Analysis

  • max time kernel
    95s
  • max time network
    96s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25-08-2024 05:58

General

  • Target

    c0199f0d56f43d6789e05f8f9fdf0102_JaffaCakes118.exe

  • Size

    428KB

  • MD5

    c0199f0d56f43d6789e05f8f9fdf0102

  • SHA1

    d6375c82b9460e4555bd5dad28c31f6d00404b38

  • SHA256

    74169c547fdff11862c73f3745bac6c4f214f8ee3ad2ace1a4648a77957f12ff

  • SHA512

    26aca425f3ab5ac9780f7b6eb862ed5a15b6c789e3df8a8561cf12878403bd61012906fab1b4a0e15e4d365760ae52ee9bc75a8aa9e150226bb45670dae2455b

  • SSDEEP

    12288:tzUgz5mSAKNuYH+eCGdFCWhLblCJxfS6:tzUOpQYeeCoFhvOR1

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+klfrn.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with AES More information about the encryption keys using AES can be found here: http://en.wikipedia.org/wiki/AES How did this happen ? !!! Specially for your PC was generated personal AES KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/C5F0C08FE1F8ECC8 2. http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/C5F0C08FE1F8ECC8 3. http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/C5F0C08FE1F8ECC8 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/C5F0C08FE1F8ECC8 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/C5F0C08FE1F8ECC8 http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/C5F0C08FE1F8ECC8 http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/C5F0C08FE1F8ECC8 *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/C5F0C08FE1F8ECC8
URLs

http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/C5F0C08FE1F8ECC8

http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/C5F0C08FE1F8ECC8

http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/C5F0C08FE1F8ECC8

http://xlowfznrg4wf7dli.ONION/C5F0C08FE1F8ECC8

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (427) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Drops startup file 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0199f0d56f43d6789e05f8f9fdf0102_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c0199f0d56f43d6789e05f8f9fdf0102_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\radpmffpgxlc.exe
      C:\Windows\radpmffpgxlc.exe
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:456
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2728
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
        3⤵
        • System Location Discovery: System Language Discovery
        • Opens file in notepad (likely ransom note)
        PID:2100
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2496
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2496 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2036
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2924
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\RADPMF~1.EXE
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2688
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\C0199F~1.EXE
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2736
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2740
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    PID:1892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+klfrn.html

    Filesize

    11KB

    MD5

    276737b9b68e95144054e9d2e589e666

    SHA1

    c3c2ca9399033852124107aeca835488bbe9b2a5

    SHA256

    250608ee890846036ecf85e4acfcfa630f983f71c4889b9be4975387be38827d

    SHA512

    c4bac5a2a233c923d54e4642a208b4beb500f76ac96be2ce6f27027d2be25b6fcd463ce5b3f09fc07c0ffeb4915b92ac4a7f4b13a7b1b20c0d9003c7dbb89a00

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+klfrn.png

    Filesize

    63KB

    MD5

    52f14ff47203168f247c845637c8ab46

    SHA1

    00d41639f2109d308d0df2ad66f9198c73c9f0be

    SHA256

    aa14831f36d174c9b011d4e800b07f3d889d48d5086428a4147d95d197792015

    SHA512

    a1732125b122d6239a1f0e3d302fda5392459174b55a474fc024dccfb4a15459db05b83b4b191ba001cc8269877e79b12e59ea6dd4e512b3f04b0cc05a6f4c2a

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+klfrn.txt

    Filesize

    1KB

    MD5

    ff4a95fe6d9ef1a1fe969fe0ab93cc17

    SHA1

    991af0f3e64049aaa94cd426de592ed10e45ec0d

    SHA256

    52defd5d7d46686a965768555c5474a453fc4ad4b814fc10f31f81d3f3bfac2d

    SHA512

    e0660441ab87fdfb10f17fd8095692485e0b58e4d9bf020b47b1fc6a86b16f303b997447cb43697cf175059173c67e2462d58b7c0276de163c05012e2e0a7dd4

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

    Filesize

    11KB

    MD5

    11f5e6f4d86d5cc66f7b1aec37f8a06d

    SHA1

    4638e4024c051f94b7fdf0628338cfce833f077a

    SHA256

    a6af95995aa7146c7f8c383c31d38d9bf1fd82204b7d9bd24e51bb160f03e425

    SHA512

    261b4fec65c1f6c9b3f18a928a61a68fa3b4d2fe1be5b98e0fcec61a75b75055d195e6c649fb96e9461c739fa9ff03f19088d6011af26598ee4873b770bc3bbf

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

    Filesize

    109KB

    MD5

    c31870925a06fa202055c698bb65be2f

    SHA1

    64f969c87420bcbf066ee663b91cdf56ba8ac425

    SHA256

    95d8286be5478638744d81ac003e8d5c13032bfe82c3e8fde3028bad7e5e8559

    SHA512

    cd435a04fa36b7336548810430f3d879e9ed80e8044cae9c2c0c204b9397534cdebe7ad11d146fb46ca57acc7ab4c494f1874facd15389f3a4898bb17bfac768

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

    Filesize

    173KB

    MD5

    4a5c30e881295391a9d25aa0cceb65a2

    SHA1

    5505fa226b756144a6c2824581b965d1b592a3f4

    SHA256

    3c2bf28fca3a1ca457423d853ba3ab259e7f8477328c1e81cb00fe9ae181f114

    SHA512

    6209710db371e2d6cbe692329abd1caccdce74dad564334244512928138c1aad35faf401674602a48d6d3e55278f5c63eea8012783607da7bfe940061743ec3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    62272353c3b169eaaa1d2f85e8e05c36

    SHA1

    a17e5654c0d481a474713d63d8410672fb779653

    SHA256

    9623ce24a05cdc5f001fb1c531a878492dbc8719735fca877ea13949dd85bfee

    SHA512

    af6794e19724fe0cd4f69a6c8d264d6f9f4bb1e583f3698ec5a90604da2eaa8ddf088f1934fb753d5fdbeee0b7e5f49c8c2f8db9f2ec3de1b063fe78920b0ca8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    51affbc27db524114df666df937b2a19

    SHA1

    bdce89d03edcfd028c6bb93bd6948f11b3d268f5

    SHA256

    24114714e127ff36d06273df735409412debf05f7448c5bde329923904abe6d3

    SHA512

    11cc6857e65a3567af0c3dff5c898c6db4a37389cb4cd43e56ba5facb7c51bd124f2b39c3167fd4b7f2354c9038870b20b550733a2d8e0bd096b1cd818f488a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    548dd9dcbb3f0ef217ef43a8b68b7a5f

    SHA1

    d66c9b5adfddb352607bd341859521f039172459

    SHA256

    7cf3f565227d2248b80a4ddefa5d6fc677cd785e08bfbe5d068f26a31974c7db

    SHA512

    f6da3420faa4162b64b9a0131bfbc2aaa785c0d441fdce4ad89b4f9f05b00ae9a56db92f5e4cbf70703937121a5d804a224f861c2d5242ca2c604e8005273029

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2881267405417074b65063afa1a720a3

    SHA1

    d0ae235e9fd1a8455d9a43ce0d4bc74200900a91

    SHA256

    d77ad0135ed5e39a314216e6e3265268babd5e88a74d31f5f44c847ae334a32d

    SHA512

    d21e3eb68e8e4d5920457b1ed129ee45025edc5105fae183d3e95ac1577cc181268ab5c0367dedcbce3ff915a940cfd453aa31da33d037830cb2626b321e5982

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    851a708001736c8d5f0a7cf027e79aa0

    SHA1

    07300ec04034558519cbb84dee7969a8731f53df

    SHA256

    9d1d0cb77ea0df504f48622657895f79c61a9f1145db4f9d0b30ddd22c0fdac4

    SHA512

    bfd1ef239357cebee509176815069d2a722f20dd9d1995f81962f847e2f9322ccd0b1f38bb87386a669b96e3b668f7da5817967f2aafad8257a5ba7da1e3c8c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    61a29a07692e3cb4f0b69ecc627a3995

    SHA1

    cdd95e00dc4aa7f8bab9d21a7662dd7778bd88ce

    SHA256

    9d3efd8e73235ede7f46f2f6e31f7d0e82cdc6e6b3720a3590c58282e36ee1db

    SHA512

    1de480eecb12bdd85b4ea05d0b245f0344e259abc525bbb9533e658843afa87c5ae47c1efe88f8042ae4bd68170ca4432ee4d9e2ee2b9fe21b75bec08d833be4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b91361f2605474e41bfb3666dca92026

    SHA1

    b938349b866175ca6433ae15d3b2614eda68c998

    SHA256

    c82490c44b4a8026b9ba534135ed4706a965ea900da219daf4b9b9008698a6ac

    SHA512

    46209dae1448cbe7c0fff6ce54e8f0a877aa56d945fd5ca51290fd9cda5e1ddb96f61245c976caa84604e7b8049f425022420578ca028c6a5eec5c854713b214

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f3d4b6f9d88413d98e1a859dd3de8671

    SHA1

    c7e99e226f1ba29e9a45ef45d54f76b887d9e641

    SHA256

    1acb7d975d4944449849a726af5be0fefe81b0334c1addc1e714fdaf579d8044

    SHA512

    473ba63d12e118457c0c3e8fbd067a1bef5066226ec7a7253adadf229f7ddd5d02217699bfeb6d29eb6c8f4b0ddebfe7e57874312c528af3487fbbe9b853e0de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f247bcb3556f5ca8170022b1e8dea731

    SHA1

    ed617e1f20febb8e8f012edc69131119de888a4b

    SHA256

    ac2938946a4c4a4b05be20c9a4ecd8684e12d6c5062c982e3ca097c5f9d4d87a

    SHA512

    54b796ccd5771766325681f842c2a162481d19a8a6ff72a9265cd450604bcbbf9f7128ab37041d9eb89069c8caf44de386c18e6a265e5ae513fa676ce2597496

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    63071644880aacf810f95725a3145ad8

