Analysis

  • max time kernel
    150s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    07/05/2024, 03:46

General

  • Target

    1f577c6f861c87a6998b30e75de33246_JaffaCakes118.exe

  • Size

    395KB

  • MD5

    1f577c6f861c87a6998b30e75de33246

  • SHA1

    109846d60ef48057cef383ceb2ab0ef56a5b7e53

  • SHA256

    4d6c7f67cf774e66779f8f31440ec1d86fb4d7a93b473b9e1d4ea6af0f77a5c7

  • SHA512

    204dd1a5fcd5ec50ae61be3310a50c139e459adb9855b7ce51c53caec3d0628e228a18cc5450fba31eb8a7dde288b07d7a447b9b09edda7965779b49e951a787

  • SSDEEP

    6144:3myHvNqRbPD0MNja+o0Is37qeG/AJuzhwvTrUWU6sXQFJEES6fiJYu65syhrv8M:FygMRWsL2hwLQGsXQ7JNiauqsyhrZ

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+veeje.txt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What's the matter with your files? Your data was secured using a strong encryption with RSA4096. Use the link down below to find additional information on the encryption keys using RSA4096:https://en.wikipedia.org/wiki/RSA_(cryptosystem) What exactly that means? It means that on a structural level your files have been transformed. You won't be able to use, read, see or work with them anymore. In other words they are useless, however, there is a possibility to restore them with our help. What exactly happened to your files? *** Two personal RSA4096 keys were generated for your PC/Laptop; one key is public, another key is private. *** All your data and files were encrypted by the means of the public key, which you received over the web. *** In order to decrypt your data and gain access to your computer you need a private key and a decryption software, which can be found on one of our secret servers. What should you do next? There are several options for you to consider: 1. You can wait for a while until the price of a private key will raise, so you will have to pay twice as much to access your files or 2. You can start getting BitCoins right now and get access to your data quite fast. In case you have valuable files, we advise you to act fast as there is no other option rather than paying in order to get back your data. In order to obtain specific instructions, please access your personal homepage by choosing one of the few addresses down below: http://t54ndnku456ngkwsudqer.wallymac.com/45FF7EFEE2ADE455 http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/45FF7EFEE2ADE455 http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/45FF7EFEE2ADE455 If you can't access your personal homepage or the addresses are not working, complete the following steps: 1. Download TOR Browser - http://www.torproject.org/projects/torbrowser.html.en 2. Install TOR Browser 3. Open TOR Browser 4. Insert the following link in the address bar: k7tlx3ghr3m4n2tu.onion/45FF7EFEE2ADE455 5. Follow the steps on your screen IMPORTANT INFORMATION Your personal homepages: http://t54ndnku456ngkwsudqer.wallymac.com/45FF7EFEE2ADE455 http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/45FF7EFEE2ADE455 http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/45FF7EFEE2ADE455 Your personal page Tor-Browser k7tlx3ghr3m4n2tu.onion/45FF7EFEE2ADE455 Your personal identification ID: 45FF7EFEE2ADE455
URLs

http://t54ndnku456ngkwsudqer.wallymac.com/45FF7EFEE2ADE455

http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/45FF7EFEE2ADE455

http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/45FF7EFEE2ADE455

http://k7tlx3ghr3m4n2tu.onion/45FF7EFEE2ADE455

Signatures

  • Renames multiple (430) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Drops startup file 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f577c6f861c87a6998b30e75de33246_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1f577c6f861c87a6998b30e75de33246_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Users\Admin\AppData\Local\Temp\1f577c6f861c87a6998b30e75de33246_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\1f577c6f861c87a6998b30e75de33246_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2592
      • C:\Users\Admin\Documents\jjiufo.exe
        C:\Users\Admin\Documents\jjiufo.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2660
        • C:\Users\Admin\Documents\jjiufo.exe
          C:\Users\Admin\Documents\jjiufo.exe
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Modifies data under HKEY_USERS
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2484
          • C:\Windows\system32\cmd.exe
            cmd /c pabmn.bat
            5⤵
              PID:1620
              • C:\Windows\system32\reg.exe
                reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v pabmn /t REG_SZ /d "C:\Users\Admin\Documents\jjiufo.exe" /f
                6⤵
                  PID:1816
              • C:\Windows\SysWOW64\NOTEPAD.EXE
                "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_ReCoVeRy_+veeje.txt
                5⤵
                  PID:336
                • C:\Program Files\Internet Explorer\iexplore.exe
                  "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\_ReCoVeRy_+veeje.html
                  5⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:772
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:772 CREDAT:275457 /prefetch:2
                    6⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of SetWindowsHookEx
                    PID:2728
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\1F577C~1.EXE >> NUL
              3⤵
              • Deletes itself
              PID:2612
        • C:\Windows\SysWOW64\DllHost.exe
          C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
          1⤵
          • Suspicious use of FindShellTrayWindow
          PID:2480

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+veeje.html

          Filesize

          7KB

          MD5

          7bd7932e17dfa5283acdbaceca76b738

          SHA1

          0a267bd543488f8d754bf9fa37ccfb3dfd3b5243

          SHA256

          8cd77f789a74f1b2bedae7dd9904e5fb892d8655e0bd1fa5d77473e36d560f22

          SHA512

          924e88a40e94cc8b4ff0c89d0235e05b27b8c9950464adfdd0c9b05455e749c1300e05e9ab880f03c54d83a9d9dac01729e5408b1103c9cc5a9468ad4000e872

        • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+veeje.png

          Filesize

          77KB

          MD5

          3c8242e1dcfec0221b1727fada8ee655

          SHA1

          2c5dfd86f64bd051ff011e51fe7425a8181633f4

          SHA256

          2030c6f3fdb039347106fa162bd4405f391f26e8aa08c4f66b9af98baae1b80d

          SHA512

          8d420d92978ea8e17c2d237f35a29b8bde3b2990736277c2836383063b57e74c21a015cfa76afcb29372dad0daff8eb3dd8ae7d649639b5dfb7f2bd7339f5e43

        • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+veeje.txt

          Filesize

          2KB

          MD5

          6689cb35b0f736c35006ee23a72cf2ba

          SHA1

          97bd9a99d480f79d22fd85d7da3f5dd0a9bda7b2

          SHA256

          4aa66061cff9984a3ee542869b3ac8ca2e9e4b27327548ecb0c93bafb45ce59c

          SHA512

          872d5738870d7f88ea9301e3c69eaaa9915bcaa19e5a4c50ff74ce56a4ee3e02842d744b80860de53a5110adea0d7ae27742458dc62f4b040b3ac737148b9d6a

        • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

          Filesize

          11KB

          MD5

          fd931f47a450294de41e42c5ef66d150

          SHA1

          ebdf03667676aba33f55dd0926f381e3b7bf06e5

          SHA256

          c3c7cf3edd0d2bda1b3f097219ef70d6ef86154fbd226e53a6e1981dd4aeedab

          SHA512

          1076c12385d7ca770dc13087e04b9a5168fcafd5617072ba2b261dd3c0292abdd9c97457473984c89984a6a22d373307b0c8c2f318ed6471ede3385a53db8150

        • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

          Filesize

          109KB

          MD5

          363641e52afbc605e241b4e3e99f4991

          SHA1

          d6defd911eeb8b5d6099765b90a408588e8b0d56

          SHA256

          6e5a5342ef5d363eab04ebb8dbb6303e0832d5df9024258ae7c09043013e727a

          SHA512

          657b9a5844e2ef81e63089646f968df413f30165cf7d0c719e402655ebf4ff9f36d12054fb5b6001a36a4a2332e8e54de284e3b39d6757172878ca5066fd85af

        • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

          Filesize

          173KB

          MD5

          799220b69247b44e60aef0eca71e8d73

          SHA1

          eb07cb328c2958ef50deb401932eba22e4a075f5

          SHA256

          e952db139557c2d83a949ef39e9156e6be7ecdd954a220187f579996c8d42214

          SHA512

          3352062b3d1f49484ddbe59a53882f5fe01a679829966a8b4211a12be5ec1329b7be9bef16ad170a87ad66addc72c44204fae45af04264f4d9cbe7e3ca8cb09e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          e63d40e063a2933ff1304cc67fba3c4c

          SHA1

          565a5b1e743cf04d3ed6b97c6302454d2171f311

          SHA256

          0426c782130187d6acbf64e9774908de91b96d038c1f12e623021fc397f1246d

          SHA512

          281905b39174ead5d8115c9202282a9c4087139d9fa4854e8f8a91cb12e8f70d3e17d9da0e12663b56fd1a1d7db5de32ea1a081e1b9ca2a7d1187c5eaee1cedf

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          55668635b56b11b38501fcaae4cb41f1

