Analysis

  • max time kernel
    130s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    16-06-2024 06:20

General

  • Target

    b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe

  • Size

    350KB

  • MD5

    b21a8247fed6d7f3fb9fa89016a5f41d

  • SHA1

    9227062dc0a62e4fa0284ad521a56c373c34ffde

  • SHA256

    2d63a0d8ece25bdb093098fe7569c973ada10927387ee288b87030e5765f514b

  • SHA512

    68c0342db819d8df9bddce9c23a2552cfa6d72e24ff54c3ed922a4388e698c0c6e3cee8688c905564540141ea32d3e26e8acc49b5412aadd526aea93fe5f7fa7

  • SSDEEP

    6144:oucrZMDMXbJ2kAUWaNCZAaCudurslKREBKT0PLNMbQ4AWbO/Fh:P8ZM2RiKCZ9urGETYNMbQ4zbm

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\# DECRYPT MY FILES #.txt

Family

cerber

Ransom Note
C E R B E R R A N S O M W A R E ######################################################################### Cannot you find the files you need? Is the content of the files that you looked for not readable? It is normal because the files' names, as well as the data in your files have been encrypted. Great!!! You have turned to be a part of a big community #Cerber_Ransomware. ######################################################################### !!! If you are reading this message it means the software !!! "Cerber Ransomware" has been removed from your computer. ######################################################################### What is encryption? ------------------- Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users. To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key. But not only it. It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data. ######################################################################### Everything is clear for me but what should I do? ------------------------------------------------ The first step is reading these instructions to the end. Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you. After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions. It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them. !!! Any attempts to get back your files with the third-party tools can !!! be fatal for your encrypted files. The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files. Finally it will be impossible to decrypt your files. When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly. You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files. ######################################################################### !!! There are several plain steps to restore your files but if you do !!! not follow them we will not be able to help you, and we will not try !!! since you have read this warning already. ######################################################################### For your information the software to decrypt your files (as well as the private key provided together) are paid products. After purchase of the software package you will be able to: 1. decrypt all your files; 2. work with your documents; 3. view your photos and other media; 4. continue your usual and comfortable work at the computer. If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files. ######################################################################### There is a list of temporary addresses to go on your personal page below: _______________________________________________________________________ | | 1. http://cerberhhyed5frqa.xlfp45.win/23BC-9D7C-A97F-006D-A0FC | | 2. http://cerberhhyed5frqa.slr849.win/23BC-9D7C-A97F-006D-A0FC | | 3. http://cerberhhyed5frqa.ret5kr.win/23BC-9D7C-A97F-006D-A0FC | | 4. http://cerberhhyed5frqa.zgf48j.win/23BC-9D7C-A97F-006D-A0FC | | 5. http://cerberhhyed5frqa.xltnet.win/23BC-9D7C-A97F-006D-A0FC |_______________________________________________________________________ ######################################################################### What should you do with these addresses? ---------------------------------------- If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it): 1. take a look at the first address (in this case it is http://cerberhhyed5frqa.xlfp45.win/23BC-9D7C-A97F-006D-A0FC); 2. select it with the mouse cursor holding the left mouse button and moving the cursor to the right; 3. release the left mouse button and press the right one; 4. select "Copy" in the appeared menu; 5. run your Internet browser (if you do not know what it is run the Internet Explorer); 6. move the mouse cursor to the address bar of the browser (this is the place where the site address is written); 7. click the right mouse button in the field where the site address is written; 8. select the button "Insert" in the appeared menu; 9. then you will see the address http://cerberhhyed5frqa.xlfp45.win/23BC-9D7C-A97F-006D-A0FC appeared there; 10. press ENTER; 11. the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling. If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions. If you browse the instructions in HTML format: 1. click the left mouse button on the first address (in this case it is http://cerberhhyed5frqa.xlfp45.win/23BC-9D7C-A97F-006D-A0FC); 2. in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address. If for some reason the site cannot be opened check the connection to the Internet. ######################################################################### Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products. Unlike them we are ready to help you always. If you need our help but the temporary sites are not available: 1. run your Internet browser (if you do not know what it is run the Internet Explorer); 2. enter or copy the address https://www.torproject.org/download/download-easy.html.en into the address bar of your browser and press ENTER; 3. wait for the site loading; 4. on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed; 5. run Tor Browser; 6. connect with the button "Connect" (if you use the English version); 7. a normal Internet browser window will be opened after the initialization; 8. type or copy the address ________________________________________________________ | | | http://cerberhhyed5frqa.onion/23BC-9D7C-A97F-006D-A0FC | |________________________________________________________| in this browser address bar; 9. press ENTER; 10. the site should be loaded; if for some reason the site is not loading wait for a moment and try again. If you have any problems during installation or operation of Tor Browser, please, visit https://www.youtube.com/ and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation. If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files. ######################################################################### Additional information: You will find the instructions for restoring your files in those folders where you have your encrypted files only. The instructions are made in two file formats - HTML and TXT for your convenience. Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files. The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company. ######################################################################### Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data. The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection. Together we make the Internet a better and safer place. ######################################################################### If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support. ######################################################################### Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.
URLs

