Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 00:23

General

  • Target

    eeb980af711beb0f69516456f7be7494_JaffaCakes118.exe

  • Size

    408KB

  • MD5

    eeb980af711beb0f69516456f7be7494

  • SHA1

    b949c543454a5608440274365d86b07e6ce65a86

  • SHA256

    3877a5a735bbe57c2c56052db2e8aa92662d3cda300fc89bbb0674fb89a8df15

  • SHA512

    83cac353cd0a41a532b56f0d6a0add5f1e265bc18804c4270a47d207089d6a06392e731bae65f870219d7f429eb56761a5954da5a62064d90621a9b44fbe8960

  • SSDEEP

    6144:mFyDAeaSelFAOhfrRa9ZqfA3RqnCTAH+QRScnKdM28F8ZZ:AyDATllFfTeqfop0JkcnKiS

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+ohcml.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA4096 More information about the encryption keys using RSA4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA4096 Key , both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So , there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1 - http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/AC6DEC915B6EBDFD 2 - http://u54bbnhf354fbkh254tbkhjbgy8258gnkwerg.tahaplap.com/AC6DEC915B6EBDFD 3 - http://w6bfg4hahn5bfnlsafgchkvg5fwsfvrt.hareuna.at/AC6DEC915B6EBDFD If for some reasons the addresses are not available, follow these steps: 1 - Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2 - After a successful installation, run the browser 3 - Type in the address bar: xlowfznrg4wf7dli.onion/AC6DEC915B6EBDFD 4 - Follow the instructions on the site IMPORTANT INFORMATION Your personal pages http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/AC6DEC915B6EBDFD http://u54bbnhf354fbkh254tbkhjbgy8258gnkwerg.tahaplap.com/AC6DEC915B6EBDFD http://w6bfg4hahn5bfnlsafgchkvg5fwsfvrt.hareuna.at/AC6DEC915B6EBDFD Your personal page Tor-Browser xlowfznrg4wf7dli.ONION/AC6DEC915B6EBDFD
URLs

http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/AC6DEC915B6EBDFD

http://u54bbnhf354fbkh254tbkhjbgy8258gnkwerg.tahaplap.com/AC6DEC915B6EBDFD

http://w6bfg4hahn5bfnlsafgchkvg5fwsfvrt.hareuna.at/AC6DEC915B6EBDFD

http://xlowfznrg4wf7dli.ONION/AC6DEC915B6EBDFD

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (426) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Drops startup file 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\eeb980af711beb0f69516456f7be7494_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eeb980af711beb0f69516456f7be7494_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Windows\sqbhadkichmm.exe
      C:\Windows\sqbhadkichmm.exe
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2760
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2688
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_ReCoVeRy_.TXT
        3⤵
        • System Location Discovery: System Language Discovery
        • Opens file in notepad (likely ransom note)
        PID:984
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\_ReCoVeRy_.HTM
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2384
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:860
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2000
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\SQBHAD~1.EXE
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2744
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\EEB980~1.EXE
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2704
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1932
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    PID:284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+ohcml.html

    Filesize

    11KB

    MD5

    976276b670d14f365a458e2b6d781f22

    SHA1

    1a874c4225a9934726a6975358b6b9725606343e

    SHA256

    49ca556f1f7e66b7c6ed7737f85732d8dd35c7235c17f3374119d39dcd9814b6

    SHA512

    ba163abb3dd8346ccd98e1af5828759e4815421dfb282e6babea709ce79a2afdb0cff364bbbaa612f50d3e275b894a1aeb15835aafd5fb099f122051a487aa19

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+ohcml.png

    Filesize

    65KB

    MD5

    2fa73e00a87ac077bf54861128c12372

    SHA1

    1d490497a59de8d615f3bfb8ca707b49303f4d21

    SHA256

    e5d13c9ac6205dece9614f97da003c0189a028de696de7016e0611fe57b68a77

    SHA512

    4e04b6e538f1d5658b29263a632ff00c993da9303c0225b2537c703c6b80b59308fa2a02165fa0924c6d9ffb628b6724354320db2d3184d532b10e36c10a90cf

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+ohcml.txt

    Filesize

    1KB

    MD5

    dbbb5e0a853f76a2dc1d9b5a3230dc13

    SHA1

    d93031ee9914bf6eb1e092fd788edaa3012f6e18

    SHA256

    a70ed8429d2083be064d96b45358bddc26b8a4a95a0c46771641e3698a719b70

    SHA512

    9571bbc1ccc4a05188bf89bdb7c5565ac47ae493665baef4e996ce8215c1202531aa349bc54f6adacfbbafd1866e85debc06ac433d00b86648b148ac3a87d7b5

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

    Filesize

    11KB

    MD5

    d515ff10ef4bb6919175cc38059c917e

    SHA1

    d2fac4e2a0cbe6a9c4e178e084f1e46f88add5fb

    SHA256

    be3b1049a2b74509e2aad428cd2aa181c91c4067917928fed47d06db84cb8611

    SHA512

    6eaccddff8d8af4ccbe91dd38b53455419885438d14ba3fba72401a77e52299b71d1025fbaff16335785080bf6daff722ac8a0701ddf97147460002380806eca

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

    Filesize

    109KB

    MD5

    3c84e370418fe8d3a12c97b5a44cda51

    SHA1

    6dee0524d9b92793a6f8fc43db512b79bc1cf85c

    SHA256

    f7ce3bff5d637fc0fa2726faef54017e6f4393c26f186f9ec7dacce0b5a00cf3

    SHA512

    0e586f69e5b2eeb9cc2d3895ef3ffb06e4c1e63bfe41086696701d62ecece4c33080cdb9cb1750f55ad9da4fa87989b6a2b01364a23a6b2f3d270aefe6af8409

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

    Filesize

    173KB

    MD5

    9a5905b5ad0887ae98119a7d57dffa26

    SHA1

    d07552ee0ef5f8047e7e81175595ddf7f0b913fc

    SHA256

    44e4fd68f2ac471564cc7f1262c21e52358a63f8a269baf240a3c8f4bf399882

    SHA512

    d8a36926911e01780ecf2eb2bd2c800349bd0809a793eb48bb78cc9d6e86302d7a0ff092730e028953cd3eb682cc062a3d34158d89f5d210f5b14e4ee2ac4723

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    efc2fc62eccba613f3c3fc8bca7d85e9

    SHA1

    e4dc213136194adfb9b474585f592d2fc8e6be6a

    SHA256

    3a80df7222fc121579e80e0d6019a70aa9658990394dbd1fb3c39b089616e936

    SHA512

    2794e618d5af686236c05deebcf60eaed5c9999af141274ec467cd682b981eee73051e2e829f1ad80b7f48e2e1e45c595b35947fecbe0437a70a31e288ea27c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    12dfc4852fb93954ffdf832c6496968f

    SHA1

    02d4c4e6db8019767f0b62c644db78a5a50b93d6

    SHA256

    dcc51adb0b4266ae4e9f3f4308c2fb812974ea846a1a32362aa0e50de7dc3fcb

    SHA512

    c704eea5d74a60ffc339b99d5a243529ddefa110f3b9f232a5bf9e9bf013e0076f49f4127fa08340490f8ad26f19af5cd21329d7e312c310d69234d642a1329c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bfa83f00ca2f5f8661dedc45822ee10c

    SHA1

    01c8683fa3157bf96d0b9a4dc001ba0a271bdb82

    SHA256

    3e969e3b290ec073c95956bb621643109b09c65945088089f88fe8376133727d

    SHA512

    e0f90e51603d011f2f6408f7055aefed07beea69595a5094f0097c46f2ebccf6ef97978a81d8c26991652f67e37760511675b745d250f77b648965f96ad981c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a90b31c12fa0570c900596eb1963dbd

    SHA1

    31083fd600ff3a50ddb2398e4b384629b5b08dc4

    SHA256

    036c20758092d7844d36b8f29bfe86ca4ca6e82d97b3b944c6517fb5adad3079

    SHA512

    1b30530bdc005200bb593c021828ef845a5578b70016dcf906516eb547861e517c96865ef3e36c5637c6766ec149319bf84efa18e2ad383efc62df4440b35862

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dad6957c6bd882bf3f2e71ff1fa48213

    SHA1

    63e8d9ed12eacc1129ab7cb018bb37fbf0f5f0c5

    SHA256

    ffee39c3a1517f29465a917b7783c68824ef10f8befff54ea6ced7f178eee170

    SHA512

    582a0f68077bf20c3acfdec52450661592e7977f0e7113de4d2add5ff14cb18502c4cb54debdf1f83c4851e41e3aaaf3e6cdd3158479f97040f8c1c3d31ccc95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c1ca2c8df2fb311da5589dd42efcdcb0

    SHA1

    1a77bd174fd8bb7a3dfef402929a9aec62912f29

    SHA256

    cbb29e448f3cfef4282a3620824635aed97fb61fa4030250709c27e6e02ace27

    SHA512

    e32b30c31840ec2506135c6804e964f132d729d5d3b4bc413f1cfedbf20a8426df64d793b66255df316d94f0cf11c3ea32bb61395f5d07e4421ffa382b4e8093

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e78414e86d002ec3a79a8dc3072668de

    SHA1

    0ef4435d575aa72a827563f1aa51e908ec145234

    SHA256

    cf2ab38cce99038adccddffb37d1722ed595827ad7107fbf00c45e8d4c6a7c1a

    SHA512

    aa7027dca6b66888ed4e2edd26846b4df96867a13aac70fe4ce7f4864b81eff6110932138a81189d04f52130585a6f6596122d693400f0d603dcb6e7932d0446