          SHA1

          88f0d7e969e96721a1d3f50b6bccfe23597d04af

          SHA256

          354d7efaf8abfa4ab28e125227d6df012870144900114f5ddbf6437683477032

          SHA512

          cc4943d9bcfbbecd48b99cf6b3084e9d0aa2307e0682ad5b404e319b137bd85c2f4b881ef4a32c4cac3b47ca2fa2be51b371286ad7e162cd0c9dce355e59cba5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          271ce46c73978e60b25f3d6d3b01e4c2

          SHA1

          430880604d264ad140b11c0e15405ece34665eda

          SHA256

          b2061c9fd6ae0f50bd7dc619d70d5bbaeba3ed37560ced0dc51a8b012e8a139c

          SHA512

          a05dfb65a5da840c110f9aa2fa8986099bed4618dab84f4e45ec5205104dc8f0e9216b214ba13ea93ee4644f9fc829f1ff4296de11e14f115e688354c8cb78f5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          fb1b6fe0844e8952fd1b71e3e3e16517

          SHA1

          ed1ea0d4373c51eb730323b3da1343a369514a2a

          SHA256

          31e85bcb57a65bad34bf796071a578e4db2cf6136466061833861c2565ece103

          SHA512

          50cb9d2392ed7d532251f82a8915f7bd9f48ffc6ba7ef7b98f2da9838601f4acd564de19bf6a663a741a4d4587f412e3927aec163ee54983cdf7d1dd7e8525e2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          9359d7dc837d7cf4d65b72e367139c35

          SHA1

          2ff1bca7d0c9e8ec4d84981ba27b3600849fe2ec

          SHA256

          13f84e137683af849d00415b530e19661a8a844b736bc6fe44dd61094beb53db

          SHA512

          afebc3fd4d2addfdf6ebc9d27551f93f731a8ba9767ecc06e7d0eaaefd7ad4fad47f00148fd45a51ee025b4df6a7bdcb4f453021c028d32127bfb2d41a11f961

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          880bf8819544026450dde4d3d2e60ec3

          SHA1

          482af0497405fe37d0850f0325f3aadc973a8673

          SHA256

          ad59757261f9b2ac608020a2fed786387807c2fd606292cbad0bee7e30f9a724

          SHA512

          5b155d268fa60152fbee53d818a3143d25301b69b5a01840be899a18f0df33fd7c585a9a8586697816c4a61d9b26a3acaada5298e25efc627f02e6bb93c43aef

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          f608ef87b801fcd638ab4514f224f12a

          SHA1

          2523bcf1e415ea40946c5dcfa9b5cfcfa49e37fe

          SHA256

          2dc3ec429231a289c5ee388895f71f742f277a1990518c01d6184959b2f5a4f9

          SHA512

          b6a8d4718ac5afb5a85999fdbaa50c69c53c5f7bdf8430931f56adb950899aba82d6b4de02266db5617db278f6890ffe606f2695121066be7b31cc711ef507aa

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          d855e4a1438abe6c6befc6dbb4989305

          SHA1

          53bafee820869c3d146ab1bb0d6d06144ea43576

          SHA256

          f691cd5f0c21ed958c9f24f98d2e825bc221fab60fca4f56992993711a111bfc

          SHA512

          bda427b47cd0d225ea68fce39c03e2b5132b01d625475c3c7607666b6f193280f1ea7c54c9793650da16572e6c31322688ab9ea189a70d21e0531d89de7c1f16

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          4cc57acae561fcfb0b60bade045ec60f

          SHA1

          ffc342e4578932c6c743aa1bd1d87c3e04ff0598

          SHA256

          44b46c9503b79e56a46cf5f879d34bbfa2aa2319fdabf45b3338d67d33f56cce

          SHA512

          e75967cda3745907e254e8ad355498aaf422d92e5268b6c6e91f0fb0c032864d8e0beca902080014497a3d8e0bb3cc3d875bee8e1412ec2c4d204824b35745e8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          714cbecacb2226a780c18595bb9feb27

          SHA1

          95c86ce0321071e9228681d37c8688834c992c22

          SHA256

          994fb7f2a67f224910e18801a61ba65be3e4dd735a31fe71b6cbf3b3873b0a00

          SHA512

          d1b0e7b7f39069922972f5f49b7615754f9001df4054ab8d56823550d05e875c876eb03afd03bd3d1a052b0604aa1462f6c7399e6e8cbc25d0eac946995f0816

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          595e71003fe130cff98818379e2981f8

          SHA1

          0e25dfd62c8137c9603e2e4beb7041ba8b7e98df

          SHA256

          882dd87350d9b6360faf6b4cd04e2b9e2e5b99977536f9366ce9b306ea6b0882

          SHA512

          66b2ee3b8af8aa9f6916331ced179073af30bcbf08d959f84ebc13b6e209d9e9ef356e06e968d91dabe08932337c894a0aa545477c05597715b1ed8f8792827e

        • C:\Users\Admin\AppData\Local\Temp\Cab8BAE.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Cab8C5D.tmp

          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\Local\Temp\Tar8C81.tmp

          Filesize

          177KB

          MD5

          435a9ac180383f9fa094131b173a2f7b

          SHA1

          76944ea657a9db94f9a4bef38f88c46ed4166983

          SHA256

          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

          SHA512

          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

        • C:\Users\Admin\AppData\Local\Temp\pabmn.bat

          Filesize

          135B

          MD5

          8ad14300e7a8d854442467ca1856f935

          SHA1

          213aebf572fe8a27e42e728f1433c516894d5300

          SHA256

          61b91e17c20a1556aed5dcf17ea19ea961dd71e0b99265e43efab4251e080b46

          SHA512

          995affa8378980182b3a378ba689ace6ea820e36490b8ae8d2a172787bfdb06babaebfd5e8e759f69bf00cced4899ce49217b6885b7f20ace4fa51ca07c82f0f

        • \Users\Admin\Documents\jjiufo.exe

          Filesize

          395KB

          MD5

          1f577c6f861c87a6998b30e75de33246

          SHA1

          109846d60ef48057cef383ceb2ab0ef56a5b7e53

          SHA256

          4d6c7f67cf774e66779f8f31440ec1d86fb4d7a93b473b9e1d4ea6af0f77a5c7

          SHA512

          204dd1a5fcd5ec50ae61be3310a50c139e459adb9855b7ce51c53caec3d0628e228a18cc5450fba31eb8a7dde288b07d7a447b9b09edda7965779b49e951a787

        • memory/2036-0-0x0000000000220000-0x0000000000226000-memory.dmp

          Filesize

          24KB

        • memory/2036-17-0x0000000000220000-0x0000000000226000-memory.dmp

          Filesize

          24KB

        • memory/2036-1-0x0000000000220000-0x0000000000226000-memory.dmp

          Filesize

          24KB

        • memory/2480-6046-0x0000000000100000-0x0000000000102000-memory.dmp

          Filesize

          8KB

        • memory/2484-53-0x0000000000400000-0x000000000047C000-memory.dmp

          Filesize

          496KB

        • memory/2484-2437-0x0000000000400000-0x000000000047C000-memory.dmp

          Filesize

          496KB

        • memory/2484-5202-0x0000000000400000-0x000000000047C000-memory.dmp

          Filesize

          496KB

        • memory/2484-6043-0x0000000000400000-0x000000000047C000-memory.dmp

          Filesize

          496KB

        • memory/2484-6045-0x0000000003F60000-0x0000000003F62000-memory.dmp

          Filesize

          8KB

        • memory/2484-52-0x0000000000400000-0x000000000047C000-memory.dmp

          Filesize

          496KB

        • memory/2484-54-0x0000000000400000-0x000000000047C000-memory.dmp

          Filesize

          496KB

        • memory/2484-66-0x0000000000400000-0x000000000047C000-memory.dmp

          Filesize

          496KB

        • memory/2592-8-0x0000000000400000-0x000000000047C000-memory.dmp

          Filesize

          496KB

        • memory/2592-2-0x0000000000400000-0x000000000047C000-memory.dmp

          Filesize

          496KB

        • memory/2592-4-0x0000000000400000-0x000000000047C000-memory.dmp

          Filesize

          496KB

        • memory/2592-12-0x0000000000400000-0x000000000047C000-memory.dmp

          Filesize

          496KB

        • memory/2592-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2592-16-0x0000000000400000-0x000000000047C000-memory.dmp

          Filesize

          496KB

        • memory/2592-20-0x0000000000400000-0x000000000047C000-memory.dmp

          Filesize

          496KB

        • memory/2592-19-0x0000000000400000-0x000000000047C000-memory.dmp

          Filesize

          496KB

        • memory/2592-10-0x0000000000400000-0x000000000047C000-memory.dmp

          Filesize

          496KB

        • memory/2592-6-0x0000000000400000-0x000000000047C000-memory.dmp

          Filesize

          496KB

        • memory/2592-33-0x0000000000400000-0x000000000047C000-memory.dmp

          Filesize

          496KB

        • memory/2660-30-0x0000000000400000-0x00000000004D1000-memory.dmp

          Filesize

          836KB