hrvcbtv.cmdline

          Filesize

          309B

          MD5

          b1b6941e436b3a05f42220e97741c179

          SHA1

          c55a0d7e34d15ceca217b485130b3c58ed3921df

          SHA256

          59aa78f62971551e83ad981ffc1579486a46537f570d4bee403915763fc4600e

          SHA512

          38840aab4bcf59d0df56e42787c036bab17bc76ec11d4d61e203ecbe9befc92159e08fb6bedf4d9cd7e84455387b47ca7ffcf5ddeb1acaa71592c622c0ef5dcc

        • \??\c:\Users\Admin\AppData\Local\Temp\CSCEA7E.tmp

          Filesize

          652B

          MD5

          4c962e17ca382bfdf78da8c3577fa88e

          SHA1

          a848fb944739db2713bc8f2843a40f067947d4a6

          SHA256

          d7109018158798966f4988eb5255a2221ee68d89153e1ae94bd1f20ddc64c850

          SHA512

          9d1d29df95a25bb5feecb18bfeb3bea053c04ffde0aca0391bd5d13b53754b3715e5e7270889c39aedd0180eda5ebd36fa543561b6dcc00171ad1925e528413a

        • \??\c:\Users\Admin\AppData\Local\Temp\CSCEC90.tmp

          Filesize

          652B

          MD5

          15ec2605db9e25e1a2b743cd0c0907f5

          SHA1

          f7718d892162a593082ab626e9ae96ee4c0596fc

          SHA256

          ff271ee2749c3480337069264ce6d8f229eb88dcc0d859521cf65ebb33cd9e9a

          SHA512

          c1d388a448d55fa664e2785d2298079ba224a8aa22123e9f7fa73b75695a4bdbba7eeff3bff8b2d3ca98ecc36bf5969db4f4f7758c19faec4cb5bc4f52553c4e

        • \??\c:\Users\Admin\AppData\Local\Temp\xnrpqp-0.0.cs

          Filesize

          9KB

          MD5

          77db487c078b0fa51e7fcace9b258cf1

          SHA1

          f73dc69329586dd07c5f4e273c03ee9164dc4936

          SHA256

          20a335545d41bad6dd654205fe7e8e38c807634307edc4463661f172d8b575de

          SHA512

          471f92bfb9a32090fa925e4cea14b218a290560e27ec5726ae65b8999293eaf3bb0f7b1b45595076a93d1406d00a5b61a1aa0c2b79294f355ef6df0f25f36cac

        • \??\c:\Users\Admin\AppData\Local\Temp\xnrpqp-0.cmdline

          Filesize

          309B

          MD5

          06f215c4cefab053e741e0d4de7dd4a2

          SHA1

          25e2eb5099495ab6e5f36c6d4bc38b19f6a00344

          SHA256

          609ddd75cdec3dde13cb7a6e48a383e48e1086ce72117095a267daa8c98f72ee

          SHA512

          06bd999bc2efb0fb26a48ff7f4b13c36e7dd18430d2c8517140d661ded9997db28172e6bbc2bf168f741776c8c258ec775f2681eaf2d2974534453063f853938

        • memory/1184-111-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-90-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-101-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-56-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-57-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-102-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-64-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-70-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-63-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-73-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-66-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-65-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-68-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-67-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-72-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-85-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-88-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-69-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-93-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-94-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-98-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-74-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-71-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-83-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-84-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-82-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-81-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-79-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-78-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-77-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-76-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-75-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-87-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-86-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-89-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-104-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-91-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-92-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-95-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-97-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-99-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-100-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-96-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-103-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-105-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-110-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-109-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-108-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-107-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/1184-106-0x0000000002DD0000-0x0000000002DF2000-memory.dmp

          Filesize

          136KB

        • memory/2280-27-0x00000000029F0000-0x00000000029F8000-memory.dmp

          Filesize

          32KB

        • memory/2280-6-0x0000000001F00000-0x0000000001F08000-memory.dmp

          Filesize

          32KB

        • memory/2280-61-0x000007FEF6180000-0x000007FEF6B1D000-memory.dmp

          Filesize

          9.6MB

        • memory/2280-52-0x000000001B690000-0x000000001B6B2000-memory.dmp

          Filesize

          136KB

        • memory/2280-50-0x000000001B690000-0x000000001B6B2000-memory.dmp

          Filesize

          136KB

        • memory/2280-49-0x000000001B690000-0x000000001B6B2000-memory.dmp

          Filesize

          136KB

        • memory/2280-48-0x000000001B690000-0x000000001B6B2000-memory.dmp

          Filesize

          136KB

        • memory/2280-4-0x000007FEF643E000-0x000007FEF643F000-memory.dmp

          Filesize

          4KB

        • memory/2280-7-0x000007FEF6180000-0x000007FEF6B1D000-memory.dmp

          Filesize

          9.6MB

        • memory/2280-51-0x000000001B690000-0x000000001B6B2000-memory.dmp

          Filesize

          136KB

        • memory/2280-47-0x000000001B690000-0x000000001B6B2000-memory.dmp

          Filesize

          136KB

        • memory/2280-46-0x000000001B690000-0x000000001B6B2000-memory.dmp

          Filesize

          136KB

        • memory/2280-8-0x000007FEF6180000-0x000007FEF6B1D000-memory.dmp

          Filesize

          9.6MB

        • memory/2280-11-0x000007FEF6180000-0x000007FEF6B1D000-memory.dmp

          Filesize

          9.6MB

        • memory/2280-10-0x000007FEF6180000-0x000007FEF6B1D000-memory.dmp

          Filesize

          9.6MB

        • memory/2280-5-0x000000001B7A0000-0x000000001BA82000-memory.dmp

          Filesize

          2.9MB

        • memory/2280-9-0x000007FEF6180000-0x000007FEF6B1D000-memory.dmp

          Filesize

          9.6MB

        • memory/2280-43-0x0000000002A00000-0x0000000002A08000-memory.dmp

          Filesize

          32KB

        • memory/2708-20-0x000007FEF6180000-0x000007FEF6B1D000-memory.dmp

          Filesize

          9.6MB

        • memory/2708-25-0x000007FEF6180000-0x000007FEF6B1D000-memory.dmp

          Filesize

          9.6MB