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e5e02c16651657822aa1363775e71625

    SHA1

    cc53d2c2124b520eca459b3a6ea169d7b2465515

    SHA256

    d241b307a17b4f98e9edcb1891313430d4c05cadd45382c0ec15017b561b0d1b

    SHA512

    f1d7d169ad1ddc31572158e7c34dc932550285e6a60956ffeb7ad95c513fe87d5af8a57157d52ca34c388be363a4c72ac6186256475542af2c7dc7940a0b4f50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a6825ed29e7faf720f812e5abf1296ad

    SHA1

    672bfccbceb5cfa479d8b19165cd2a6a101589a3

    SHA256

    c0d3c57007e78d5c1caa8530dc4b01271d05c49a2eec482a34812e0217042e02

    SHA512

    d90936fd5791963afbac9ed5e56aeb79cd462d92e98d05c4bad793a2375c3830551c131346705e1199c36eac68716a1b2c8bed43067c294832bd1dd625b1fde7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1624cf39538044da41641b86c52fa23c

    SHA1

    1bc6825fa1a0cf863d6e23f6c8aafc004004f5da

    SHA256

    9c8be5fcd69f037d959a36ccab34d52e3d2863472aef0ab3cee03c64aa352a62

    SHA512

    0cf666ab99e848557efcafee7259ce7334cabf82bfb56b86cf6f14119540e44010fb46f96e84367204ed4e2b0ad04c7cf0405fd86fd8e41cc292fbfc68fb5a58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a3625f97248019d8288d07ad4c0a39d4

    SHA1

    877052fd0d43776470ea8cae588d2574dee6e877

    SHA256

    ac0d4fa119a319910bee7f5777b889794c728a1c85fea8df57f9623b15ba021e

    SHA512

    b04e8c4ff7661b2e772ab186ee1cad4344ecbf6195701b730e62aba86efa70cc75f7afaa82ebe7218add020b0d63212ee9848c4e71951edd7e86c62c3f5cea32

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d668f82bc0239bff5f76b3fda9e5e83

    SHA1

    1b754f9d671ee228587ba0e747c142600e198b6a

    SHA256

    a08d9bd1d3963aba535e037582cccd3501c65fed2098c329ca54153ace8e2960

    SHA512

    ec662595ef1f7c88055eea67b0962619fcfa2ceab929e5fdaa77c5c856d7e331b1d480d521024baa609ffbfa8621eb61843a4c53cbee821e8e523f30de29b421

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    569beb790ba1143b57dfd0d93b644bf8

    SHA1

    064fa3dc1e069c7e7921855e43767bbf8e0fd005

    SHA256

    2e7e599c396be44769222ac24e21bb470497c6d4fd5e3a03ccc5b8c26eb87bef

    SHA512

    102c2c7e8639808858b9b08eb89170d84c5a38aedf26f61540eb0c25420fb201ccbde2892b4c04d8285ca713ab9cceb54fc5b0d02003a7f0e4c7a56dcdc4bac5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bac248e974954a9e1fb6aaac09d1a840

    SHA1

    5fcedcf3f9d5e6f1778a850e9ac07343d94dff93

    SHA256

    6c7081348d0917bb218b92acdc257c101b00b9e407bb80adf1f2df06fc147e7b

    SHA512

    1fd4b58e429a9be5fd7eb0683b873bb95495efc0f8a1d1059a8087c1e2140894fb181a7a42b1956f497f08ad4207e3802de46e51f137d64a3fed9710de2b4e9b

  • C:\Users\Admin\AppData\Local\Temp\Cab6AF6.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar6B09.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\sqbhadkichmm.exe

    Filesize

    408KB

    MD5

    eeb980af711beb0f69516456f7be7494

    SHA1

    b949c543454a5608440274365d86b07e6ce65a86

    SHA256

    3877a5a735bbe57c2c56052db2e8aa92662d3cda300fc89bbb0674fb89a8df15

    SHA512

    83cac353cd0a41a532b56f0d6a0add5f1e265bc18804c4270a47d207089d6a06392e731bae65f870219d7f429eb56761a5954da5a62064d90621a9b44fbe8960

  • memory/284-6077-0x0000000000160000-0x0000000000162000-memory.dmp

    Filesize

    8KB

  • memory/2008-9-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2008-0-0x0000000000350000-0x000000000037F000-memory.dmp

    Filesize

    188KB

  • memory/2008-1-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/2008-2-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2008-8-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2760-6082-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2760-6076-0x0000000002F30000-0x0000000002F32000-memory.dmp

    Filesize

    8KB

  • memory/2760-10-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2760-5499-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2760-2184-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2760-1895-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2760-11-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB