Analysis

  • max time kernel
    1562s
  • max time network
    1564s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    18-05-2024 15:47

General

  • Target

    2cbb3497bfa28d9966c1feeae96d452d.dll

  • Size

    1.6MB

  • MD5

    2cbb3497bfa28d9966c1feeae96d452d

  • SHA1

    9ef94c7d3fedc71bb3ed1abf542dfc7ec692883d

  • SHA256

    85c3b718090144dadeb8035ac287d46b9d3458f9de409229217d42a475f42868

  • SHA512

    eed7b210655030b3855f7a20f3bc7aecf8b927a33dfdaefe1d769fa42cbf7c88b1e8ab625f7258a79d2625e06005d25b03691fe911330876ae9e7f916ab2fe4c

  • SSDEEP

    24576:KlQyNmMnq70NDxLOd0+UU1Thef1HrmP1D2:KlQyNmMq70NDROd0+UU1ThoHrA

Score
10/10

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\README_TO_DECRYPT.html

Family

quantum

Ransom Note
<html> <head> <title>Quantum</title> </head> <body> <h1>Your ID:</h1> <b> <pre> f5de48b476c53833c47bc3b7c594420236ceb225ca847c34bdf3164bbef62959 </pre> </b> <hr/> This message contains an information how to fix the troubles you've got with your network.<br><br> Files on the workstations in your network were encrypted and any your attempt to change, decrypt or rename them could destroy the content.<br> The only way to get files back is a decryption with Key, provided by the Quantum Locker.<br><br> During the period your network was under our control, we downloaded a huge volume of information.<br> Now it is stored on our servers with high-secure access. This information contains a lot of sensitive, private and personal data.<br> Publishing of such data will cause serious consequences and even business disruption.<br><br> It's not a threat, on the contrary - it's a manual how to get a way out.<br> Quantum team doesn't aim to damage your company, our goals are only financial.<br><br> After a payment you'll get network decryption, full destruction of downloaded data, information about your network vulnerabilities and penetration points.<br> If you decide not to negotiate, in 48 hours the fact of the attack and all your information will be posted on our site and will be promoted among dozens of cyber forums, news agencies, websites etc.<br><br> To contact our support and start the negotiations, please visit our support chat.<br> It is simple, secure and you can set a password to avoid intervention of unauthorised persons.<br> <a href="http://lsxkornhwiuchwvtrm2ru2hr25rovmyvrurgej7kwv3vd6rvbznpdwid.onion/?cid=f5de48b476c53833c47bc3b7c594420236ceb225ca847c34bdf3164bbef62959">http://lsxkornhwiuchwvtrm2ru2hr25rovmyvrurgej7kwv3vd6rvbznpdwid.onion/?cid=f5de48b476c53833c47bc3b7c594420236ceb225ca847c34bdf3164bbef62959</a> <ul> <li>Password field should be blank for the first login. <li>Note that this server is available via Tor browser only. </ul> P.S. How to get TOR browser - see at https://www.torproject.org </body> </html>

Signatures

  • Quantum Ransomware

    A rebrand of the MountLocker ransomware first seen in August 2021.

  • Deletes itself 1 IoCs
  • Drops desktop.ini file(s) 32 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\2cbb3497bfa28d9966c1feeae96d452d.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\2cbb3497bfa28d9966c1feeae96d452d.dll,#1
      2⤵
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2228
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\\0F76422E.bat" "C:\Users\Admin\AppData\Local\Temp\2cbb3497bfa28d9966c1feeae96d452d.dll""
        3⤵
        • Deletes itself
        • Suspicious use of WriteProcessMemory
        PID:308
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -r -h "C:\Users\Admin\AppData\Local\Temp\2cbb3497bfa28d9966c1feeae96d452d.dll"
          4⤵
          • Views/modifies file attributes
          PID:316
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\README_TO_DECRYPT.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:924
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:924 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\README_TO_DECRYPT.html

    Filesize

    2KB

    MD5

    620625e0cb79821d9b7cc0a85158040c

    SHA1

    6452e37091706336207405ac05ff20fe7eaa9b56

    SHA256

    0ea9471ede3b6796552b902b778279ba63feec0ca3fa4252041cc9e848bbac7e

    SHA512

    49f03f8cd52e841528732b5e1f98d96482f7e7cceb334f269e9d2d362dc67d676532d4eb15e0394ba4ab0245a764c5d447b158fb648b0d48a033a0121897b71e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    0d88c7593e7ee1ed4cb8855a382f0b97

    SHA1

    e4c008aaf4c7f75aa876974ff88111d8281ab7ef

    SHA256

    20b196f667986edcbff20296d8adbd25853dd509a9a26343afce3a6b187aeff8

    SHA512

    78de5bc0708e6cfe56e4f5be0f2fcbdadcea304b5d5c47ee877fe85b671965eb95becca119b78516df220019200b4d7e566a4eb9111e7cb3a55f9b27ee9fce65

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    17f252a616b0d201ce08e1336b0d8e25

    SHA1

    17a09bf31d1373b8f4e30e4e5e18bbd5240c5c27

    SHA256

    1c223986eebfb0c67192450dbd1be4fbe98244cc0720b14449f617f4e1c3e6e3

    SHA512

    1c4f94c9b86dcd033c7e714a35f09584c3a803fff2972a4bee393adb05a3e2e42aadeb824ccd278d0e64e237c288c1da92e65802014e643a71241836e82f84ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8d9993b0c583ee7b8312ed233ccfe92e

    SHA1

    4b227d221aabc85094574fb0fa43b1ecc7ce6118

    SHA256

    7fd7475b87ad0413b31fcce8de511f98a6689ecee111cf78332efe68bccfaab5

    SHA512

    f36173f8c4f60681420fabc4a2215780c198b1cc7264bebc7c5e620baef9c9bb3f7fc83d819ca8d22633fb77eee4a2b54b7357299d17d4c1d35d8868ccc62ecb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    651860e32ef191458015a39961d94a0c

    SHA1

    84b33e6e3e727bc1afd0946a2bca5acfb504b6e6

    SHA256

    089d82866093bf4a1bbde6be0747be695ba3f0fa752c964782ec0e7a3b1dfbc6

    SHA512

    fd48e6935731ac159438532cec8013fe8fc7296fa8fd42a56926f4c5e677eabb8c2ebc3badcc114144fbfb6ff324147b0a62c17f1a0ade72477347d7ca47efb3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    97258f954caab577cb14baa4f87f345b

    SHA1

    cfd661766548d03d988697c8322e110b3cebf39d

    SHA256

    0986a8d27b1063095158286e58a755969b532c87dc78bac7df408bbf0cead1c0

    SHA512

    d58b7bb5365060e09755f1331aeeac5c22c8a53c9c78aa734f1c26062a4903315bbe78da70e8a7d723abc9be3bf83a5a9b26a51c2b7e43478a22dc3a0dd2f5a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4be62decc98ef21fcd02a00c5577861e

    SHA1

    c70d0f03f75209f65df2b21e6985814b94eb6b65

    SHA256

    c58432b9011599a4fc42d0b5028b7e08ec45e162f1dc7289d22bd286306347ca

    SHA512

    076efda733e3a33e4c67f53dd33e5434a79ee438b3d0b3e830c3ed9a84bd96379242e728d510e0dcd97e161cba23ab82737a0ea50a81ab70d74a1cdc1054e425

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1648ff5d81885abce59ced464242f4bd

    SHA1

    9d0824ae1d17d15deed08c2cdc36e3da319e89c2

    SHA256

    afd857a0f46568dbb62b4f4b8c0a426a8a916f5443212c2b2639ae2933cd3019

    SHA512

    2c50eab1f2d86aa90b241da921eafe59cb8da8f5fbc49f815141973a1bea341846b9dfa570fda2658fce1a1bf9ab8afd4d3ba71821eeda4a213b376b1bf14081

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1d6045780d68bd75ea76793305728c3d

    SHA1

    5dfb4a0fa3e237843f4b6a45fb5efda89dd28c12

    SHA256

    d457151cb61981ef8df48c9bb155ca9f392dd201c0add2e0141d36450a5e1529

    SHA512

    c2f091020b538c905d8906772acdd1d618f1ecdd814174a29f899f14a2a05f629655ca734b22f808a62d3ec8c56483c6115e594e6360c5874f7cbeac76c4bf98

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d6b3b3ab7bdd84d2ba0b9c5b37c262d8

    SHA1

    c8af200d7de8284d6f26dd21512fa72a4f983488

    SHA256

    d0df687a511caa2f23013bef0703b8cc4255e0dab7b9a1efc3719b281372c792

    SHA512

    e5f81d327b2465426ff0ee229b652e589724c682c882d292eb623c5e36fcd4e65d2c95470e245dd0d92dcd1afbb70769b3157a1762a88802a16b1fa0f1193763

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    674cafa224996fc20daa721c21f7c398

    SHA1

    7d8c7e8a65c5c1231b3512378549277951b98219

    SHA256

    3017aa950a1171f5994985195d83f90918defc7db439d0ea612918e6bf6d7990

    SHA512

    18a19e2d96f79fd7f30c10d1621855d5835c535553f9f6d0f9eb89901515244c814b4824971a73debe294dff89a1538a90e88d95eca06745e24c95afda5b6e87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    94a15fb70fb4f23f769ea54a5e14d646

    SHA1

    4220a4523a2a2e6542cfaa0da1be55a0e31b4cfa

    SHA256

    f98c4d28d2f0743067191724b5ba77a8c325ab80d93bb215426caec47313f977

    SHA512

    cd9dfe889b92466dd20ea8492c1fd86b927e81d206415e86e7a9902762d40e4a99d780d9586867167874df998dc20dbdbb5c933fdbc25b0e3129568bdf61499d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dc8ca58811f9aea3014c0067c1eb81b8

    SHA1

    1398aaeb33c24319f023eacc90ef43940bc107ac

    SHA256

    d9228edd5a6ab186260ce400d03d2057f73e0d45d37d5318776b36bc7487b689

    SHA512

    bcaa74cbe8c930553da62d8cb7129a736801bd505fa69abb5794a388c93a774c6320316d32a6cfa57901f5032cc895d7a4d4cbc80bc8b01e8fbfd5e6b61d2746

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d04af38667371a0826cfbb502ce6ffd7

    SHA1

    8520c41b0b771b678bd7ddfd813b3ff29cb9adf5

    SHA256

    5a6db173197b6317a68d84f65612428ed22bcded2937d5b001bfb0c31e116730

    SHA512

    2188cbb4448dba90a0ad72182f9fd0df75dd162dae451db5695fd522ea35b91749d405c922635472926d9ae891fc71192ac6cd4442caf56e0b21d04dbc3f4a58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2d18a5c4373b6323798ca11242cbefcc

    SHA1

    4720bbf654358dd2abb321182719d4b06335ff82

    SHA256

    2d3b459883a948ca05144073aaf8d9330c2cbd9f1d2b35dcc9d5a2eaea0f6955

    SHA512

    dc416aa7ec72bfab51b7718c59e88f45462d1cf596de7ad2fbdf45572784d8df562acbbe685b0f2db9abb0cbc7f522ad983f41fe92371b06de59937a2bc1c421

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9354fc1c5f8aeefb0484e3e0e73621f0

    SHA1

    b0d019dc61d8debd64727a2137f341f58eb25f12

    SHA256

    8818bef03de45c8c7b480c63a796e9385cf1c53c4ca736e8a3b535ccbbb47ee6

    SHA512

    380ef47c9ea9f1492acb6a799c712b19cfc5a543374db9da46c6fa72cd4f69dd25fad0b856cbede47860238487dca9f6b19624064e906fdc08728b0949ba606e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cbb296ddb5b4d856c165ed95a762028c

    SHA1

    b7d6511920ff508ba5c0ba004aae06d0d36fa05f

    SHA256

    0d8c3899eac70c33824b8e99cacfcd287dc09ae45807dd3faa7c6677d143cbdf

    SHA512

    1e54cfd8981e5564ea75f5599ff11cad66e53004b0e0a4ce85994d631212804718b82d0b35857767ea7e7647dcb60f7be6cba28467b23656e02acef6077dd067

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f5f60c4e6c02bb4848f0886a04119afd

    SHA1

    22cf312be77a35fe3a0f36e48f86c3f17a18b150

    SHA256

    7bdc020c874ac5b20da1c485a67a4119efc6ce1ae6a00aeb695f7f95621195c9

    SHA512

    0f8f578041059b5a8dfef83f11dd9e9eec7fbe138606a6c8fcca2b15f06e24d7cd2d368da22cc65809be7df9bf7ac64d511c20c1eaa7ce3ee1e0ccfe24a40e45

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d56cfacc8d5ab1861f2e59c61b1e86c0

    SHA1

    dda403a75b8d4a696fcafb775ab52f11084064e3

    SHA256

    f89cec43dc1e80e95fcc548154986e187272a86e89e256d66c23de16f29201cc

    SHA512

    7b6319558768d2a2cebc8f24958e1447a9a21bc55082f6db192d0dc0605e0dc24c0b01f34a77700a16fb744c583524a97f71fd7b6bf317d4d84fa43040527c94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    19fe22d2277e69a1d2348191377b3413

    SHA1

    5039e17b220bf1367deab09a139d03e6b076931c

    SHA256

    3385b429632dd3e6fa89340b8f3b61ca47552fdbeed8e36e34ffdf60926ae537

    SHA512

    67628d0bfefba11ce2b22951eb279685c0867ba1c9b8853d78cb776db8e0da2b5b76503e680d54dd0e4a2e3edcdf4c0b960c30b07c70b06b48f5632ed8477eed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6278266f8fb9d5966c161971d87156da

    SHA1

    7d555a7dca05cc7e8716eb87a1f4f833e605abd3

    SHA256

    14a97fb8fa7d107a1bd82fb1132a891ef60a927781465bba027b94c51ae21374

    SHA512

    e2a803ded318c1848681a69e6e2d8d7eca40f96e99592caec7d4fc59ae240f7410cfc047f84ea039d83e0ae9da81d4e99cf4bfba32fa7beefbabe34b184dfd2c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    eccab0cde231b66ce8d9ca2db3348dc9

    SHA1

    db6ffa5ad61f708e81169a6f14a3821faeec7158

    SHA256

    12eead3d6e6b5a3b82599d2dfe894db5d17ba727dc4fb727641de45c1d5034d3

    SHA512

    4d9dee172829ff03dbfd799a43c7c19ee7390a13ad43d556ad91674b8c7ead2bc8870aee2b0a897e228f124b61e0f8d4e6cffcbec65bb46b34b428f8464a2779

  • C:\Users\Admin\AppData\Local\Temp\0F76422E.bat

    Filesize

    65B

    MD5

    348cae913e496198548854f5ff2f6d1e

    SHA1

    a07655b9020205bd47084afd62a8bb22b48c0cdc

    SHA256

    c80128f51871eec3ae2057989a025ce244277c1c180498a5aaef45d5214b8506

    SHA512

    799796736d41d3fcb5a7c859571bb025ca2d062c4b86e078302be68c1a932ed4f78e003640df5405274364b5a9a9c0ba5e37177997683ee7ab54e5267590b611

  • C:\Users\Admin\AppData\Local\Temp\TarF712.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/2228-14-0x00000000002E0000-0x00000000003B1000-memory.dmp

    Filesize

    836KB

  • memory/2228-3-0x00000000002E0000-0x00000000003B1000-memory.dmp

    Filesize

    836KB

  • memory/2228-16-0x00000000002E0000-0x00000000003B1000-memory.dmp

    Filesize

    836KB

  • memory/2228-0-0x00000000002E0000-0x00000000003B1000-memory.dmp

    Filesize

    836KB

  • memory/2228-521-0x00000000002E0000-0x00000000003B1000-memory.dmp

    Filesize

    836KB

  • memory/2228-540-0x00000000002E0000-0x00000000003B1000-memory.dmp

    Filesize

    836KB

  • memory/2228-24-0x00000000002E0000-0x00000000003B1000-memory.dmp

    Filesize

    836KB

  • memory/2228-541-0x00000000002E0000-0x00000000003B1000-memory.dmp

    Filesize

    836KB

  • memory/2228-4-0x00000000002E0000-0x00000000003B1000-memory.dmp

    Filesize

    836KB

  • memory/2228-6-0x00000000002E0000-0x00000000003B1000-memory.dmp

    Filesize

    836KB

  • memory/2228-8-0x00000000002E0000-0x00000000003B1000-memory.dmp

    Filesize

    836KB

  • memory/2228-10-0x00000000002E0000-0x00000000003B1000-memory.dmp

    Filesize

    836KB

  • memory/2228-12-0x00000000002E0000-0x00000000003B1000-memory.dmp

    Filesize

    836KB

  • memory/2228-550-0x00000000002E0000-0x00000000003B1000-memory.dmp

    Filesize

    836KB

  • memory/2228-1-0x00000000002E0000-0x00000000003B1000-memory.dmp

    Filesize

    836KB