    SHA1

    afc9d74d101ede0f85cef3a4144159f251a884fe

    SHA256

    0c6e7f6fd32c826bd7abe1bda7e03349dd2e8bf1136791121bf02c1f32323375

    SHA512

    66c30f251c3fb3ec336ec0c603800d3d8e5b0a166ce8bd7a8b89dff0ed34970367d6474d8eb1bb4f639d9e5dbc70bd1bcc3c3f748985d19a1c6c0007f0020e71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c9dc47d2df9a86aa0056575bce925e6a

    SHA1

    25b8e5cd503c9b09310683800d6585b5f98708ab

    SHA256

    0ec44b194050b76a8e36d4367f2fd3c7e567b8a6ee1de36e3099ea476cffedf5

    SHA512

    5075cea602db29cf2c07a8cef9978221134234a4fbcc2f4ac4ff29b3476cf1bd8d90dc02b3672bfd57f336d2de864723ac7a9da92b21d1cba816eeaf9c6283a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    652527fff0da852da2fe6776bceaf23a

    SHA1

    e8681a0692d66e941b8413c396b7de16fd69a8a0

    SHA256

    1b174163760c0c2b3abc279baa6a411648e776d2d15e20fdc422517e0013df73

    SHA512

    a3f72ad026107465a31ddb15967ea4a474d8a7ead8f9ea3745420ce37c65c9579e97c821d54ed464805366f5481dabee63a71e713b4068a347fedff14b498da8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb8cf205141031d59a1f12a37ef6a64e

    SHA1

    6fa77b9190e367e3abeda14e2b581cbd773072a6

    SHA256

    369fe24af364ee03e2d3cce9802fcb3be120b4dabd1898ce5441bbfabcae32bc

    SHA512

    6872a6e7b7172c17fb14555142c509f94652bcd6fcef7552d79d324a30da1fbf9ebad310c6d027a15badcb1c04a5d5f8d56bb671b7995fdaffaa27d86a9df859

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dec98709fb30bf790b6584d9a6c273ef

    SHA1

    2662a3bc324d090f07424cdbe95474393a312bf1

    SHA256

    a79f759b9c6d63f6cfb2d8749b2994e8bf69a5dbfde90bfd4bcc3354a26adf10

    SHA512

    e391b4d06850cbb7cf7a72862daec5c6004e255044b75da7617bba075299edbb2f4e13c3c2b3f75e1e78b6f69c01954c50be393310db6a2050ce2a3e4d2a1316

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    58173225fc353d30d8c1a3ba7b27dabc

    SHA1

    243a4901ebf430738629a341d5c3e74a542c1aca

    SHA256

    ab1214c7f189e90b23bf31e11e3b5e9a37b9cb33089e2efc5ee0d58aa072461f

    SHA512

    801cda31fb41cb2b99b82aa6d765d9f287c3b975c8e1a46ef0534ab9c4f0f8250f5bbd75897855da5594a6821a192fbf508a78d2d11e40e4d300408962e927f7

  • C:\Users\Admin\AppData\Local\Temp\CabC055.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC104.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\radpmffpgxlc.exe

    Filesize

    428KB

    MD5

    c0199f0d56f43d6789e05f8f9fdf0102

    SHA1

    d6375c82b9460e4555bd5dad28c31f6d00404b38

    SHA256

    74169c547fdff11862c73f3745bac6c4f214f8ee3ad2ace1a4648a77957f12ff

    SHA512

    26aca425f3ab5ac9780f7b6eb862ed5a15b6c789e3df8a8561cf12878403bd61012906fab1b4a0e15e4d365760ae52ee9bc75a8aa9e150226bb45670dae2455b

  • memory/456-14-0x00000000004B0000-0x0000000000535000-memory.dmp

    Filesize

    532KB

  • memory/456-15-0x0000000000400000-0x00000000004AE000-memory.dmp

    Filesize

    696KB

  • memory/456-6526-0x0000000000400000-0x00000000004AE000-memory.dmp

    Filesize

    696KB

  • memory/456-1875-0x00000000004B0000-0x0000000000535000-memory.dmp

    Filesize

    532KB

  • memory/456-6086-0x0000000000400000-0x00000000004AE000-memory.dmp

    Filesize

    696KB

  • memory/456-6082-0x0000000002F80000-0x0000000002F82000-memory.dmp

    Filesize

    8KB

  • memory/456-5114-0x0000000000400000-0x00000000004AE000-memory.dmp

    Filesize

    696KB

  • memory/456-1874-0x0000000000400000-0x00000000004AE000-memory.dmp

    Filesize

    696KB

  • memory/1892-6083-0x0000000000170000-0x0000000000172000-memory.dmp

    Filesize

    8KB

  • memory/2368-11-0x0000000000400000-0x00000000004AE000-memory.dmp

    Filesize

    696KB

  • memory/2368-0-0x0000000000400000-0x00000000004AE000-memory.dmp

    Filesize

    696KB

  • memory/2368-2-0x0000000002290000-0x0000000002315000-memory.dmp

    Filesize

    532KB

  • memory/2368-12-0x0000000002290000-0x0000000002315000-memory.dmp

    Filesize

    532KB