http://cerberhhyed5frqa.xlfp45.win/23BC-9D7C-A97F-006D-A0FC

http://cerberhhyed5frqa.slr849.win/23BC-9D7C-A97F-006D-A0FC

http://cerberhhyed5frqa.ret5kr.win/23BC-9D7C-A97F-006D-A0FC

http://cerberhhyed5frqa.zgf48j.win/23BC-9D7C-A97F-006D-A0FC

http://cerberhhyed5frqa.xltnet.win/23BC-9D7C-A97F-006D-A0FC

http://cerberhhyed5frqa.onion/23BC-9D7C-A97F-006D-A0FC

Extracted

Path

C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\# DECRYPT MY FILES #.html

Ransom Note
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <title>&#067;erber Ransomware</title> <style> a { color: #47c; text-decoration: none; } a:hover { text-decoration: underline; } body { background-color: #e7e7e7; color: #333; font-family: "Helvetica Neue", Helvetica, "Segoe UI", Arial, freesans, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 16px; line-height: 1.6; margin: 0; padding: 0; } hr { background-color: #e7e7e7; border: 0 none; border-bottom: 1px solid #c7c7c7; height: 5px; margin: 30px 0; } li { padding: 0 0 7px 7px; } ol { padding-left: 3em; } .container { background-color: #fff; border: 1px solid #c7c7c7; margin: 40px; padding: 40px 40px 20px 40px; } .info, .tor { background-color: #efe; border: 1px solid #bda; display: block; padding: 0px 20px; } .logo { font-size: 12px; font-weight: bold; line-height: 1; margin: 0; } .tor { padding: 10px 0; text-align: center; } .warning { background-color: #f5e7e7; border: 1px solid #ebccd1; color: #a44; display: block; padding: 15px 10px; text-align: center; } </style> </head> <body> <div class="container"> <h3>C E R B E R&nbsp;&nbsp;&nbsp;R A N S O M W A R E</h3> <hr> <p>Cannot you find the files you need?<br>Is the content of the files that you looked for not readable?</p> <p>It is normal because the files' names, as well as the data in your files have been encrypted.</p> <p>Great!!!<br>You have turned to be a part of a big community #Cerber_Ransomware.</p> <hr> <p><span class="warning">If you are reading this message it means the software "Cerber Ransomware" has been removed from your computer.</span></p> <hr> <h3>What is encryption?</h3> <p>Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users.</p> <p>To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key.</p> <p>But not only it.</p> <p>It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data.</p> <hr> <h3>Everything is clear for me but what should I do?</h3> <p>The first step is reading these instructions to the end.</p> <p>Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you.</p> <p>After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions.</p> <p>It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them.</p> <p><span class="warning">Any attempts to get back your files with the third-party tools can be fatal for your encrypted files.</span></p> <p>The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files.</p> <p>Finally it will be impossible to decrypt your files.</p> <p>When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly.</p> <p>You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files.</p> <hr> <p><span class="warning">There are several plain steps to restore your files but if you do not follow them we will not be able to help you, and we will not try since you have read this warning already.</span></p> <hr> <p>For your information the software to decrypt your files (as well as the private key provided together) are paid products.</p> <p>After purchase of the software package you will be able to:</p> <ol> <li>decrypt all your files;</li> <li>work with your documents;</li> <li>view your photos and other media;</li> <li>continue your usual and comfortable work at the computer.</li> </ol> <p>If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files.</p> <hr> <div class="info"> <p>There is a list of temporary addresses to go on your personal page below:</p> <ol> <li><a href="http://cerberhhyed5frqa.xlfp45.win/23BC-9D7C-A97F-006D-A0FC" target="_blank">http://cerberhhyed5frqa.xlfp45.win/23BC-9D7C-A97F-006D-A0FC</a></li> <li><a href="http://cerberhhyed5frqa.slr849.win/23BC-9D7C-A97F-006D-A0FC" target="_blank">http://cerberhhyed5frqa.slr849.win/23BC-9D7C-A97F-006D-A0FC</a></li> <li><a href="http://cerberhhyed5frqa.ret5kr.win/23BC-9D7C-A97F-006D-A0FC" target="_blank">http://cerberhhyed5frqa.ret5kr.win/23BC-9D7C-A97F-006D-A0FC</a></li> <li><a href="http://cerberhhyed5frqa.zgf48j.win/23BC-9D7C-A97F-006D-A0FC" target="_blank">http://cerberhhyed5frqa.zgf48j.win/23BC-9D7C-A97F-006D-A0FC</a></li> <li><a href="http://cerberhhyed5frqa.xltnet.win/23BC-9D7C-A97F-006D-A0FC" target="_blank">http://cerberhhyed5frqa.xltnet.win/23BC-9D7C-A97F-006D-A0FC</a></li> </ol> </div> <hr> <h3>What should you do with these addresses?</h3> <p>If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it):</p> <ol> <li>take a look at the first address (in this case it is <a href="http://cerberhhyed5frqa.xlfp45.win/23BC-9D7C-A97F-006D-A0FC" target="_blank">http://cerberhhyed5frqa.xlfp45.win/23BC-9D7C-A97F-006D-A0FC</a>);</li> <li>select it with the mouse cursor holding the left mouse button and moving the cursor to the right;</li> <li>release the left mouse button and press the right one;</li> <li>select "Copy" in the appeared menu;</li> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>move the mouse cursor to the address bar of the browser (this is the place where the site address is written);</li> <li>click the right mouse button in the field where the site address is written;</li> <li>select the button "Insert" in the appeared menu;</li> <li>then you will see the address <a href="http://cerberhhyed5frqa.xlfp45.win/23BC-9D7C-A97F-006D-A0FC" target="_blank">http://cerberhhyed5frqa.xlfp45.win/23BC-9D7C-A97F-006D-A0FC</a> appeared there;</li> <li>press ENTER;</li> <li>the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions.</p> <p>If you browse the instructions in HTML format:</p> <ol> <li>click the left mouse button on the first address (in this case it is <a href="http://cerberhhyed5frqa.xlfp45.win/23BC-9D7C-A97F-006D-A0FC" target="_blank">http://cerberhhyed5frqa.xlfp45.win/23BC-9D7C-A97F-006D-A0FC</a>);</li> <li>in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet.</p> <hr> <p>Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products.</p> <p>Unlike them we are ready to help you always.</p> <p>If you need our help but the temporary sites are not available:</p> <ol> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>enter or copy the address <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> into the address bar of your browser and press ENTER;</li> <li>wait for the site loading;</li> <li>on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed;</li> <li>run Tor Browser;</li> <li>connect with the button "Connect" (if you use the English version);</li> <li>a normal Internet browser window will be opened after the initialization;</li> <li>type or copy the address <span class="tor">http://cerberhhyed5frqa.onion/23BC-9D7C-A97F-006D-A0FC</span> in this browser address bar;</li> <li>press ENTER;</li> <li>the site should be loaded; if for some reason the site is not loading wait for a moment and try again.</li> </ol> <p>If you have any problems during installation or operation of Tor Browser, please, visit <a href="https://www.youtube.com/results?search_query=install+tor+browser+windows" target="_blank">https://www.youtube.com/</a> and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation.</p> <p>If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files.</p> <hr> <h3>Additional information:</h3> <p>You will find the instructions for restoring your files in those folders where you have your encrypted files only.</p> <p>The instructions are made in two file formats - HTML and TXT for your convenience.</p> <p>Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files.</p> <p>The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company.</p> <hr> <p>Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data.</p> <p>The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection.</p> <p>Together we make the Internet a better and safer place.</p> <hr> <p>If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support.</p> <hr> <p>Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.</p> </div> </body> </html>

Signatures

  • Cerber

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Contacts a large (16392) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 47 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • Modifies Control Panel
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1540
    • C:\Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\pcaui.exe
      "C:\Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\pcaui.exe"
      2⤵
      • Adds policy Run key to start application
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Sets desktop wallpaper using registry
      • Modifies Control Panel
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2180
      • C:\Windows\system32\vssadmin.exe
        "C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:2472
      • C:\Windows\system32\wbem\wmic.exe
        "C:\Windows\system32\wbem\wmic.exe" shadowcopy delete
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1940
      • C:\Windows\System32\bcdedit.exe
        "C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:1180
      • C:\Windows\System32\bcdedit.exe
        "C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:1916
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1820
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1820 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:876
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1820 CREDAT:472065 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:904
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt
        3⤵
          PID:1080
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"
          3⤵
            PID:2568
          • C:\Windows\system32\cmd.exe
            /d /c taskkill /t /f /im "pcaui.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\pcaui.exe" > NUL
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1992
            • C:\Windows\system32\taskkill.exe
              taskkill /t /f /im "pcaui.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:772
            • C:\Windows\system32\PING.EXE
              ping -n 1 127.0.0.1
              4⤵
              • Runs ping.exe
              PID:964
        • C:\Windows\SysWOW64\cmd.exe
          /d /c taskkill /t /f /im "b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe" > NUL
          2⤵
          • Deletes itself
          • Suspicious use of WriteProcessMemory
          PID:3028
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /t /f /im "b21a8247fed6d7f3fb9fa89016a5f41d_JaffaCakes118.exe"
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1736
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 1 127.0.0.1
            3⤵
            • Runs ping.exe
            PID:2832
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2492
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2840
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2840 CREDAT:275457 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2540
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
        1⤵
          PID:2456

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\# DECRYPT MY FILES #.html

          Filesize

          12KB

          MD5

          a630a77378a469c12bdc3797f2dfaf5b

          SHA1

          72f5d3647f0d800b2078370d1af9e9d821ab9992

          SHA256

          97288e8f60bc54dce32a0b47d2ece22370cf4fa9854f09e8fedd6a623109c9d2

          SHA512

          05ecd865a8f1b9b64283a3f5a7161d0a1ba7d8d4a05de59199d89c6c7ede22e3498e338da0f94a281279e9321f79a6dc5ea6f72daf450027384a21b6ac17449a

        • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\# DECRYPT MY FILES #.txt

          Filesize

          10KB

          MD5

          ed480010e758a6b20f97c0fe790d8658

          SHA1

          232799fd7951cbcce925a0d3693032384fb469b8

          SHA256

          a1d0ea718d515450fcfe9d427e0354317c2bec293e4a5434c61d30a2a2d0fe1a

          SHA512

          ab1795373ec3a41c8d408b75f65dabf775b4ffff2160dd29ec982a2c9251f2bdb58db9e0fc2f746e3249c5ddeda6a8d0f69239bed537f3edf6fa665f52064fe1

        • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\# DECRYPT MY FILES #.url

          Filesize

          85B

          MD5

          4b8bf2097b5d31328a1dbbe4fc737655

          SHA1

          a909c6bbaa0a16a0d0d8797011ab3a045c2e0008

          SHA256

          a19ce3d0fab9e70c511335b7ed898d08b6e20b9ab13a221c379c1759eb532b6e

          SHA512

          4872ed7311e61ac9ee9ae3eb08e2b9729c81470d34483dce82e1fb24c20c7a40e43831295ce49a35dbaf172a158004780f4d43218ab4fe1cb4f77aac7561af85

        • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\# DECRYPT MY FILES #.vbs

          Filesize

          219B

          MD5

          35a3e3b45dcfc1e6c4fd4a160873a0d1

          SHA1

          a0bcc855f2b75d82cbaae3a8710f816956e94b37

          SHA256

          8ad5e0f423ce1ff13f45a79746813f0f1d56993d7f125ab96f3d93fb54bdc934

          SHA512

          6d8e68b969ef67903aff526e983b0fb496678e4c819139e560a11f754a36c4b5770ac2ecf3fc1d9cb5aaa84f80363b4f55553255569503893192911b80d9d853

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

          Filesize

          914B

          MD5

          e4a68ac854ac5242460afd72481b2a44

          SHA1

          df3c24f9bfd666761b268073fe06d1cc8d4f82a4

          SHA256

          cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

          SHA512

          5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          1KB

          MD5

          a266bb7dcc38a562631361bbf61dd11b

          SHA1

          3b1efd3a66ea28b16697394703a72ca340a05bd5

          SHA256

          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

          SHA512

          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

          Filesize

          252B

          MD5

          e5554a7c6111d5bf9b6e43fa1296f714

          SHA1

          5e1858b43cdf0b2385a08cfb99ab6f0285a72f2c

          SHA256

          f3d36159b8e5bf9b2d8551d2c545576c0c13797ba07e7c1b8aac898eeb290796

          SHA512

          b2aab1135eb6c6972c96029e25dd31527ef6cb4e3453425456371cffc8921afbaca375f6a425deeeb87709c3a7b2819ca9eca897308639e524e996cb494dbb28

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a23fbd51d9d3950b1059ac860924d16d

          SHA1

          0ebdbc27b28011973ef6a36a6d1484b32bf05962

          SHA256

          10229c4303ab1e61903cfb5a1e3ae150fe811a513254f556c0d2479972478c4c

          SHA512

          ffe72acc658f1401ff06706031cda83d381287df45ce16afcb9084aad96bc2d4990b2d7898c4f0e6fc18c7daf03f05755999d755b82826f7cb27674fd171c3a4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          5f5187258153f07ad30106ff29b54010

          SHA1

          a5ae3b1dd20b24b2b2277b18f2f4b612710ae275

          SHA256

          45b9a34c812a4c378b923578a1f47fb5c7ddb274af5b17983cd9f7ebab8c9f9a

          SHA512

          85094b14730638950e2c44124dd432c3e83dd12c04d7610d1e2f036d3b0a3a0a8035e4d45956a545eb061ec83d714d786a9157e2219e130a69661524f652943e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          f3b21b2c9e1fd5bd367b215da95224d0

          SHA1

          3a2420a9ad78118a2fce5dadab597db3228fb2ff

          SHA256

          6dd8bd5c46133626cc99d2607f59d68ef54f36bccd4cec2491ca9965d694fc5e

          SHA512

          5708ffb66c40bdd0b8acf7c6a2cacfa5d8bb78087b1b2cbd40b7fac4df7a1be0df444f73116d762ec2bf46785c573b6c3dec6e9f96d60cac8f731470b15c893f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          e4ecb7c47e9febc96ae9fb9a48b38094

