Analysis

  • max time kernel
    120s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    10-06-2024 11:48

General

  • Target

    VirusShare_97020660b63757de9c0e8ad51eed9acf.exe

  • Size

    376KB

  • MD5

    97020660b63757de9c0e8ad51eed9acf

  • SHA1

    bc75b2b04ec8591829a69a7634698c2d7ff406b5

  • SHA256

    9c5feadf74c3a5ce0b40d5402f0f1ded6aea80b517c016a179b02f38a22aa489

  • SHA512

    a6cc6b7c7c8d16419b826affc813ea5cff9501133c5bc386217fa686c35906404a937630bdbcdee193273e5c22872f891e1a40d332393480c8d684ea8bec0f67

  • SSDEEP

    6144:ie3rNhMeYq4CGRTs4kadSoKVStcmTVn57CpSCwsUbg62oXd:iY5hMfqwTsTKcmTV5kINEx+d

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+nlkxs.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/397FDA7DA7EFEA97 2. http://kkd47eh4hdjshb5t.angortra.at/397FDA7DA7EFEA97 3. http://ytrest84y5i456hghadefdsd.pontogrot.com/397FDA7DA7EFEA97 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/397FDA7DA7EFEA97 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://tt54rfdjhb34rfbnknaerg.milerteddy.com/397FDA7DA7EFEA97 http://kkd47eh4hdjshb5t.angortra.at/397FDA7DA7EFEA97 http://ytrest84y5i456hghadefdsd.pontogrot.com/397FDA7DA7EFEA97 *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/397FDA7DA7EFEA97
URLs

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/397FDA7DA7EFEA97

http://kkd47eh4hdjshb5t.angortra.at/397FDA7DA7EFEA97

http://ytrest84y5i456hghadefdsd.pontogrot.com/397FDA7DA7EFEA97

http://xlowfznrg4wf7dli.ONION/397FDA7DA7EFEA97

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (418) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Drops startup file 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirusShare_97020660b63757de9c0e8ad51eed9acf.exe
    "C:\Users\Admin\AppData\Local\Temp\VirusShare_97020660b63757de9c0e8ad51eed9acf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Users\Admin\AppData\Local\Temp\VirusShare_97020660b63757de9c0e8ad51eed9acf.exe
      "C:\Users\Admin\AppData\Local\Temp\VirusShare_97020660b63757de9c0e8ad51eed9acf.exe"
      2⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2688
      • C:\Windows\wmoviexxcubq.exe
        C:\Windows\wmoviexxcubq.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2668
        • C:\Windows\wmoviexxcubq.exe
          C:\Windows\wmoviexxcubq.exe
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:708
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2816
          • C:\Windows\SysWOW64\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
            5⤵
            • Opens file in notepad (likely ransom note)
            PID:3036
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1640
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:2
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:1324
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1780
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\WMOVIE~1.EXE
            5⤵
              PID:860
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\VIRUSS~1.EXE
          3⤵
          • Deletes itself
          PID:2636
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:956

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+nlkxs.html

      Filesize

      7KB

      MD5

      de9346bb50a387425f0d1b03786e22b9

      SHA1

      fc503b5296aa0509a4e83d73a3164ac16a5a7f72

      SHA256

      a2c2f107896b76dd8081c64054cff95755b3de2fcce7a078bf9cb5a5c8f3897d

      SHA512

      1f86ca6c794da715035df75e27e7e54e11bbc125c8d0d50331a11ae213690c4ae97c9a5ce4e7ed1beb84b387ca0186af81e88e2130b5220233e066960ab7d2b8

    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+nlkxs.png

      Filesize

      62KB

      MD5

      d2ef4a99e39abf91574056e006feaba1

      SHA1

      5096f1a679904741669460fdd96f9020a1ce71e5

      SHA256

      b118af92b73797c5dae52533e67b53693752b3dd5ca967955799225ed27cd1ce

      SHA512

      c78951af8a0676747195db735236c6e9223176b91989b3af0cc6cdb1c556b2afb947a1b8b66ee6870ed7ffc7c3b9e2ba3881d3369baedcda78958ae83af337dd

    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+nlkxs.txt

      Filesize

      1KB

      MD5

      509498c81e202efc796ff0a73b185402

      SHA1

      bb29958aa97b6dd2d31bb1f77843a27d9006f9f2

      SHA256

      553cb8c37ae0f1330ac5c986b02d4883d1ce0d20177ab4aeff0ad7b9661c3299

      SHA512

      cfc9c0419b59ea170c4e2b79c54981c50e78738a4a34e2e93c458808c6614af124897078d74700f37edb8c416fa8b314cece3fe06003b68bcebd8a2f174a69d5

    • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

      Filesize

      11KB

      MD5

      9eef7a1dda0316544caf4ab18a9aa210

      SHA1

      b9ea4f5c2411a43977e339790b0f616323ea1470

      SHA256

      74348277853f1d16ced7c9e77460fc3fa8c72fa940bd5106493adfc0ba554509

      SHA512

      0dbc88a399ed7dba64cd3579810c63dde1786f6525f325b234f1fc377405a9d2b09c52d5e32428f0c9c8f32181d2aac758503decd5ea6f8d1224c05fafe69434

    • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

      Filesize

      109KB

      MD5

      c5311da517b9af0331b8b933b7ccc54a

      SHA1

      b6cadbe63da86f1fa64518d839b9eab8d4482b00

      SHA256

      667239e40feb7db92f11a59713d50a8f19cd646b097521952f2843e093abafda

      SHA512

      02a09ace950fb303773ef3dab7e27d611ec64d92c0e2a1abf4b13dee6908591aa89c187571b376a965695e460926b4aad1fe570e8b22957f08da88f80284c2a9

    • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

      Filesize

      173KB

      MD5

      d8c85131dd50fa422404a2466367f913

      SHA1

      73a7f0f686a42c3c796724f3f63a313c84c73653

      SHA256

      d10cc0bca7859ddfa40f0fe575153a1cdd31afbf7aaf463f137a1b5f5cd66c00

      SHA512

      0e41981cdd18a762748fd0da3016dfe4d0f36929569ab124030d7bbb778c2e7b3890aec0873e8fabf242c6d94b8830a993220fb8cf301c9c7844212730626025

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      914B

      MD5

      e4a68ac854ac5242460afd72481b2a44

      SHA1

      df3c24f9bfd666761b268073fe06d1cc8d4f82a4

      SHA256

      cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

      SHA512

      5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      252B

      MD5

      edb46377dfd4d5d41cb001789e31e5c5

      SHA1

      52499b5e6ae72c46762b58f61cbe7fe17c8228be

      SHA256

      e16d521b5ce60d675086d1ea3bfc98c754c17c400c667036e6c8a084e7a38a4b

      SHA512

      5975678fe5d4b4201ef4b43cbb607d719287fc1cc0fbc31410d9a340ef8230aa997af6002904072c3f839356a9f41b2edbd8b2b33f7b7f2e46e13bb988790bc2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3e9b0da38e76bdc223bb182bcfc1ff7b

      SHA1

      41c319ba204a3e58b7328ba21335c3e75fbc8388

      SHA256

      115d122f95c280d9505a7392cb280976894f21e08a9a6abc2e66e681b6082efb

      SHA512

      7003b724b4760a1765e9b3cd65ea95ef0c4982d634b86e3fe25bacb547a82a9bf637b7a4479500b3236b87f6ccdde66cf113dda8f73e2fc351752de22a357937

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      654c6fa0ffad705153641e5fa5ee15cf

      SHA1

      bb1575204901bec95395c9b0a6da072b208dee08

      SHA256

      72294c04adc8820212cb9ccaef149d4ef16716f2201a0e9b67835c180a681654

      SHA512

      772aeee342176cb27d46b8c1e340e33ddccbc52ca352c7bf051ddc44f89a41564408397787077dbcc67d5d888b9c3c7883cf9ee10518b12154f4283a148f534e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      eae2b29d4c4818e4f83c1c65bd1f4830

      SHA1

      baca9729a6a2868ba373471f0c592b80913de3db

      SHA256

      8754e23f3570eb0c4f4a194c3c5c2da68d7396f7009a3ee40f6ac77fcd2e24dc

      SHA512

      d7c25343b4f3f47714cea7c1350c30695aadf15e3ad91cad727b2ce209bf582cbda89edb4945b702008698119f5a596028378563acd46054971f1995749ca511

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e0ae6df89b7458b21544c7c91256e205

      SHA1

      3bb8a00c973e1e5588d0fa1f9b0c43f5a291e54b

      SHA256

      da3fa20903fa82e83b33e5cd7d3b83c3a81e5bdf6a62075b0e024dcf4949a3c7

      SHA512

      3e8b10d0417f4ec34ba44f656cde38092010e7ce49ccdd13c2580fc3d366b1af1d168154c9ffa92a811d7c44c747134d835faa90231be7ce9fc85388f396f1ad

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9efe21b6fdd0c541b600e0f1988c17ee

      SHA1

      75246afb32233b72ae53cfbefe7dafbb29a42855

      SHA256

      32be168e3d9e1874d9b2a4a12a7f10d0eae5f7d2c36ca155771d618d13cac3af

      SHA512

      508c2e187df19faf612d4fd8a4fd618ee13761ea9287f19b2de7516c81f6cb7b92543e4fbe5fb4f4a1544fc9809ac417c3b3ce9c3a24073dcd47c8abddd3c3ba

