Analysis

  • max time kernel
    145s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 05:42

General

  • Target

    ef2a52b9b2457045fefc4d5374b73261_JaffaCakes118.ps1

  • Size

    904KB

  • MD5

    ef2a52b9b2457045fefc4d5374b73261

  • SHA1

    ef3714bf11b603f0f3b8be77d84b98930970b77c

  • SHA256

    d0bcef569548210cf0d2f1ade88c6f92d48fb4b1ce7d3bfb21987ca796c6465d

  • SHA512

    b9427d73b9edcf5f140816dc615884eff76351c19cb0ffa5860e382599589a7e33a50f22165169790f2621f2e40e4f0d072464e639a1f43503f0d0888ad39b46

  • SSDEEP

    12288:sOCK75efghgLg/GDL6LOLL7LkXx4OKqWLLLivLYLLL8LxL5x:l

Malware Config

Extracted

Path

C:\Program Files\Java\jdk1.7.0_80\bin\2179CB-Readme.txt

Family

netwalker

Ransom Note
Hi! Your files are encrypted. All encrypted files for this computer has extension: .2179cb -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. Additionally, your data may have been stolen and if you do not cooperate with us, it will become publicly available on our blog. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_2179cb: NzOYa7uBdl+UFWDT3jPaDFpXi5j0xCWj4bzlVjCoxdPfErFhS4 olnWsl33wZ5g37n+SpJgLoWN4auXp31uUAbH3fqxNV/ToFjQc1 +LyJVaIh4MnwfHjvD+QSTkvYz59lsq8J53UfELfmg9E1OwQJtm U9SkrRbh2aFR/3Tlxlg58PJHTPvj9CpFCGfycQvLLOfj2pQzNB sIOtCxj5Gll+vxqchFHhnsfIJAa8TMuWgZrYv0tcMC6MA7vgCa Uw/Ky5ayeAF4VCmL1USpQFWX3DlvFex9gZ9ICErA==}
URLs

http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion

http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion

Signatures

  • Netwalker Ransomware

    Ransomware family with multiple versions. Also known as MailTo.

  • Renames multiple (7383) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\ef2a52b9b2457045fefc4d5374b73261_JaffaCakes118.ps1
    1⤵
    • Drops file in Program Files directory
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\vz2iu_tp.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2724
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9B95.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC9B94.tmp"
        3⤵
          PID:2808
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\9_zdx8iv.cmdline"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2812
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9E24.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC9E23.tmp"
          3⤵
            PID:2972
        • C:\Windows\system32\notepad.exe
          C:\Windows\system32\notepad.exe "C:\Users\Admin\Desktop\2179CB-Readme.txt"
          2⤵
            PID:10232
        • C:\Windows\system32\vssvc.exe
          C:\Windows\system32\vssvc.exe
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:7156

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Java\jdk1.7.0_80\bin\2179CB-Readme.txt

          Filesize

          1KB

          MD5

          0b386d64c6d733d4a5a1aa9faa76e11f

          SHA1

          4a8112197ef1bab84f4eab5cc117e400ee0ab9cb

          SHA256

          c5773b03764d463de67b6933a71d9c7176dc4738e42999994c90b1817abfac7a

          SHA512

          422625d9acf873e2f48d5b47acbfefcfb691c04bb6508fed5fe6a37e4783c796368f800b121f88d9d61f8c070e6890498d75e6a924e04c6230a5e73ed79c32e5

        • C:\ProgramData\Microsoft\Assistance\Client\1.0\fr-FR\Help{92F2118A-E813-4A4D-9DE2-F96A9DC02C53}.H1Q.2179cb

          Filesize

          1.1MB

          MD5

          d9a6a19959a91541df1bc8bad89635de

          SHA1

          18286ce7df74a243354973f1e8da4f8a8e5565af

          SHA256

          e602f9eb44aef08d889554b0080fc31128f4cb4df4c6fb0a23401212d6ee9e8d

          SHA512

          936b64e300c5d95f927028fe1a221e81345e37fefe0c13fad6a3530690574e32e9237f7b1832e2565fc92fc12aa1d3a9389541d3b1182e8feb26add3c0b43969

        • C:\ProgramData\Microsoft\Assistance\Client\1.0\ja-JP\Help_MKWD_BestBet.H1W.2179cb

          Filesize

          357KB

          MD5

          91023df680f0a36f3a0d53e53e3ec068

          SHA1

          8f54c783c4eaf5efcae331f6541e9a7c004c1c6c

          SHA256

          3b95dd07e0e5e69962c9d40d058819538a0b489dd9852c6291dede4804686325

          SHA512

          b96e1dbe140714a803877d8fd6288087f6f1eb598bb472ce83fabdb9a751c808db0a8b0c3ef63dd849d0e773cb44ae7f00826491d5cf86a592529da4039e1298

        • C:\ProgramData\Microsoft\Assistance\Client\1.0\ja-JP\Help_MTOC_help.H1H.2179cb

          Filesize

          352KB

          MD5

          28e92916f97aa8ae490e5bb55be8662c

          SHA1

          723615e10e18f814730bc194cb5f750c5316cdf3

          SHA256

          7146b3017d1d217c04e22f5453f2188185783cd5900d6ff1a117c1dd20021786

          SHA512

          acc4042b0aa13967784ecc6ad11074b74b4eef548e895f5d3dbd948e3179b5b89604c9b55eb4d2e9a3b6bc1e13feef894a2938215e32e9b42b382defa55f3897

        • C:\ProgramData\Microsoft\OFFICE\UICaptions\3082\PUBWZINT.REST.trx_dll.2179cb

          Filesize

          352KB

          MD5

          48a16ea7c5b81241f3cf02b79651e90e

          SHA1

          e4294a7821d47e92ee27c2fb9308942b8edc02ad

          SHA256

          ab0e802e06d4ab77676991bfa3b51d7ca0ee3698a78628085b9e38211904b442

          SHA512

          014f2ab0ede6ff51bd4379b65aa55b85fba73333d5c058419f1a6b61d34937742a3294f79aed218e675339676fed87ba03017c338295b69606b6ef2c6f6f1450

        • C:\ProgramData\Microsoft\OFFICE\UICaptions\3082\SGRES.DLL.trx_dll.2179cb

          Filesize

          13KB

          MD5

          8ebfff7bf07b4673847d6f6a0f0d3494

          SHA1

          3b9871100980d942c1f261af6faa0115f2d3b99e

          SHA256

          44c6b1c7498b98fc09a95cbde0e24aae56930b1bbe3ca4ab5b9b969d69c36f89

          SHA512

          4a4d8940e4dcc6ec9e15ec90e5d2f39c0e191396d3c464a5e31d5da17a5d4a59b68219ce6904c6fa5a3241bebccfab0c1e1c06f24c2753a98f6220b3ed2afd82

        • C:\ProgramData\Microsoft\OFFICE\UICaptions\3082\STINTL.DLL.trx_dll.2179cb

          Filesize

          17KB

          MD5

          dd625716b37cf0eefc25f2aa978292ac

          SHA1

          4e6de75249a172686640d148cbe2f96b1ef27203

          SHA256

          78c9e1cc995ea6c3b2e8afe017805f1145804601ee8d7c7df754cba9c6611259

          SHA512

          ef3cc198096ff061692bba00de7377a4a5da4b570738804dfa51e5e4b1dbdd7273b5bfd27fb4bce6211375dcb66282c25debe10ff82bb0a297b55bc159b40669

        • C:\ProgramData\Microsoft\OFFICE\UICaptions\3082\VISINTL.DLL.trx_dll.2179cb

          Filesize

          462KB

          MD5

          2eb3b0c3ee20bcea2daf06d213626b06

          SHA1

          034da82dbc9911e45643a1fb6d5234df54d4bb33

          SHA256

          46729aaff5f9756cbd5753d6803e218d7794b01b69a0a699dcffc6be675bb35c

          SHA512

          c65f180c8cd65203b32e7b57cba31aa7e350ffa7e01dd9ba2316a5dca0508b4e4f31beef86ad28a9712ce78e0176888975fd82310fcbe7e57a066c1bd79841b2

        • C:\ProgramData\Microsoft\OFFICE\UICaptions\3082\WWINTL.REST.trx_dll.2179cb

          Filesize

          1.1MB

          MD5

          a877cb3d7574de064ebae65e401a2f60

          SHA1

          b6231f2f2c4f494294c2bade03ee343293deaabe

          SHA256

          885d71f78f988fd76786ffb7411f2ceda86c1d2d1428f3b5f12311fece1e82c0

          SHA512

          6d086ad1a444f264e9a5ab940e667a55aa1d677005dfd72a03d5a63bd6e453b17242af1db554c99633ba48ddbaa95f888d9e843c666619329bb63526d899ccd2

        • C:\ProgramData\Microsoft\OFFICE\UICaptions\3082\XLINTL32.REST.trx_dll.2179cb

          Filesize

          1.2MB

          MD5

          8cd9939bc522f87cdb9031435e820f15

          SHA1

          aa3f4d8b8a9ca9f1c15a4c174a1fb28405b18c98

          SHA256

          3c8983f4f230178f694892157bbf3a93357839df528cc58ce05ac0a6e28f9fc4

          SHA512

          169c6de8b7d75a9e0e1a2657729b6a139e730db2eee94e842a5e0f7d6b5ce4bcf89f07cb870f498b73387cf19082eb2f05f5cae3e42fbd00acd178458e724923

        • C:\ProgramData\Microsoft\OFFICE\UICaptions\3082\XLSLICER.DLL.trx_dll.2179cb

          Filesize

          14KB

          MD5

          55498eb5e9438446b237fcfbb8b349ae

          SHA1

          6619601b84e681aef1038d28c47a18da049645d6

          SHA256

          efa6b35d0a56cfb5024e07196c87c6545d47fa3900518ea5258878c69e177954

          SHA512

          a26a98ce68732111d6574ac4b651cb33d02fd96954f511cde9b991bed066ee91b5655cc3053a6d70fe947dd3dcf916f0b962502ebb2afb8c29bb45f16f50922a

        • C:\ProgramData\Microsoft\Windows\Ringtones\Ringtone 01.wma.2179cb

          Filesize

          197KB

          MD5

          1414aa643ded2e272b28a5979e35b99a

          SHA1

          2d38866724770f80e976ac9e3a3589b103757096

          SHA256

          ae4b4dd6371bf81d2526b3192fb1ca6079cb3028714989deeb49ecd0f09bfd51

          SHA512

          a26d779ab9d6cd0cd1a0a2ddf583cb7271913726acff1285d3bd7cb68135733da525ac06f36b15f1bcf67e8d3eb5dd3c6a3acd25249f7c3e676c2bbf4e7ade7e

        • C:\ProgramData\Microsoft\Windows\Ringtones\Ringtone 03.wma.2179cb

          Filesize

          92KB

          MD5

          73dfc2451aa47f4a149961ecc70fa62b

          SHA1

          1b60d71626b867807da4dc30d9bd13c81e4ab452

          SHA256

          6479057bbd38222c6763ff9984b2310daf8dfd7694aefda460613a8fb12cfe0b

          SHA512

          e363519b821095f98ad59a78e2b57a5cf1f26364f4bd602a575cb73752256017e80db6db98e1679537e475484ec7bf393449c0a2a0ec350e77c893035ffee4bb

        • C:\Users\Admin\AppData\Local\Temp\9_zdx8iv.dll

          Filesize

          4KB

          MD5

          96d92f424efd64316b501b51b267f80c

          SHA1

          788a17bc98f5047d4e575c6865803ad7db4bdc35

          SHA256

          c68f5728da15747bf97a65cbfed3a84e9baf8f29f658d30ff007309f8aa83e05

          SHA512

          252060d5b4c78a7c7728284fbe83f2b4f741d8b897996c7c04f9ccf3c4039e1ed1b0cef243acae2134af41f40e0178b41be46acbfa847be43fee0d446654e2e5

        • C:\Users\Admin\AppData\Local\Temp\9_zdx8iv.pdb

          Filesize

          7KB

          MD5

          c040e0a648108dff6366839d5ae545ae

          SHA1

          9f3cabf580e56fc32a66dd1d3d1abb2d9ed44aae

          SHA256

          f94b06826fea1f48f2560574972646bc7a08710593c0d3b2e6b60c8e2d73aaa0

          SHA512

          6758ea0007d18bfa7bd23707cf2252141b5c9c7f76c99dece34dad45023870bb0872385e370a2a3eb0a7ad42cc2ceefdc50e7ac5ebecc24cc7e86636dd56aa4a

        • C:\Users\Admin\AppData\Local\Temp\RES9B95.tmp

          Filesize

          1KB

          MD5

          635e97f300d3b0f1ec14fd57ad1e65a4

          SHA1

          7486b975180039dd3d8acaa09c677c09d04a0d4e

          SHA256

          66595be358d2e30bfe8cb724bbf48e433209bf47bb523b2ce1cb59de6a43f5ba

          SHA512

          1f566d39577877a0f8249f789685b4b652e39c8475c3dfd90871e61b711945e961b0325b8b89be4d94d4e52e44e832736ca3f23da769b0f009dc8e99780a3e4f

        • C:\Users\Admin\AppData\Local\Temp\RES9E24.tmp

          Filesize

          1KB

          MD5

          be50bdaac88014c3f8e565fe70e79bf9

          SHA1

          c2ccd3ce73172739dcc81545762333ec91486ee9

          SHA256

          c0a3473f125b0b02e96872d68a836e7927aeeb1afc5728acda27303b2fe8175b

          SHA512

          46a9acf32481b3bf13e364bb6acaaef958a01c7a311de93bd39537e0edb4423c4e4e9707ff5d27e92ef8994201c8cb52251eeef483d0f05e869f85b758b44eb0

        • C:\Users\Admin\AppData\Local\Temp\vz2iu_tp.dll

          Filesize

          6KB

          MD5

          3074c9a63dea10d3c6ac425e876559a5

          SHA1

          c4902b516f3786ec81ef713d6ebb90fff63b8987

          SHA256

          b592d6a32919236afe93191baecd7c1277b6ec0b90d063179db8967ea58303d6

          SHA512

          4c37ccae5546a4b5667e7857ded0a41ce85d81237fe2510d061e288af957bb6688dbe5a11d8406c0d5d984e5df201d60939aa9a43407bb6e3ed4e894cb09eb17

        • C:\Users\Admin\AppData\Local\Temp\vz2iu_tp.pdb

          Filesize

          7KB

          MD5

          2bd31b9e19b6a7aa40d5a05fb308455c

          SHA1

          a66cf55ba6b9cfa96fe1a2d1b2ce7e67c2e09cf8

          SHA256

          39f6bc049b4e8c0260bdf8c27dfcc9988812e4e4edac1181404a56b637fa1351

          SHA512

          c408fd389c88f02ee4b4dcd9d7e3a9125c751a4bc67918da52f558e6e4ec0ef39a5cf8ec677ee62e2ff9f1c1391ad87572fac25abcdc1f5cdeb4feda1a2e5c4f

        • \??\c:\Users\Admin\AppData\Local\Temp\9_zdx8iv.0.cs

          Filesize

          2KB

          MD5

          c893ff54420a206c4206af5107a02bbb

          SHA1

          8a90c410a55d545e71425c061973d566a52e1465

          SHA256

          efd3d07c27b013c8b5924d1ec0e58ed4315c38f8261169931f464de78ccf9b21

          SHA512

          8f9c695560994c9db400661ef183328559379c6d722527f9d01ae181dbc6a01984ac007d485cf029ed1be1990a36966d8c6b840623e851fd3a0a32ba7c447c27

        • \??\c:\Users\Admin\AppData\Local\Temp\9_zdx8iv.cmdline

          Filesize

          309B

          MD5

          30b913b8bd3a711a79aaab734652bd12

          SHA1

          491641593b63879b7c327bf4cfde6e79b826adb5

          SHA256

          10c78f9e33cb128b310119bd48beb8f2c03a27919c6770e3ef4d06138c23ae93

          SHA512

          ca26c799e93aa2dd75fd32a6f5c529dc95e041b1b9dde8a504d6852f4295ff9cabafb9a37bb8de25c93576251fa927ec46c55bbae10baae4501f43fe53f9238f

        • \??\c:\Users\Admin\AppData\Local\Temp\CSC9B94.tmp

          Filesize

          652B

          MD5

          754b1dfc13c38cbec0eeffce8e1d3f5c

          SHA1

          16224f041b38906628679ec72d4742cef32c5f59

          SHA256

          be221aee260c6bda3f3312fd001ac3c3b6165dc289f46dec539da38aa755f684

          SHA512

          ca019f86a8e90c5978b82e6d74d88ab828ed35ce0c88d9fcdca510273ae51508bffa3afc7a6b405f1b3faf89607371ae152818f6ca0253c51309d624dd052ff8

        • \??\c:\Users\Admin\AppData\Local\Temp\CSC9E23.tmp

          Filesize

          652B

          MD5

          bf4eeaf35a2a8efd0175c85a2c748912

          SHA1

          ed22dd811a8f55a1f4d69a2f9f9b7dba04d0a9b9

          SHA256

          24ae40762d39ac4f748c75cd4f20943e2482cf9af4d3dafda43fba849a5d4b39

          SHA512

          5ddf8b30a159a0e3698652212911a0e09b3cd84054d3f0d9aa5e57db4f7769e857eaa299d75fefe1b71d269424d6edf7fb0a510ae108f83c03f95132a567faea

        • \??\c:\Users\Admin\AppData\Local\Temp\vz2iu_tp.0.cs

          Filesize

          9KB

          MD5

          02a0899f755d28aa8ca5b6dbf9d79db8

          SHA1

          5cbb31d741541eb9a6ffff3b5ea404fd462d4d12

          SHA256

          c789d50f8fd9714067788f5f35199ac13157da910695570b7662beca2750d00b

          SHA512

          2d1dfaac2440f630bb391e3b3fe4bfccd4c91dfb6d6382201b8a14c419d89ac97ef52ad0a40490ee50879dd08e14cfd7a760978bd4921e1ac849877d84b5bcdb

        • \??\c:\Users\Admin\AppData\Local\Temp\vz2iu_tp.cmdline

          Filesize

          309B

          MD5

          230590279586339a07521c73b3fa545c

          SHA1

          5f672c56206589c86757e31549a710d98c5f086d

          SHA256

          7a112365bd8e95d1c30620455a8abf3566941b6ec2d5a220c83fee4b49454e8f

          SHA512

          d5cb50445631424ab9e173cbaaafd9520e79812d924463055cd61971c0722d3fec9368bf50e7fa7a7872c50b9a2731fc0f2238be5f1fa7eb0c19c55e6be5f2c8

        • memory/2068-98-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-82-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-53-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-52-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-51-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-50-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-49-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-54-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-58-0x000007FEF5FA0000-0x000007FEF693D000-memory.dmp

          Filesize

          9.6MB

        • memory/2068-59-0x000007FEF625E000-0x000007FEF625F000-memory.dmp

          Filesize

          4KB

        • memory/2068-60-0x000007FEF5FA0000-0x000007FEF693D000-memory.dmp

          Filesize

          9.6MB

        • memory/2068-63-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-62-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-64-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-68-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-69-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-73-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-66-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-65-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-83-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-87-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-92-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-67-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-95-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-96-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-48-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-102-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-100-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-77-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-76-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-75-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-74-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-72-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-101-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-71-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-70-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-99-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-46-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-81-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-80-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-79-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-78-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-85-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-86-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-89-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-90-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-88-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-91-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-94-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-93-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-97-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-103-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-111-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-113-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-112-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-110-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-109-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-108-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-107-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-106-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-105-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-104-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-47-0x0000000002930000-0x0000000002952000-memory.dmp

          Filesize

          136KB

        • memory/2068-43-0x0000000002620000-0x0000000002628000-memory.dmp

          Filesize

          32KB

        • memory/2068-25637-0x000007FEF5FA0000-0x000007FEF693D000-memory.dmp

          Filesize

          9.6MB

        • memory/2068-4-0x000007FEF625E000-0x000007FEF625F000-memory.dmp

          Filesize

          4KB

        • memory/2068-27-0x0000000002610000-0x0000000002618000-memory.dmp

          Filesize

          32KB

        • memory/2068-11-0x000007FEF5FA0000-0x000007FEF693D000-memory.dmp

          Filesize

          9.6MB

        • memory/2068-10-0x000007FEF5FA0000-0x000007FEF693D000-memory.dmp

          Filesize

          9.6MB

        • memory/2068-9-0x000007FEF5FA0000-0x000007FEF693D000-memory.dmp

          Filesize

          9.6MB

        • memory/2068-7-0x0000000001F30000-0x0000000001F38000-memory.dmp

          Filesize

          32KB

        • memory/2068-8-0x000007FEF5FA0000-0x000007FEF693D000-memory.dmp

          Filesize

          9.6MB

        • memory/2068-6-0x000000001B330000-0x000000001B612000-memory.dmp

          Filesize

          2.9MB

        • memory/2068-5-0x000007FEF5FA0000-0x000007FEF693D000-memory.dmp

          Filesize

          9.6MB

        • memory/2724-17-0x000007FEF5FA0000-0x000007FEF693D000-memory.dmp

          Filesize

          9.6MB

        • memory/2724-25-0x000007FEF5FA0000-0x000007FEF693D000-memory.dmp

          Filesize

          9.6MB