          SHA1

          a5538229fafb5fc8629b0365ed44ecebfe4857be

          SHA256

          39a42a882cfa4adb1cdb16b9dac3a3112109beb91172b4b82d0480854e9c9597

          SHA512

          239f3b3405494cc0d462859700775da6443d2e0fce74274b5b1f6b0a279fe29790134b7f01fe78a334fcc00772026562bb7a1ca693dba46857752d6407da0776

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          92cbbcf02bafa93daf77501f66c28dd0

          SHA1

          452c96376e4f78c5ed4555bf5341d5181b96d494

          SHA256

          8778b7fcdb7b5ed6ad40882d0e21f2ddd5b09c27683fbdcb07d0ce46a37ff5d7

          SHA512

          050916392e7bfd0a4399b6127417c0864eab67b2b4b2e5415f4df061febb38f0acf57ad5ad3df17c9affbb20634d10dbaf8a0fbb8abaaf9e67bea3988eb4f5a7

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          04c82ac9109fac28aefa3b2322996caf

          SHA1

          99111c6f4f0db38be96d02079c28bd1f5b0fd5f2

          SHA256

          f133b249a12e2ff59661367d2a69a3218c7e15e3e2837c52e9658c888c70920c

          SHA512

          81a9e20937a710d2a377516c81f139ac5f37213b0bd634dd82192f16236203f58882dc3c63361f2cf2a9ffb526f52ea7f42539e020a645196d7fa55707a3d74f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          5d889db61b9c3ccee0753d46700921f4

          SHA1

          43cd5f09fe1d4c131f1c99dcc385a45449db4acd

          SHA256

          971306fc823c52a2577f1e40986c2b8ea2eb9010bef976758d94a30321fc456f

          SHA512

          20e9f346f59682dc0dc450f25a91d83b1c94b70e580ef3ff7dd639c2cc10e3c23edce3ea7c1f13175a31b7f9a4980f8b75dd0048a6bf1dfdd632b6eaf7d84d12

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ddaebee63dd01b107a478741fbaf29fe

          SHA1

          82ab1db9b128343512f51d5bb52bdf685eb236e2

          SHA256

          d9938f05b33394207e5893a75744c286ca7458bba3a9e8664fdfbe5ce46dfc42

          SHA512

          822a378440763bdac1a6e0f49c70894193e6e5d91ba7b32ddc6a2d7e212ecdeafdeeba1d0e5c7a5cb11b9e0bd688446828cbb9f9a938d1c908a71a35b7878fc2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          fbc12402c92802e4602b19e349bb3b0d

          SHA1

          95a1a592528e77853f010f62405cd09c90467035

          SHA256

          8e1421dcd46e4ac3007fb324fac4952d879006cff5b3bf4fb92a755c519dfc7d

          SHA512

          d906a785c16d948435ffbe51546ef87e471bed1542b78529ea5377c2ae7d2f2a68ccd94f35c3b57e559cd0df545e21bb88c0d6efdf94182ff5e441614d302c54

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b9555320232fe62d52e0944a78891b12

          SHA1

          56fd6f6d1a9eff773076bd49a568f6d9b8d04ba8

          SHA256

          ed287e7b99092f00e90b68aca29e097e3523213627f1264a7d58ffbada73d365

          SHA512

          90e45d49f5da82060a293473023b9ec698e9ec912e01df4ec89d843d4985f98a7e2ad1ebe1229fb521de4ae7b80e888bab4e0ff73254d2e00ba73f032ea47353

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          753f1a30f2b937ca8cc91ff38c831774

          SHA1

          53011407549f82565303ccaf716b059726de0fd0

          SHA256

          3583fc68d2ae931c3e54cecd463012877ab449cb25b7c4dfffab0e90abd5cf98

          SHA512

          480c24e866f12b1537d93f13016bc8c501f1f70aabfc2dcadc5514169ba3c059e5baeaf76888f9de278e92e49acc4e8ee8fc76187dc4da22c2ee765aac36b97f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2e8ac5a84eeb056ad1bd50f8d1d34b1c

          SHA1

          c04684bcdf59da8036369617688a020c26814137

          SHA256

          082fbd34ec71738cb4ea166d91b57c5a32b82649e28d1d6bafb7502b50f3bc92

          SHA512

          585c5105d1f8898dd9fe5f68994a2e9e2efbc6644d88579d0ced88c51e086223fe6e800bd9760aab94aef6f506073023884565e789cfcbd6a9dab9297945b7a3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          f43320414d501f59dfe6a3ad03ae43e4

          SHA1

          445b8ba5f5caf61a22ff30a4a542d99ccde21e14

          SHA256

          fe9f689aea00930283c0fd0826b2875fe98d35129b43ecb21aa2b963c871cdaf

          SHA512

          f7c6b63e97ca1e79becfffd9fe855f8341f89424b27be7df998dbc85a96c5a8ad1af79509c73705de9dedbcf2b6116a654a9d58b83572b58d3bcf1b8c8dee9d7

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d65b6a208bb7d7e743e70668da881533

          SHA1

          46687e070fd90f24604e0ba7a699209a9fc3789e

          SHA256

          82cb4858ad6a7e8d293dfaf65bf959d486648c6aad6924ca767c67b5631e2b05

          SHA512

          3f3449e9f3bad52642114e0614b101ea388035f5be72f3926f8d28a294913242bfe3820bbdf782bce4725d390ea0e621455c0fdece01bb4f939e352d077c2ccb

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          1c859f126355bc24808a0ba92c13d35e

          SHA1

          bc92a1434f379674d93a6015786ade379eca13c2

          SHA256

          fc3202abb5dab62c920f1315ef35fcfbf2bc93e1c0cf2a37a8295dc3277c96f4

          SHA512

          30e73bb14f0f2399d188861da738276ab45f31fa24c47761ec07a05fa1cc98d9ac4efada68adbbfb681d129589d0bec280d73b2671bbda15881fe3f4ce1ac163

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ec09d91d570ef65f320a0558b96646d3

          SHA1

          1db60979a3159b085540fd26e719ef0dceb7b685

          SHA256

          75722da47dfd03f12ad490580c56ea2018ecb697b1f1a773432c914d114a7dd3

          SHA512

          827742f1600aae7591ec864b3cdbd4fc94110204f9804fe22e506f016d944230d8fd0d89423410d05525bd69716d37070b09814ed378679445cdc013ba97d5bf

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          cdb2fca5d3da789d2cdeb0e4f40d67e6

          SHA1

          e944e63d51e773332d7b2ccbe91bde29fd6b1427

          SHA256

          f022890cba24b02dc8b7c4aeff3a1c00bbdeec60f85cf15e3b29bf324a896714

          SHA512

          a2a5efc71a74c18ea0ab6b144ea0f725530a5908497a1a8a33607f67eaddbaf693a4bf5b0c3372b35b01dd0b4461ca8f67435cb68014cd7b069ac0194a264fcf

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a0d4fece508454fefd1689f84a425850

          SHA1

          c35d1511d21de11a03a59f38f1b9c0bcc6590cfd

          SHA256

          a61f518f8c01d55cabe28cf4b01f89244936178d4787de330f7eaa666dc1bbb6

          SHA512

          79a2a8d90a73c14bb2ca20fc76a69cb664b541ceded279f73217fb9aa826e27bc00b3022a693beccaaacda0bbb2c8be783c37c97bafdebf6a0eb5bf69524de99

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ca4b2db101dab2f64a9a053fddeeba00

          SHA1

          442ce6939cc69f70577498a2c092b568f382f7fe

          SHA256

          3e33608719b0701f63573da7a4dbc559126ddae19e74fb4327eebe6f93b77a57

          SHA512

          6f9b8899be594aa728ab5b4fd468dc05de6450cdc98935dc98d4ae16ae02b1c433d994b1607f3b70afc469856baffa9ddc6e0e03acb9451b09692c610b0098ef

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          242B

          MD5

          6e5cd04da207d4d135c1ffa82ce4d3e1

          SHA1

          df9ac2811e20edb228c756b6ade79f4cf7cc9382

          SHA256

          9d4f57a636ed4bc82bf78010f8024675da8ea777b9932097a6a2661e80d8a620

          SHA512

          516ce3fb457e142f116cece9ff419e7f14d44bdef788083f94524f12c36e16c7dfa0877d9edb29c65d4799cc574d570a1b6693c7a88b003a86ebe59b922635a8

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{A1134731-2BA8-11EF-BEA9-FE29290FA5F9}.dat

          Filesize

          5KB

          MD5

          2c4c7cf05e63ce53fceac6c36856e4ef

          SHA1

          537ef0d5e69ac92fd8fc4b54dd38d307d12af858

          SHA256

          d821753d79cd3dafe5dc4f347441e465414e05bcbcb732716d7c3076f5de52d1

          SHA512

          89366fe8f4b3ccce1d49d2e5a77b91d1d067cb1874f5e1b66d2cd3d5d2fd77add094e92de38ec2ec774c9c4890aad1998285dd8e50f2a7c4aaaccc103194674e

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8FO28TZ9\favicon[1].ico

          Filesize

          4KB

          MD5

          da597791be3b6e732f0bc8b20e38ee62

          SHA1

          1125c45d285c360542027d7554a5c442288974de

          SHA256

          5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

          SHA512

          d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

        • C:\Users\Admin\AppData\Local\Temp\Cab1AD2.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar1C1E.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\pcaui.lnk

          Filesize

          1KB

          MD5

          6e4ac0e730a84d98a9f5977561af5847

          SHA1

          abc74807b9461e2cbf9da1c576853a987710722b

          SHA256

          b8950c08b48f91431e479fec94b784ba761142d7a99c2dec9516214b05526416

          SHA512

          23a5deda28cf3f268387163da275af2f4fdbcf1b0d9710e12cc40c0a34c8d3f7cf6b7a6e4d26b45c7917c33d03afbfba5b3e5916e052b4fdf8de71d3e8f2da54

        • \Users\Admin\AppData\Roaming\{B1742F51-9A6E-9153-98B4-65A8CA63BBDA}\pcaui.exe

          Filesize

          350KB

          MD5

          b21a8247fed6d7f3fb9fa89016a5f41d

          SHA1

          9227062dc0a62e4fa0284ad521a56c373c34ffde

          SHA256

          2d63a0d8ece25bdb093098fe7569c973ada10927387ee288b87030e5765f514b

          SHA512

          68c0342db819d8df9bddce9c23a2552cfa6d72e24ff54c3ed922a4388e698c0c6e3cee8688c905564540141ea32d3e26e8acc49b5412aadd526aea93fe5f7fa7

        • memory/1540-0-0x0000000001C20000-0x0000000001C36000-memory.dmp

          Filesize

          88KB

        • memory/1540-14-0x0000000000400000-0x000000000045A000-memory.dmp

          Filesize

          360KB

        • memory/1540-1-0x0000000000400000-0x000000000045A000-memory.dmp

          Filesize

          360KB

        • memory/2180-1026-0x0000000000400000-0x000000000045A000-memory.dmp

          Filesize

          360KB

        • memory/2180-1027-0x0000000000400000-0x000000000045A000-memory.dmp

          Filesize

          360KB

        • memory/2180-421-0x0000000003960000-0x0000000003962000-memory.dmp

          Filesize

          8KB

        • memory/2180-26-0x0000000000400000-0x000000000045A000-memory.dmp

          Filesize

          360KB

        • memory/2180-23-0x0000000000400000-0x000000000045A000-memory.dmp

          Filesize

          360KB

        • memory/2180-22-0x0000000000400000-0x000000000045A000-memory.dmp

          Filesize

          360KB

        • memory/2180-16-0x0000000000400000-0x000000000045A000-memory.dmp

          Filesize

          360KB

        • memory/2180-15-0x0000000000400000-0x000000000045A000-memory.dmp

          Filesize

          360KB