Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-09-2024 19:28

General

  • Target

    d04ce22792560340225e1efe380e148c_JaffaCakes118.exe

  • Size

    396KB

  • MD5

    d04ce22792560340225e1efe380e148c

  • SHA1

    f2e32e42d39be73318734548b181f8c62a3e7c30

  • SHA256

    6795ddd48ece83ed0ad29d73d0a17d581b6b0efb7768b59993da7a3e3c3c37d8

  • SHA512

    09b280f4d279c98af195f56c1c62833bc116828096c23a173437d69b54eaf050d89c66b673c67a2c2ff9282fdf09913a9c83d79f87f248bdb115e4c521cc8304

  • SSDEEP

    12288:zpMCsOfMaUJnei6Q8oCK/VODpGpNQwpdirufVVtCIoA:zpMCsOfMnJ36NmcGjbFvoA

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\RECOVERjikjv.txt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What's the matter with your files? Your data was secured using a strong encryption with RSA4096. Use the link down below to find additional information on the encryption keys using RSA4096:https://en.wikipedia.org/wiki/RSA_(cryptosystem) What exactly that means? It means that on a structural level your files have been transformed. You won't be able to use, read, see or work with them anymore. In other words they are useless, however, there is a possibility to restore them with our help. What exactly happened to your files? *** Two personal RSA4096 keys were generated for your PC/Laptop; one key is public, another key is private. *** All your data and files were encrypted by the means of the public key, which you received over the web. *** In order to decrypt your data and gain access to your computer you need a private key and a decryption software, which can be found on one of our secret servers. What should you do next? There are several options for you to consider: 1. You can wait for a while until the price of a private key will raise, so you will have to pay twice as much to access your files or 2. You can start getting BitCoins right now and get access to your data quite fast. In case you have valuable files, we advise you to act fast as there is no other option rather than paying in order to get back your data. In order to obtain specific instructions, please access your personal homepage by choosing one of the few addresses down below: http://h5nuwefkuh134ljngkasdbasfg.corolbugan.com/F9A9BFA439FFFBA2 http://p54dhkus4tlkfashdb6vjetgsdfg.greetingshere.at/F9A9BFA439FFFBA2 http://f4dsbjhb45wfiuqeib4fkqeg.meccaledgy.at/F9A9BFA439FFFBA2 If you can't access your personal homepage or the addresses are not working, complete the following steps: 1 Download TOR Browser - http://www.torproject.org/projects/torbrowser.html.en 2 Install TOR Browser 3 Open TOR Browser 4 Insert the following link in the address bar: k7tlx3ghr3m4n2tu.onion/F9A9BFA439FFFBA2 5 Follow the steps on your screen IMPORTANT INFORMATION Your personal homepages: http://h5nuwefkuh134ljngkasdbasfg.corolbugan.com/F9A9BFA439FFFBA2 http://p54dhkus4tlkfashdb6vjetgsdfg.greetingshere.at/F9A9BFA439FFFBA2 http://f4dsbjhb45wfiuqeib4fkqeg.meccaledgy.at/F9A9BFA439FFFBA2 Your personal page Tor-Browser k7tlx3ghr3m4n2tu.onion/F9A9BFA439FFFBA2 Your personal identification ID: F9A9BFA439FFFBA2
URLs

http://h5nuwefkuh134ljngkasdbasfg.corolbugan.com/F9A9BFA439FFFBA2

http://p54dhkus4tlkfashdb6vjetgsdfg.greetingshere.at/F9A9BFA439FFFBA2

http://f4dsbjhb45wfiuqeib4fkqeg.meccaledgy.at/F9A9BFA439FFFBA2

http://k7tlx3ghr3m4n2tu.onion/F9A9BFA439FFFBA2

Signatures

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Interacts with shadow copies 3 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies data under HKEY_USERS 1 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d04ce22792560340225e1efe380e148c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d04ce22792560340225e1efe380e148c_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2824
    • C:\Users\Admin\AppData\Local\Temp\d04ce22792560340225e1efe380e148c_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\d04ce22792560340225e1efe380e148c_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:832
      • C:\Users\Admin\Documents\uppado.exe
        C:\Users\Admin\Documents\uppado.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3388
        • C:\Users\Admin\Documents\uppado.exe
          C:\Users\Admin\Documents\uppado.exe
          4⤵
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Modifies data under HKEY_USERS
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:948
          • C:\Windows\System32\vssadmin.exe
            "C:\Windows\System32\vssadmin.exe" Delete Shadows /All /Quiet
            5⤵
            • Interacts with shadow copies
            PID:3080
          • C:\Windows\SysWOW64\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERjikjv.txt
            5⤵
            • System Location Discovery: System Language Discovery
            • Opens file in notepad (likely ransom note)
            PID:2892
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RECOVERjikjv.html
            5⤵
            • Enumerates system info in registry
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:560
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa8b0c46f8,0x7ffa8b0c4708,0x7ffa8b0c4718
              6⤵
                PID:1208
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,15480442434208247278,13991741205883768377,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:2
                6⤵
                  PID:5012
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,15480442434208247278,13991741205883768377,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:3
                  6⤵
                    PID:2272
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,15480442434208247278,13991741205883768377,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:8
                    6⤵
                      PID:2972
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15480442434208247278,13991741205883768377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:1
                      6⤵
                        PID:3144
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15480442434208247278,13991741205883768377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:1
                        6⤵
                          PID:916
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,15480442434208247278,13991741205883768377,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 /prefetch:8
                          6⤵
                            PID:3616
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,15480442434208247278,13991741205883768377,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 /prefetch:8
                            6⤵
                              PID:2916
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15480442434208247278,13991741205883768377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:1
                              6⤵
                                PID:2736
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15480442434208247278,13991741205883768377,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:1
                                6⤵
                                  PID:824
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15480442434208247278,13991741205883768377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:1
                                  6⤵
                                    PID:2412
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15480442434208247278,13991741205883768377,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:1
                                    6⤵
                                      PID:2828
                                  • C:\Windows\System32\vssadmin.exe
                                    "C:\Windows\System32\vssadmin.exe" Delete Shadows /All /Quiet
                                    5⤵
                                    • Interacts with shadow copies
                                    PID:1576
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\D04CE2~1.EXE >> NUL
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:4912
                          • C:\Windows\system32\vssvc.exe
                            C:\Windows\system32\vssvc.exe
                            1⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5068
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:1520
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:276

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Program Files\7-Zip\Lang\RECOVERjikjv.html

                                Filesize

                                7KB

                                MD5

                                14328e16ce74b27afd0847cde73670cd

                                SHA1

                                cda2e4534ba927cd65addd8bce2817fc0b2ae86f

                                SHA256

                                6eee2011903447bb6702dbc9968259fa5b89f4da3b1c159f231d19862d75121b

                                SHA512

                                66b63419333097f3ef417f12e2f1d627ebc4916ca8bb7f1002d38672262620a0c9bd2f1a778ada8df202ac783ff953e413848a368b46fef0ed4d4f3736c3f411

                              • C:\Program Files\7-Zip\Lang\RECOVERjikjv.png

                                Filesize

                                79KB

                                MD5

                                02d606555c1ab499ed436f2609aa6026

                                SHA1

                                a8e4c818811922006dbd4ea9f03a1de135419d11

                                SHA256

                                ec97f45f27ac8c1f3dfae34e67a103373f214322bd0618084cfdf2e25fc08aa4

                                SHA512

                                9afd40492c9f5bc5bc578f36ba58ce616790ae44c169d4aa8797b971aaaef12209f28151c8b525cf49eab581539db95b343f364df2251c15b52088cffdb8028d

                              • C:\Program Files\7-Zip\Lang\RECOVERjikjv.txt

                                Filesize

                                2KB

                                MD5

                                4f56d7576b3c323fc21c1275c7c2fc4f

                                SHA1

                                f02270a55ab9fe00290f658cedc4316b215d143f

                                SHA256

                                889b4eda891a2cf972806f0ff111e1580888af8416a8f75de851f5c42f4d6c67

                                SHA512

                                0d8da811b3d4fe8f7a702090f4e3c6d4f54c9408b874e79d663f7d232d7e5331b2cd113fbc08fc6d4b802998cd2980385a50f38f95c6ab804f0f5d13fa01ff62

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                27304926d60324abe74d7a4b571c35ea

                                SHA1

                                78b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1

                                SHA256

                                7039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de

                                SHA512

                                f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                9e3fc58a8fb86c93d19e1500b873ef6f

                                SHA1

                                c6aae5f4e26f5570db5e14bba8d5061867a33b56

                                SHA256

                                828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4

                                SHA512

                                e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                5e72d011bc23772702412226263cb053

                                SHA1

                                da240df13db4a78b256eb82701c9f49c23365171

                                SHA256

                                8f0807928ad62487339dbf0d154047e73aad9886f3c0e928b3acb26235a76973

                                SHA512

                                ae9ded6becdde11600c50d5a3afd4573604213a81054ab1dfa91bd0f76d598d6ab60ba161debd5fc996146e14af31f2448681e1c0ccf9f89b663b46ddcb005dd

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                1f8e1f6a6360c477099c6098a7133fb7

                                SHA1

                                b46dfc5c33dd5dd5d97a37e0961d19b7341d41c9

                                SHA256

                                50d455411389cd00805fb93e9728382f42b24fdcaeb459f5a54512705f26896c

                                SHA512

                                d4e13ddfbd03f8130de8903d0df2642c6e8173cc6e498a0ff5e94cd6d9015ab19c38616e66bbc93698da38d7ec394b1785ef78e9c39cba1df6e6d7134c943569

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                10KB

                                MD5

                                3685f05c7952103d307a698f5e229b55

                                SHA1

                                d7811b518001819dccb5ad95c7150aae94906533

                                SHA256

                                511f4273bb11ecdc23c580d57daf53f351d8bd875c01b39a8923d7908a01f250

                                SHA512

                                99be4a405b473807c305d7e506190d2f3af71d3c460c2484b30165ccece22915d79319a3d597f769a8ff087f5b4852c3de87e7085c8d2ce60fa56e04a7954f12

                              • C:\Users\Admin\Documents\uppado.exe

                                Filesize

                                396KB

                                MD5

                                d04ce22792560340225e1efe380e148c

                                SHA1

                                f2e32e42d39be73318734548b181f8c62a3e7c30

                                SHA256

                                6795ddd48ece83ed0ad29d73d0a17d581b6b0efb7768b59993da7a3e3c3c37d8

                                SHA512

                                09b280f4d279c98af195f56c1c62833bc116828096c23a173437d69b54eaf050d89c66b673c67a2c2ff9282fdf09913a9c83d79f87f248bdb115e4c521cc8304

                              • memory/832-17-0x0000000073EB0000-0x0000000073EE9000-memory.dmp

                                Filesize

                                228KB

                              • memory/832-16-0x0000000000400000-0x000000000047B000-memory.dmp

                                Filesize

                                492KB

                              • memory/832-7-0x0000000073EB0000-0x0000000073EE9000-memory.dmp

                                Filesize

                                228KB

                              • memory/832-6-0x0000000000400000-0x000000000047B000-memory.dmp

                                Filesize

                                492KB

                              • memory/832-2-0x0000000000400000-0x000000000047B000-memory.dmp

                                Filesize

                                492KB

                              • memory/832-5-0x0000000000400000-0x000000000047B000-memory.dmp

                                Filesize

                                492KB

                              • memory/832-3-0x0000000000400000-0x000000000047B000-memory.dmp

                                Filesize

                                492KB

                              • memory/948-9585-0x0000000000400000-0x000000000047B000-memory.dmp

                                Filesize

                                492KB

                              • memory/948-23-0x0000000073EE0000-0x0000000073F19000-memory.dmp

                                Filesize

                                228KB

                              • memory/948-26-0x0000000000400000-0x000000000047B000-memory.dmp

                                Filesize

                                492KB

                              • memory/948-24-0x0000000000400000-0x000000000047B000-memory.dmp

                                Filesize

                                492KB

                              • memory/948-2176-0x0000000000400000-0x000000000047B000-memory.dmp

                                Filesize

                                492KB

                              • memory/948-2461-0x0000000000400000-0x000000000047B000-memory.dmp

                                Filesize

                                492KB

                              • memory/948-5067-0x0000000000400000-0x000000000047B000-memory.dmp

                                Filesize

                                492KB

                              • memory/948-7379-0x0000000000400000-0x000000000047B000-memory.dmp

                                Filesize

                                492KB

                              • memory/948-8268-0x0000000000400000-0x000000000047B000-memory.dmp

                                Filesize

                                492KB

                              • memory/948-21-0x0000000000400000-0x000000000047B000-memory.dmp

                                Filesize

                                492KB

                              • memory/948-9586-0x0000000000400000-0x000000000047B000-memory.dmp

                                Filesize

                                492KB

                              • memory/948-9594-0x0000000000400000-0x000000000047B000-memory.dmp

                                Filesize

                                492KB

                              • memory/948-9595-0x0000000000400000-0x000000000047B000-memory.dmp

                                Filesize

                                492KB

                              • memory/948-28-0x0000000000400000-0x000000000047B000-memory.dmp

                                Filesize

                                492KB

                              • memory/948-22-0x0000000000400000-0x000000000047B000-memory.dmp

                                Filesize

                                492KB

                              • memory/948-20-0x0000000000400000-0x000000000047B000-memory.dmp

                                Filesize

                                492KB

                              • memory/2824-0-0x0000000000530000-0x0000000000536000-memory.dmp

                                Filesize

                                24KB

                              • memory/2824-4-0x0000000000530000-0x0000000000536000-memory.dmp

                                Filesize

                                24KB

                              • memory/2824-1-0x0000000000530000-0x0000000000536000-memory.dmp

                                Filesize

                                24KB

                              • memory/3388-13-0x0000000000400000-0x00000000004A8000-memory.dmp

                                Filesize

                                672KB