Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    138s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 04:04

General

  • Target

    VirusShare_8ec363843a850f67ebad036bb4d18efd.exe

  • Size

    186KB

  • MD5

    8ec363843a850f67ebad036bb4d18efd

  • SHA1

    ac856eb04ca1665b10bed5a1757f193ff56aca02

  • SHA256

    27233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8

  • SHA512

    800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684

  • SSDEEP

    3072:TFFzdn1bwoWwW8BplOd4G5ts0RTy/L1yib5icNisjx3jUiXy:TFFzvwoWw3BXOdl5Ts1yw0s13jU5

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt

Family

cerber

Ransom Note
C E R B E R R A N S O M W A R E ######################################################################### Cannot you find the files you need? Is the content of the files that you looked for not readable? It is normal because the files' names, as well as the data in your files have been encrypted. Great!!! You have turned to be a part of a big community #Cerber_Ransomware. ######################################################################### !!! If you are reading this message it means the software !!! "Cerber Rans0mware" has been removed from your computer. ######################################################################### What is encryption? ------------------- Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users. To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key. But not only it. It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data. ######################################################################### Everything is clear for me but what should I do? ------------------------------------------------ The first step is reading these instructions to the end. Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you. After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions. It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them. !!! Any attempts to get back your files with the third-party tools can !!! be fatal for your encrypted files. The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files. Finally it will be impossible to decrypt your files. When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly. You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files. ######################################################################### !!! There are several plain steps to restore your files but if you do !!! not follow them we will not be able to help you, and we will not try !!! since you have read this warning already. ######################################################################### For your information the software to decrypt your files (as well as the private key provided together) are paid products. After purchase of the software package you will be able to: 1. decrypt all your files; 2. work with your documents; 3. view your photos and other media; 4. continue your usual and comfortable work at the computer. If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files. ######################################################################### There is a list of temporary addresses to go on your personal page below: _______________________________________________________________________ | | 1. http://cerberhhyed5frqa.zmvirj.top/31B0-2A5C-05DB-029E-DAA5 | | 2. http://cerberhhyed5frqa.qor499.top/31B0-2A5C-05DB-029E-DAA5 | | 3. http://cerberhhyed5frqa.gkfit9.win/31B0-2A5C-05DB-029E-DAA5 | | 4. http://cerberhhyed5frqa.305iot.win/31B0-2A5C-05DB-029E-DAA5 | | 5. http://cerberhhyed5frqa.dkrti5.win/31B0-2A5C-05DB-029E-DAA5 |_______________________________________________________________________ ######################################################################### What should you do with these addresses? ---------------------------------------- If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it): 1. take a look at the first address (in this case it is http://cerberhhyed5frqa.zmvirj.top/31B0-2A5C-05DB-029E-DAA5); 2. select it with the mouse cursor holding the left mouse button and moving the cursor to the right; 3. release the left mouse button and press the right one; 4. select "Copy" in the appeared menu; 5. run your Internet browser (if you do not know what it is run the Internet Explorer); 6. move the mouse cursor to the address bar of the browser (this is the place where the site address is written); 7. click the right mouse button in the field where the site address is written; 8. select the button "Insert" in the appeared menu; 9. then you will see the address http://cerberhhyed5frqa.zmvirj.top/31B0-2A5C-05DB-029E-DAA5 appeared there; 10. press ENTER; 11. the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling. If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions. If you browse the instructions in HTML format: 1. click the left mouse button on the first address (in this case it is http://cerberhhyed5frqa.zmvirj.top/31B0-2A5C-05DB-029E-DAA5); 2. in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address. If for some reason the site cannot be opened check the connection to the Internet. ######################################################################### Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products. Unlike them we are ready to help you always. If you need our help but the temporary sites are not available: 1. run your Internet browser (if you do not know what it is run the Internet Explorer); 2. enter or copy the address https://www.torproject.org/download/download-easy.html.en into the address bar of your browser and press ENTER; 3. wait for the site loading; 4. on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed; 5. run Tor Browser; 6. connect with the button "Connect" (if you use the English version); 7. a normal Internet browser window will be opened after the initialization; 8. type or copy the address ________________________________________________________ | | | http://cerberhhyed5frqa.onion/31B0-2A5C-05DB-029E-DAA5 | |________________________________________________________| in this browser address bar; 9. press ENTER; 10. the site should be loaded; if for some reason the site is not loading wait for a moment and try again. If you have any problems during installation or operation of Tor Browser, please, visit https://www.youtube.com/ and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation. If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files. ######################################################################### Additional information: You will find the instructions for restoring your files in those folders where you have your encrypted files only. The instructions are made in two file formats - HTML and TXT for your convenience. Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files. The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company. ######################################################################### Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data. The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection. Together we make the Internet a better and safer place. ######################################################################### If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support. ######################################################################### Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.
URLs

http://cerberhhyed5frqa.zmvirj.top/31B0-2A5C-05DB-029E-DAA5

http://cerberhhyed5frqa.qor499.top/31B0-2A5C-05DB-029E-DAA5

http://cerberhhyed5frqa.gkfit9.win/31B0-2A5C-05DB-029E-DAA5

http://cerberhhyed5frqa.305iot.win/31B0-2A5C-05DB-029E-DAA5

http://cerberhhyed5frqa.dkrti5.win/31B0-2A5C-05DB-029E-DAA5

http://cerberhhyed5frqa.onion/31B0-2A5C-05DB-029E-DAA5

Extracted

Path

C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html

Ransom Note
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <title>&#067;erber Ransomware</title> <style> a { color: #47c; text-decoration: none; } a:hover { text-decoration: underline; } body { background-color: #e7e7e7; color: #333; font-family: "Helvetica Neue", Helvetica, "Segoe UI", Arial, freesans, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 16px; line-height: 1.6; margin: 0; padding: 0; } hr { background-color: #e7e7e7; border: 0 none; border-bottom: 1px solid #c7c7c7; height: 5px; margin: 30px 0; } li { padding: 0 0 7px 7px; } ol { padding-left: 3em; } .container { background-color: #fff; border: 1px solid #c7c7c7; margin: 40px; padding: 40px 40px 20px 40px; } .info, .tor { background-color: #efe; border: 1px solid #bda; display: block; padding: 0px 20px; } .logo { font-size: 12px; font-weight: bold; line-height: 1; margin: 0; } .tor { padding: 10px 0; text-align: center; } .warning { background-color: #f5e7e7; border: 1px solid #ebccd1; color: #a44; display: block; padding: 15px 10px; text-align: center; } </style> </head> <body> <div class="container"> <h3>C E R B E R&nbsp;&nbsp;&nbsp;R A N S O M W A R E</h3> <hr> <p>Cannot you find the files you need?<br>Is the content of the files that you looked for not readable?</p> <p>It is normal because the files' names, as well as the data in your files have been encrypted.</p> <p>Great!!!<br>You have turned to be a part of a big community #Cerber_Ransomware.</p> <hr> <p><span class="warning">If you are reading this message it means the software "Cerber Rans0mware" has been removed from your computer.</span></p> <hr> <h3>What is encryption?</h3> <p>Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users.</p> <p>To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key.</p> <p>But not only it.</p> <p>It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data.</p> <hr> <h3>Everything is clear for me but what should I do?</h3> <p>The first step is reading these instructions to the end.</p> <p>Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you.</p> <p>After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions.</p> <p>It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them.</p> <p><span class="warning">Any attempts to get back your files with the third-party tools can be fatal for your encrypted files.</span></p> <p>The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files.</p> <p>Finally it will be impossible to decrypt your files.</p> <p>When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly.</p> <p>You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files.</p> <hr> <p><span class="warning">There are several plain steps to restore your files but if you do not follow them we will not be able to help you, and we will not try since you have read this warning already.</span></p> <hr> <p>For your information the software to decrypt your files (as well as the private key provided together) are paid products.</p> <p>After purchase of the software package you will be able to:</p> <ol> <li>decrypt all your files;</li> <li>work with your documents;</li> <li>view your photos and other media;</li> <li>continue your usual and comfortable work at the computer.</li> </ol> <p>If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files.</p> <hr> <div class="info"> <p>There is a list of temporary addresses to go on your personal page below:</p> <ol> <li><a href="http://cerberhhyed5frqa.zmvirj.top/31B0-2A5C-05DB-029E-DAA5" target="_blank">http://cerberhhyed5frqa.zmvirj.top/31B0-2A5C-05DB-029E-DAA5</a></li> <li><a href="http://cerberhhyed5frqa.qor499.top/31B0-2A5C-05DB-029E-DAA5" target="_blank">http://cerberhhyed5frqa.qor499.top/31B0-2A5C-05DB-029E-DAA5</a></li> <li><a href="http://cerberhhyed5frqa.gkfit9.win/31B0-2A5C-05DB-029E-DAA5" target="_blank">http://cerberhhyed5frqa.gkfit9.win/31B0-2A5C-05DB-029E-DAA5</a></li> <li><a href="http://cerberhhyed5frqa.305iot.win/31B0-2A5C-05DB-029E-DAA5" target="_blank">http://cerberhhyed5frqa.305iot.win/31B0-2A5C-05DB-029E-DAA5</a></li> <li><a href="http://cerberhhyed5frqa.dkrti5.win/31B0-2A5C-05DB-029E-DAA5" target="_blank">http://cerberhhyed5frqa.dkrti5.win/31B0-2A5C-05DB-029E-DAA5</a></li> </ol> </div> <hr> <h3>What should you do with these addresses?</h3> <p>If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it):</p> <ol> <li>take a look at the first address (in this case it is <a href="http://cerberhhyed5frqa.zmvirj.top/31B0-2A5C-05DB-029E-DAA5" target="_blank">http://cerberhhyed5frqa.zmvirj.top/31B0-2A5C-05DB-029E-DAA5</a>);</li> <li>select it with the mouse cursor holding the left mouse button and moving the cursor to the right;</li> <li>release the left mouse button and press the right one;</li> <li>select "Copy" in the appeared menu;</li> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>move the mouse cursor to the address bar of the browser (this is the place where the site address is written);</li> <li>click the right mouse button in the field where the site address is written;</li> <li>select the button "Insert" in the appeared menu;</li> <li>then you will see the address <a href="http://cerberhhyed5frqa.zmvirj.top/31B0-2A5C-05DB-029E-DAA5" target="_blank">http://cerberhhyed5frqa.zmvirj.top/31B0-2A5C-05DB-029E-DAA5</a> appeared there;</li> <li>press ENTER;</li> <li>the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions.</p> <p>If you browse the instructions in HTML format:</p> <ol> <li>click the left mouse button on the first address (in this case it is <a href="http://cerberhhyed5frqa.zmvirj.top/31B0-2A5C-05DB-029E-DAA5" target="_blank">http://cerberhhyed5frqa.zmvirj.top/31B0-2A5C-05DB-029E-DAA5</a>);</li> <li>in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet.</p> <hr> <p>Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products.</p> <p>Unlike them we are ready to help you always.</p> <p>If you need our help but the temporary sites are not available:</p> <ol> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>enter or copy the address <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> into the address bar of your browser and press ENTER;</li> <li>wait for the site loading;</li> <li>on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed;</li> <li>run Tor Browser;</li> <li>connect with the button "Connect" (if you use the English version);</li> <li>a normal Internet browser window will be opened after the initialization;</li> <li>type or copy the address <span class="tor">http://cerberhhyed5frqa.onion/31B0-2A5C-05DB-029E-DAA5</span> in this browser address bar;</li> <li>press ENTER;</li> <li>the site should be loaded; if for some reason the site is not loading wait for a moment and try again.</li> </ol> <p>If you have any problems during installation or operation of Tor Browser, please, visit <a href="https://www.youtube.com/results?search_query=install+tor+browser+windows" target="_blank">https://www.youtube.com/</a> and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation.</p> <p>If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files.</p> <hr> <h3>Additional information:</h3> <p>You will find the instructions for restoring your files in those folders where you have your encrypted files only.</p> <p>The instructions are made in two file formats - HTML and TXT for your convenience.</p> <p>Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files.</p> <p>The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company.</p> <hr> <p>Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data.</p> <p>The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection.</p> <p>Together we make the Internet a better and safer place.</p> <hr> <p>If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support.</p> <hr> <p>Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.</p> </div> </body> </html>