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      03f22c94aa4270851f71611bb129af77

      SHA1

      5a44e4efc22fa7580cecf63e6472212faede07ee

      SHA256

      ba197bcee2ae53cc682fc279dfe6d45b6aca4111d9ad7a1530cf4c4dd9b14ca8

      SHA512

      2d3c12f33e673ed28a6f0014dfeb33d122f15e2373c25b9a2756ded9525fb1f94e6ca77dedf58f20d81e5a0661ce07cb5dee7e45fa7545b0fa7c8df2d06838d3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5d9c688353f0618042a41f4ddbef3fc1

      SHA1

      473234bf19a3fb4e7ad0b9e266438d2d092826e7

      SHA256

      21ee0f00f06c55b24db80a1cd2d05d9e22a7c8f999907318f617fb7e84bfd233

      SHA512

      756ce57123176efbf525a018543e06e28a51bddc671606a48b3fa4a1e307376c03ebdf204c00fe0f330dbb2a9b449fe13b7770cbf1cd06f511eae6898f944463

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      cfc528d923ddcccbd998334663c1d2f7

      SHA1

      64ed07be326abdc8b35c66fef0d1d47e73265061

      SHA256

      d0796d1e28f96f5f625d32d6f1a068e65581d6e2f6a8899bbfc0e43fa95fe13c

      SHA512

      d8ffc3eb6b53caf7f50a6a8c243415644c26688c05b9e0987a12edaf226b92022c315b0fd73adc22f0cfbf2514142abdaf42025937a1d96ea9c4fcc90df88dff

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      02d93654c07b26130d1b1b7b7ef2e80e

      SHA1

      72d215c8a92e90141511e1dd89db6a6848e0b79b

      SHA256

      0ab39ec02b02c4035e5d978dd422c53eca9eb12cdac7702db5062fc2efa1aae6

      SHA512

      15bbea3f3b1f3ae1f0c06b18756abf586fa78a13bae65512f74d9cf921d5d318c20c0802a585ed9777ffb87374cb5fb64d59186372c66f1d3030879cf9050cb0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      c1dab38b94e646ce8197e60262472790

      SHA1

      e31a451a7acf7a8b0b546d3e88611dca7e16c3c4

      SHA256

      14e98014be6f5f33c2896e5d75b1e75a134d222d148622fd96cee54ccb4e0836

      SHA512

      1f7376b2cd37ad24a7fca595927906046448b2fd0f698f1e98f4f9a078f960a25c37609b49e4bfc299a4a216817aab419d710f80e2cb24944add05c3cd57dd2c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

      Filesize

      4KB

      MD5

      da597791be3b6e732f0bc8b20e38ee62

      SHA1

      1125c45d285c360542027d7554a5c442288974de

      SHA256

      5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

      SHA512

      d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

    • C:\Users\Admin\AppData\Local\Temp\Cab8077.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar81F2.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Windows\wmoviexxcubq.exe

      Filesize

      376KB

      MD5

      97020660b63757de9c0e8ad51eed9acf

      SHA1

      bc75b2b04ec8591829a69a7634698c2d7ff406b5

      SHA256

      9c5feadf74c3a5ce0b40d5402f0f1ded6aea80b517c016a179b02f38a22aa489

      SHA512

      a6cc6b7c7c8d16419b826affc813ea5cff9501133c5bc386217fa686c35906404a937630bdbcdee193273e5c22872f891e1a40d332393480c8d684ea8bec0f67

    • memory/708-56-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/708-6577-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/708-6574-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/708-6572-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/708-2269-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/708-5200-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/708-5972-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/708-5978-0x00000000043F0000-0x00000000043F2000-memory.dmp

      Filesize

      8KB

    • memory/708-6571-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/708-6570-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/708-50-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/708-51-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/708-52-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/708-55-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/956-5979-0x00000000001A0000-0x00000000001A2000-memory.dmp

      Filesize

      8KB

    • memory/2044-1-0x0000000000270000-0x0000000000273000-memory.dmp

      Filesize

      12KB

    • memory/2044-0-0x0000000000270000-0x0000000000273000-memory.dmp

      Filesize

      12KB

    • memory/2044-18-0x0000000000270000-0x0000000000273000-memory.dmp

      Filesize

      12KB

    • memory/2668-29-0x0000000000400000-0x00000000005EB000-memory.dmp

      Filesize

      1.9MB

    • memory/2688-4-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/2688-20-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/2688-19-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/2688-10-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/2688-7-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/2688-31-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/2688-2-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/2688-8-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/2688-12-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/2688-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2688-16-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB