Analysis

  • max time kernel
    123s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10-06-2024 11:48

General

  • Target

    VirusShare_8c23e7c480280c24c6b34c9c9bafc05d.exe

  • Size

    396KB

  • MD5

    8c23e7c480280c24c6b34c9c9bafc05d

  • SHA1

    de75bf5f2115fb3399d2c94966218f91dd9c2362

  • SHA256

    d898a79292edb0059156844e559cf65ab68819786b1d344dec42993851751740

  • SHA512

    04a631fbd1a3aca23956e316716375a77328471025f8391971aa33315ad8245419231f3b9b95229b1999c24c240ae97436ba9fcc3216d1a5b63ff75de9e9edf5

  • SSDEEP

    6144:4T3WR0F1lDPR+bJnm/jtowhxZWVrfQwBcTMMG26uw6fyQ7Q:4T3MA+bJmy4ZKfQRMh6

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+kihme.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/B5D1AA8260558471 2. http://kkd47eh4hdjshb5t.angortra.at/B5D1AA8260558471 3. http://ytrest84y5i456hghadefdsd.pontogrot.com/B5D1AA8260558471 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/B5D1AA8260558471 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://tt54rfdjhb34rfbnknaerg.milerteddy.com/B5D1AA8260558471 http://kkd47eh4hdjshb5t.angortra.at/B5D1AA8260558471 http://ytrest84y5i456hghadefdsd.pontogrot.com/B5D1AA8260558471 *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/B5D1AA8260558471
URLs

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/B5D1AA8260558471

http://kkd47eh4hdjshb5t.angortra.at/B5D1AA8260558471

http://ytrest84y5i456hghadefdsd.pontogrot.com/B5D1AA8260558471

http://xlowfznrg4wf7dli.ONION/B5D1AA8260558471

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (429) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Drops startup file 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirusShare_8c23e7c480280c24c6b34c9c9bafc05d.exe
    "C:\Users\Admin\AppData\Local\Temp\VirusShare_8c23e7c480280c24c6b34c9c9bafc05d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1580
    • C:\Users\Admin\AppData\Local\Temp\VirusShare_8c23e7c480280c24c6b34c9c9bafc05d.exe
      "C:\Users\Admin\AppData\Local\Temp\VirusShare_8c23e7c480280c24c6b34c9c9bafc05d.exe"
      2⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2492
      • C:\Windows\hyuernnclsmh.exe
        C:\Windows\hyuernnclsmh.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2600
        • C:\Windows\hyuernnclsmh.exe
          C:\Windows\hyuernnclsmh.exe
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:1496
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1536
          • C:\Windows\SysWOW64\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
            5⤵
            • Opens file in notepad (likely ransom note)
            PID:1900
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1652
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1652 CREDAT:275457 /prefetch:2
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2220
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2840
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\HYUERN~1.EXE
            5⤵
              PID:2912
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\VIRUSS~1.EXE
          3⤵
          • Deletes itself
          PID:2352
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:380

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+kihme.html

      Filesize

      9KB

      MD5

      e6f808d818cc3927b5ff279afc7a640c

      SHA1

      fe62cea942c2846203ba4222e67e2b61a96e6f9a

      SHA256

      739aa2789b36a1edb0e19e1674e85e9e7a8937c2b0c0941ca37a0f9630cd5b2f

      SHA512

      c5299e38476aa75623110d1790688914ea1cc26b601e0dd8fe8ac5811177a3f0a9a0b3b6658109978ab2e57435f21a0e77e65660ddbfadf9227f1a8c09e60d98

    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+kihme.png

      Filesize

      63KB

      MD5

      e0d26677e7273696ab7df6171b8869c5

      SHA1

      7d577dfcc4b184db16d0876d37d838b079d82641

      SHA256

      ff83a227977e466c191150d9f499e11764bc308793d913fdab3b75ea7166a497

      SHA512

      d162ab5e20534597925e58a0602e6c02094e028fa0a360a5897c81da0cc8c9065f9b5cbfeac6a594ca941432b7cf3f225dbebcec6b4faf92deb00eb6878c9615

    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+kihme.txt

      Filesize

      1KB

      MD5

      5cf6c35a2c3a017f84c99bb5c0cc4b84

      SHA1

      067e8c269f2e9432ad720b102c624c22de3730ce

      SHA256

      4f710c1053e537885600cd50cf2a11343785ade289f25ea1589719c871b04fe6

      SHA512

      fc30bea06e1c5b8610d3727ef1d9c1deaa4a3330d7a40f48cea0d3fa8412fa2e434aec5f8953417153d59d8b740fd4e22b39593a71d4cc95889fbc7a25613aa8

    • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

      Filesize

      11KB

      MD5

      963bdb41646d4a29c162c1ce09325dcd

      SHA1

      224751bd89f41da476bfd8a2afcb9e38a7cb6789

      SHA256

      8f73bfc9216ccd2b41c4a3144ce117a65e95a25c463b6a065ae5c7127b1c2f39

      SHA512

      3ddc869a988c722ae24b994edea15d39050791968d4fff5b96f390bda2ea76eece40fd7f4da38206733e52fa75218dbc20042dff0d69ffa4b7bad2f696246280

    • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

      Filesize

      109KB

      MD5

      3643e6dad41663769f1c80a4ec4cd93d

      SHA1

      fb49e2eeb3e56b5c24f0f4057aad4db4a7a1fe23

      SHA256

      4ef0993f1abc6739012c5a9eb1e9f2b93fc09c7e430779c8e06c38e29aeb3fdf

      SHA512

      c1b252e999bb20686648c36e208da3f8d1ed79ca52dce6874c6472e1a4c2f718a2e811aa806c359512479a5db79dee2591a7bcc399da03f49514625c1fe64ff6

    • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

      Filesize

      173KB

      MD5

      ae9152eed841debdd30226aaff62b5d2

      SHA1

      52d0b4aeae548c5a5f607fdb0b1c80c0bd4d55a8

      SHA256

      a51f04208e643da8e346819070dcfc758f63d0541429cfb699aa1045098ccd9b

      SHA512

      9ef9a661add992ec2a931714ae9cab4ba2aac110a8eeed2ee964bcacf9b15c0c1d8c7a4634b53df9c51a637316e1694c6526495aefcab30a6344deb403ee21de

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      914B

      MD5

      e4a68ac854ac5242460afd72481b2a44

      SHA1

      df3c24f9bfd666761b268073fe06d1cc8d4f82a4

      SHA256

      cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

      SHA512

      5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      252B

      MD5

      027e7bc49f9f7bb57f77ccd7eeaf1004

      SHA1

      055b0c72ea17bc918863f8efbe2f2472663da758

      SHA256

      8b4dba42b20de0f49b6e7e51dfd596afd26066793d742e3d1d547a49a0acf387

      SHA512

      9b5619bda7c66c34e855c223e7fa3e307800c68420ac67d201a3f1b7d0bc832b6f6060d648731df2692af6c4d4388565807ae4ecfd9e3f927692bdf12c4e75d5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b357f4c3c89f9088c67d959858900c93

      SHA1

      d10e4142d9a6421aa9a0cb67326f1d2d25545c12

      SHA256

      d7c8152b723fcaeb84550c2732cf72f20bb9a2c27942fcdd55ae8129830bc821

      SHA512

      d97fb9f8451ae454f411027efbcbceb72497e672ee42d37973937b5324658c85161aac38faed11dfe013d049ff59bd8e843994691ed1c7fd9d8a2e41e07d1469

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      87e33c75521eee23222c854d4424c6ee

      SHA1

      cf59eb9136696ebf893a307c7be6d405968ec202

      SHA256

      78d1266f63f8ddc1a118e6c916f01a18afdabcfb72fe0f073f953e62909ab594

      SHA512

      296f0218080c8c21265f9a7c57c04724efb086bdcebcc1af527ae4226ad174432170349dea9f03d3deeff248df0c025543f55fad15de8f167f38205fbb03dc87

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e44df39630a9c06472a02a21349a9a18

      SHA1

      21dac6687d7f9c4930f68a89ab4d3f89a19b385b

      SHA256

      7f477e1226c6cea5e978548cf7d83cc39f9ffb7f29cda7bf5dbcde1ee9db4839

      SHA512

      b36206fdae94cca802f91aa384cc80bfb6ee1b8fa6f52edd5eb83bfbd173018053fd56c9b35141d13b2b6e3d3f456d4682a32218b6afcc5f7a1c26fc59a2a25c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      007a163f998cf6231f603cc41c0e098d

      SHA1

      7ea9c99217446d36a1a89d78e66943bfa7252e0f

      SHA256

      03685fe8c0cb8dc5ee96eed77c7aca66cfd3e2ef0e0ea0bfb0dcbed1aefece4d

      SHA512

      d7fc6906f9359fa421a6944486310e59291b9983654c84a993db7e288a01fb7db560fc9c49c0503aadafa725e8ff364ec3ce84a0be1f06df5ac6ba98bb922300

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ab8075135be5c2555c6c0ef77c293313

      SHA1

      6c3fcb3a07f22adf194794a2c4ce807cc23a3955

      SHA256

      28923d6c4ea8697da2202cc51325e787670c445bbb3a2b60bb4c9543075cdfdf

      SHA512

      7ece34c480d9ed8f476339e1331fb6264b39f780ce6fcffc231bb0b3d457fcc63eae71e2a95f7aa03dcc6ab991188071f951d8cbdd1e55230e5bed96344acaee

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0e9f5a662b545362babdb162826cc713

      SHA1

      58ccf8034e737e7bd27e34816cb8306e95d18385

      SHA256

      1b324a955dbb3f6fb294a4e8e3d0f483682901554740c2f9b90c5d509dbce027

      SHA512

      6463c4532ac7fdfc030c0d467b8f4c9edaa1e774f4cf5465724f307eccd5ca16fc3722e309149a49f55f6610333fe723ead8462135d80b471b1aa13add1cb78e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      17751167417fabf4b8cdf69d947ffe7c

      SHA1

      d87d6a4c8ca26c9538856aca137899ed98c5b211

      SHA256

      b27775a9e0180e323aee873c91c1e5eeb9da5a7841dc8867e0ccc13eac13f2be

      SHA512

      95282feb7845538e6b80dc127f6b0f7558b826dd0717e126578f92d2020ce42b9911e2d3389d38d38d0c92feb553e6e358eecc87dba0c7848ca67505270dcf94

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      92dfe39535ba80dc241ec057ded30e35

      SHA1

      3931a51445876c447e8c35d687379540e2a21a0b

      SHA256

      3926057d3917c6abe6b63918f858436768214ea961c0f4f439f1429f266e4182

      SHA512

      03540f91cdea439d52189ea38bfee0f62e3bf36e81af5baa627f86fb463e9de18e3efdf60bd6fd0bb3662488c798ddb675bd8babccea2447c7ebc6634e7ff1b5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ad00f8d78d9a9678a170441b0d9b8c5c

      SHA1

      003a7fe8f5e5bdb5193d0a214b8e4614d004830c

      SHA256

      768a4f0730484f2939381dcf47855c1bb55358e8016c0e0ab59b539393f1ff42

      SHA512

      44f47de65b141dc099f50c9cc0d628b43dd59b908175d79e5a59896607edffb903e51f1f8724f5e253c638f277a895d332bd899b2b4483147fbc2ea205f5afdb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5ee38354261b84f1efe1e1f636cb2448

      SHA1

      b076080d73e0f1ffc2f6aca85db178aba4e89efd

      SHA256

      309ed1e313baac6cd421a5fdaf4b74af49595f1c061a1c46cb27be4ef2c11df9

      SHA512

      10e48e376d7606fb23f11220defafdd24b3e8b0b63d0d3a3707f113dea537e183c89ebe7c413e74f6acc74453f8ac4cb8939f41005e78fe23d8e6dbf25709c9f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      4a32f0ff2845dfdd1f2ebb82083bd4e8

      SHA1

      bc1d6bcd014f02afea5f091d6d10a64f508dc1c4

      SHA256

      2cc4b1147f957ec607b75cacd4c8d5d8c0d539c5a5a9f6a2c736c95666cc9fb2

      SHA512

      357687332d1c51408507c7a391d380d18ec514fdefadcb02193f66837636c5df37102472ded16fb45a0d63f771288653c807fb455a49b9350f2b4d871700ab6f

    • C:\Users\Admin\AppData\Local\Temp\Tar3856.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Windows\hyuernnclsmh.exe

      Filesize

      396KB

      MD5

      8c23e7c480280c24c6b34c9c9bafc05d

      SHA1

      de75bf5f2115fb3399d2c94966218f91dd9c2362

      SHA256

      d898a79292edb0059156844e559cf65ab68819786b1d344dec42993851751740

      SHA512

      04a631fbd1a3aca23956e316716375a77328471025f8391971aa33315ad8245419231f3b9b95229b1999c24c240ae97436ba9fcc3216d1a5b63ff75de9e9edf5

    • memory/380-6095-0x0000000000130000-0x0000000000132000-memory.dmp

      Filesize

      8KB

    • memory/1496-2037-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/1496-4644-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/1496-1040-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/1496-50-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/1496-49-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/1496-55-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/1496-53-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/1496-6124-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/1496-6088-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/1496-51-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/1496-6094-0x0000000003060000-0x0000000003062000-memory.dmp

      Filesize

      8KB

    • memory/1496-6097-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/1496-6099-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/1580-0-0x00000000003E0000-0x00000000003E3000-memory.dmp

      Filesize

      12KB

    • memory/1580-1-0x00000000003E0000-0x00000000003E3000-memory.dmp

      Filesize

      12KB

    • memory/1580-18-0x00000000003E0000-0x00000000003E3000-memory.dmp

      Filesize

      12KB

    • memory/2492-29-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/2492-6-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/2492-8-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/2492-10-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/2492-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2492-16-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/2492-4-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/2492-20-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/2492-19-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/2492-12-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/2492-2-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/2600-28-0x0000000000400000-0x0000000000620000-memory.dmp

      Filesize

      2.1MB