Signatures

  • Cerber

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Contacts a large (16390) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 61 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of UnmapMainImage 4 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe
    "C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"
    1⤵
    • Adds policy Run key to start application
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • Modifies Control Panel
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Users\Admin\AppData\Roaming\{6017E6B0-989C-669C-F2CA-0F60A68A98B2}\ntoskrnl.exe
      "C:\Users\Admin\AppData\Roaming\{6017E6B0-989C-669C-F2CA-0F60A68A98B2}\ntoskrnl.exe"
      2⤵
      • Adds policy Run key to start application
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Sets desktop wallpaper using registry
      • Modifies Control Panel
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1504
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1504 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3056
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1504 CREDAT:275458 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2488
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt
        3⤵
          PID:1748
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"
          3⤵
            PID:1492
          • C:\Windows\system32\cmd.exe
            /d /c taskkill /t /f /im "ntoskrnl.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{6017E6B0-989C-669C-F2CA-0F60A68A98B2}\ntoskrnl.exe" > NUL
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2860
            • C:\Windows\system32\taskkill.exe
              taskkill /t /f /im "ntoskrnl.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1120
            • C:\Windows\system32\PING.EXE
              ping -n 1 127.0.0.1
              4⤵
              • Runs ping.exe
              PID:2672
        • C:\Windows\SysWOW64\cmd.exe
          /d /c taskkill /t /f /im "VirusShare_8ec363843a850f67ebad036bb4d18efd.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\VirusShare_8ec363843a850f67ebad036bb4d18efd.exe" > NUL
          2⤵
          • Deletes itself
          • Suspicious use of WriteProcessMemory
          PID:2728
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /t /f /im "VirusShare_8ec363843a850f67ebad036bb4d18efd.exe"
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2956
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 1 127.0.0.1
            3⤵
            • Runs ping.exe
            PID:2272
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {6C181843-D73B-41A2-839F-9C9D82C7A6E3} S-1-5-21-3434294380-2554721341-1919518612-1000:ELZYPTFV\Admin:Interactive:[1]
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:2848
        • C:\Users\Admin\AppData\Roaming\{6017E6B0-989C-669C-F2CA-0F60A68A98B2}\ntoskrnl.exe
          C:\Users\Admin\AppData\Roaming\{6017E6B0-989C-669C-F2CA-0F60A68A98B2}\ntoskrnl.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of UnmapMainImage
          PID:860
        • C:\Users\Admin\AppData\Roaming\{6017E6B0-989C-669C-F2CA-0F60A68A98B2}\ntoskrnl.exe
          C:\Users\Admin\AppData\Roaming\{6017E6B0-989C-669C-F2CA-0F60A68A98B2}\ntoskrnl.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of UnmapMainImage
          PID:2504
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1308
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1308 CREDAT:275457 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1780
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
        1⤵
          PID:2196
        • C:\Windows\system32\AUDIODG.EXE
          C:\Windows\system32\AUDIODG.EXE 0x4e4
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2568

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html

          Filesize

          12KB

          MD5

          15d7892a8671ccc43700bf3fae30f533

          SHA1

          0e72068c3b1ea85c7a296359f63cd03eaae6cbd0

          SHA256

          272454c79f1896bb538bf39c6d98949d82351645fd6726cfebf4acadc7c27079

          SHA512

          2cac257c2e6ca7ecfb9acb9a1708c44782bea75d3727852f138405599ecde92810ebb75f4c4c4c3179df75313ffe477217bf888825befc1d8eb7f9652ffae868

        • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt

          Filesize

          10KB

          MD5

          15edde2dabc35de45d9e0b652e73b047

          SHA1

          6a6815036674c5ff77edd09360564c629dacbb66

          SHA256

          ccfe6b7f2cb840b39a1c7ab30e364bff2182de624f40f9af81e80b9fe7ccda01

          SHA512

          b5f7cf9ba04758ce841bdd19dc0fcb8eedcb235b69b665f55cb1211fc91db945caad54f3db1d48a16f4b01599ab0bff97119439eb545529d57605cd0c13e1267

        • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.url

          Filesize

          85B

          MD5

          a7cc396e74a4ddab0e4dcc0f32138c4b

          SHA1

          670bcd540dd6b9ab3314fca774bf500c89187227

          SHA256

          eeb0287dffead52d27625d5b69ce8619690ab0dcb89eb746bac3bd1691dfe428

          SHA512

          abf72497ed09a95407fd59f30be145fb4b99e38b58b845cb6f26aecd653dc02775a8c24b538adc5eb658c41b13a457df8fd46567a545b28fa198d1bab2608072

        • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.vbs

          Filesize

          225B

          MD5

          f6d629f2a4c0815f005230185bd892fe

          SHA1

          1572070cf8773883a6fd5f5d1eb51ec724bbf708

          SHA256

          ff1de66f8a5386adc3363ee5e5f5ead298104d47de1db67941dcbfc0c4e7781f

          SHA512

          b63ecf71f48394df16ef117750ed8608cc6fd45a621796478390a5d8e614255d12c96881811de1fd687985839d7401efb89b956bb4ea7c8af00c406d51afbc7c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          6c06eb1cff73d8c37b94707878613d86

          SHA1

          b2257275fe3bd07055fc6b370c8dba27baadfa2e

          SHA256

          b652094b19e56e8aba9439da218e1603acfd8541a139f2c141dd0ac9bb421aaa

          SHA512

          4bb30f00182e97128a612cc1fbfc5f2f196d53bf82e1c9018119850d305e008d004e27d3b8897aaf1b8c6035738cc15fb08d5b2a3413e41a2d4c3883b00c6dd3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d28c27f9caee8d600287dce6617fd18a

          SHA1

          00baf083c2ae8e06854c6b8dd83743a06974fd65

          SHA256

          aa279fd79133a1a2a2929b537139fec024fdb36711b441c03e9579cb6be51767

          SHA512

          b3c3234d9c25bd8cd235a96dc38d973749de3a8f72f81af5c66e5e9b52e51088100d60e5287fae1b364247fc9a7827c59ba79431b9ad02e5789ef4260369bc7f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          58084696a573056bf0b8e4212e3fa469

          SHA1

          f74fcf1ec996ef47f8bd41de4b0991721d1203fc

          SHA256

          58894816fa34cd3ef24ea1981278dba5afd2943659cca573d9769bd13afed8bb

          SHA512

          2eea719134e9de7d58c9452a3670ff158e86ee2c0aed6133cb493b6ffc9f54163a7f1ec6c8bae4075e5b7ec7769cc8afdf31d0e4cff87a725ede9d3ebfdf638e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d7c5139056a9c2750472a8fb27e0e1db

          SHA1

          8a84d1fbdb636e96ce10242b011ef1637899df6c

          SHA256

          74d5f25364328e8aea088422bfa96681755728e47cdfcfc0245dc69b2c652f71

          SHA512

          c20580e4410c66b18a94ce57ee43700aa443e27715f2d414055979489d584dd34794540c0710510c83172e38580ad461a9fc47f751919b9e0cee90b42348e36d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          551db6c58fdcac59ae67a08904f1d86c

          SHA1

          13f1162515231d4c17c69804a7e8e45ca78d3afe

          SHA256

          17222ff2cb9ae8a6e72b45d1abe13c26e17accc7abe48131511939a9fbd16fd7

          SHA512

          3f5d3bd0c46ef7b397def68a5a7b1b2016202e01a46e7d580a6b58179b3fb501b4774eb061450825bb986f9958f7bd32ac2a35089e47db285dc6ed87801fa1c0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ff4b1d0207a778d0c81020709173885a

          SHA1

          6bc37cb7e84d50f1170d5caa4b20e64f14c5f2c6

          SHA256

          e675b120d792b1d33b71009c4313fcd0c64b9dfa8cc52c8e44404067470365ed

          SHA512

          fc2586f50498825ebce3e37bd016756af288f9b7cf0d35e2ef689643f3f28670a1f3da8217fabb8b4521a3040a0af10221409799aa6bb0e00eaeb3da0be8c4f7

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          3f31cf38f857ac018384d792173678c5

          SHA1

          d078eff41db2438c883f9f9f5362ee291c689580

          SHA256

          abf3ae8df60483d018808056561a0a5835405408b91b6620fc87f5b786d7f61f

          SHA512

          efcb18701888574137c5fb788f354dabbf54618018d5ef1469e08cb34e259a26be5e574e21363a41ffe7d16ff271d45f7dd9f15c94a4edae500cfe83489a614c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          0a88fb9652a60f0f06f75ef47738f730

          SHA1

          8778103bed897d24b3aac35b46e5f9a0704fd877

          SHA256

          6e7d45af01110ea31d4265eecf115d20abadf27e4d566999971fdd0e107b9fa2

          SHA512

          916b4dd8b50ab99939fca704c2568f8daf98d6a32b80452bf63b4fa480b31080177776f0210f559da8e2d1d491ed6c8c94b1872828992978504ca73c06e78564

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          0b9d67906c671bc915f0511e03f74a46

          SHA1

          27c464da65194db9f6580c14ce87db64d864050e

          SHA256

          627cdb3ecae188acd33b2d5b4a8e17fa004d2b7ea857f471767bb71fd018332a

          SHA512

          5ac8b8de0acd46406552b6b382ebfbedcc8d6cefa91a87cc767a7da7e05e0d9a0b168c9da27075be177484b21d519ff908e97e1d83db55264ff96be129a65f43

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          5ecaaa3553300bb92795b631403dafb8

          SHA1

          461ffe023a3688bc40c8c47ae2997ff90c601794

          SHA256

          6cf4049403223fad54096f1c822f4379bd7fd1a9d418e7de4cc310a8ab8cc164

          SHA512

          836d3d37d48b79ec6f89ff4e1d7b646d68bb8baf364baf652cb6d1679b2fc0b1b0f921f822570660eeabfc7e8ad07f49c90058e327458b6b01b1fa672b2084a9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          67d8b4f23c8eaf8a0ebe6eef01e2d21a

          SHA1

          46f5ea453d4a90df381fd08d1ef2154a5c35fed8

          SHA256

          14860353a129793cd048c46d8dcfac16522a3068dbee191dc8c87838d4579a38

          SHA512

          b5e7fb4d37cb0e055a40764596e5721af89aaba1292e4110989548aac3eb21f7b9b598e309e3f9cc2b74c53e4a4368dfd1d1ffd965adb08f2df6f377f1601224

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          18b1b07aec4ce29ec5628800ee99982e

          SHA1

          8b21761fda1973d4f0a0dd1b40d6e358cddcf708

          SHA256

          ddb175c4deb89661e78feafb42401be2c70e59f15c38efa2a302eb8c3104f551

          SHA512

          ede4925d798611b3cf23ec6658d04f7ce5863fe6bcc0d43e6ebb3a774b854bfd1721ab809af24eca560c32001f159fb5f18c2f496a0de48419a2030ef0a8fa0a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          fa6b7243b03d2e4f61d387a1c69c3d54

          SHA1

          f444a7721784d8cd7df356e4191237e6cfbbb910

          SHA256

          558a87d892656f3a6f5db7ce164544cf0b176110a1bed4635f13c2085f4dee4b

          SHA512

          ff42cb101fbe4dceb6d922eb50ff862b5bd678c167e04914e0d0e046f35a47821dab8d1879eeab0cbf6f651195ed358a2c0c7f799616c9fa9f1ae9fa00c7631f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          12b98eecd9f8fa62cf2e9f889c36145e

          SHA1

          006ddf8c1edd6f87ca60d75bf091a60c38dd1ced

          SHA256

          96e309ba08ee8d75d61e6af6adaa292959a86e0beb6bcae798980726e98955fb

          SHA512

          826dcc201ef87e8ad83605c8b79d5ac7f166f9367922bfaaebcdaa233c784a9ceccd1f7a8d7260e40f57e590f5499096187e3eb58d0094e35751928e6531dae6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d7642ac2067640a752f40a033a938f94

          SHA1

          d04c3a94662d149a31fef45165fcc312eca9ec0d

          SHA256

          01e02e73bf10658038ab879f02382f70ab9137cf47d40eba30a7a5d89ba17b29

          SHA512

          a6bcdf1a5a26fe6f0045ac1337f7aeca6eadba8f55f3a5896b60c60d3511368b8156bde3dc9c6f4240fdbe4aaa5157c2a43797151374246950475c59b0bd82d2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          74f8c49855708b510b6881e52e50e86e

          SHA1

          542be85d70486609d4cfaf72a11c004ab53f840e

          SHA256

          c66055b04abe955d4aec56dac6dea4f181d48c92132548cf176e177fe5505e8a

          SHA512

          1addc5dc3d21958fbbb1c66214ac63240f7ae58aefa269cae90b86200dae14ad68e6e436cd63da96b8213cd5b942dfac845dc2d0e8ad5020d9bfab77a18fe3ed

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          fa97b8e614ceefd87b11adbfba46a184

          SHA1

          f47616b62796c49a97656b40487c15b80b02e33e

          SHA256

          21c6a3f6963b232028cbe88535e89d816ac407a0870fbe40addbf819125bfcfd

          SHA512

          ddcb07e84d149f1faad955681be60f1fa1b5ff76ba04ff29cdad81468bce720e37c3ae6155d4298134389a4f997dc679f0454d9eac89f8755f234944894abf71

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          e41756aea5af98efc6c677e1f80173b9

          SHA1

          70d007187d09d6005d03eb1ba34b767b96f4177e

          SHA256

          618dcf229eac6a8c9a02eb252c6f9c9c651f78685b1632cc5831be0e6c96775a

          SHA512

          781106e4ab77ea6215cf9390634ca607fc18faac011a3150efdca65d3beafedde1d66a04a781c3ab1df97fa79f5cdbd939fdf442a4260d621a74ebeb9e4c2674

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          6d531365ef270046032c2a4321cfb468

          SHA1

          018c6fa5efd069e4fbc9cf695306157da7a1ba21

          SHA256

          a65f9df6c82fc4cfe37df2b7cc776fdeab52df38f79f8cf49d88ef70d4137b8f

          SHA512

          a03cabdfc8449227d7904fdbee3888107a28d447cff37d854073b4e3f6335932290b553ee6e7c027f2e7a834e3ffc78e61ac9920fb0022892d657688cf9878e9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ce199aeaae5f30f669df9220a0ecd875

          SHA1

          5e67d0a8f7405875a729f2b14a2c91ec7cbfbff3

          SHA256

          a2d24b4ecb3ead1c28195f96a7e7515271231df7f32887ec3cfac5533677907e

          SHA512

          a3ab0baf265f725141dc9227f009ba3ae34add09ad5ad77b4aa8cf6eef06b7f903cabe46b14c6696b856bc8c0ab65dbf71cfa56742e81ae2e40eb658503411ff

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{300DC881-4584-11EF-8B6F-725FF0DF1EEB}.dat

          Filesize

          5KB

          MD5

          f68eb73142aada7b2c7f165a7567436e

          SHA1

          84e04da5960afeca11af98066d5b440a8bf2e1c5

          SHA256

          52da83f060a57f729d60147ce277f0cc0138b69b5d7a1d557f314fff790e7253

          SHA512

          869487d7629797a90f76f224e59c74357f4eac42cd5b564d2611fe2b2e312c9e8c79e035f71f8d6dd7ba7b9ac07ca1ef2b9ae341504108841912c28715223a92

        • C:\Users\Admin\AppData\Local\Temp\Cab119E.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar123F.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\ntoskrnl.lnk

          Filesize

          1KB

          MD5

          3325daf3d014efe59b942c41f8b9e75a

          SHA1

          27db6255804c0a01b9e2408cc69eaeec955b3ffc

          SHA256

          00d4195a864e9819c7f450222632492c984d974a14049a4bf064f2d16c29d3ef

          SHA512

          c369735cb82cf624a3025fef19104e050fa6610397756338d9ee548d27c5881c6163993f045707f6cc62b0070ca4884d0c5c6fca2c051089864c388265c4b5ea

        • \Users\Admin\AppData\Roaming\{6017E6B0-989C-669C-F2CA-0F60A68A98B2}\ntoskrnl.exe

          Filesize

          186KB

          MD5

          8ec363843a850f67ebad036bb4d18efd

          SHA1

          ac856eb04ca1665b10bed5a1757f193ff56aca02

          SHA256

          27233293b7a11e9ab8c1bca56a7e415914e1269febb514563e522afd04bc39f8

          SHA512

          800f15fb824a28860719b2ff329dd9bcd94cf9db26c9617656665564b39d8c116552296656f5c109a697b6afc5658f0ba4688e4803358504000f6150047d6684

        • memory/860-21-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/860-20-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2460-0-0x00000000001D0000-0x00000000001F1000-memory.dmp

          Filesize

          132KB

        • memory/2460-13-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2460-2-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2460-1-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2504-927-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2504-928-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2824-931-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2824-455-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2824-476-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2824-474-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2824-470-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2824-448-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2824-486-0x0000000004670000-0x0000000004672000-memory.dmp

          Filesize

          8KB

        • memory/2824-459-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2824-462-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2824-471-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2824-473-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2824-930-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2824-441-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2824-465-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2824-452-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2824-438-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2824-468-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2824-444-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2824-24-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2824-25-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2824-23-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2824-17-0x0000000002710000-0x0000000002711000-memory.dmp

          Filesize

          4KB

        • memory/2824-12-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2824-15-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB