Analysis

  • max time kernel
    127s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    09-10-2024 04:45

General

  • Target

    2b15e8b996a5e439f4bb7c9e98a2ae0e_JaffaCakes118.exe

  • Size

    388KB

  • MD5

    2b15e8b996a5e439f4bb7c9e98a2ae0e

  • SHA1

    a8dd6a2388e0e75add58a86bc0b72448e969e7c5

  • SHA256

    0349b7b5d9d720f8c454b69716f21346967bfff297ac2f6ceec40ce80747054d

  • SHA512

    ed6e2b79df27034d2f72230db1b3c83ed1d5acdc6cdae3ce9ce456884f682a18cfe6995b7169cb6c7cca668d662d0e72b6bd971799de5e5e0e280df3d089e1d3

  • SSDEEP

    12288:z+QA5i2ipjoMARxOJ7dLQsNeqKLGrDh/:CngLpjoMARxOJJsLLG5/

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+pagxs.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/2D92531C64A6E422 2. http://kkd47eh4hdjshb5t.angortra.at/2D92531C64A6E422 3. http://ytrest84y5i456hghadefdsd.pontogrot.com/2D92531C64A6E422 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/2D92531C64A6E422 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://tt54rfdjhb34rfbnknaerg.milerteddy.com/2D92531C64A6E422 http://kkd47eh4hdjshb5t.angortra.at/2D92531C64A6E422 http://ytrest84y5i456hghadefdsd.pontogrot.com/2D92531C64A6E422 *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/2D92531C64A6E422
URLs

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/2D92531C64A6E422

http://kkd47eh4hdjshb5t.angortra.at/2D92531C64A6E422

http://ytrest84y5i456hghadefdsd.pontogrot.com/2D92531C64A6E422

http://xlowfznrg4wf7dli.ONION/2D92531C64A6E422

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (436) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Drops startup file 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b15e8b996a5e439f4bb7c9e98a2ae0e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2b15e8b996a5e439f4bb7c9e98a2ae0e_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3032
    • C:\Users\Admin\AppData\Local\Temp\2b15e8b996a5e439f4bb7c9e98a2ae0e_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\2b15e8b996a5e439f4bb7c9e98a2ae0e_JaffaCakes118.exe"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2284
      • C:\Windows\xsynhttanrqx.exe
        C:\Windows\xsynhttanrqx.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2792
        • C:\Windows\xsynhttanrqx.exe
          C:\Windows\xsynhttanrqx.exe
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2344
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2316
          • C:\Windows\SysWOW64\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
            5⤵
            • System Location Discovery: System Language Discovery
            • Opens file in notepad (likely ransom note)
            PID:716
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2644
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:1620
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2204
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\XSYNHT~1.EXE
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2252
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\2B15E8~1.EXE
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:2576
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+pagxs.html

    Filesize

    9KB

    MD5

    b818f6678dfda1a8d4c510da41235169

    SHA1

    b59dd7e0ae3ae44e49dac67e3d2eb2736be79c7d

    SHA256

    66ccbedd5d157ddfd06fa3e665bfea86e2313ef35dbac53dd420e17f4a3ba40c

    SHA512

    ea35179a4113a185c1bf1ee22fcc6306b5365c67129e2dcfd40bc6f7335937056cbb7f7b043f516ee6d1d792d09fb00c7f09c46ad5d84eec9a3bfc2ff9e4bc77

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+pagxs.png

    Filesize

    63KB

    MD5

    9090582209c5cbb065bb879997ca638b

    SHA1

    4237ca03b8191ac8bb79c4c0b717fa9abcaf509b

    SHA256

    c0ca43adfcd20bde52eaf02a5b20fbad79c7e0912fa91614892eefa6457b083d

    SHA512

    7eedcbd7812ab19ffec4eab35889e7c53f9a67660480ed01bacf163597530db99b1e51d805b6c398cdc9d80dc14d83a9557de2cdf04a3ec340d6c27d4999149b

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+pagxs.txt

    Filesize

    1KB

    MD5

    ee495d3b989d182400a4b5529d035459

    SHA1

    443010b1ef6dde687926b6c5b9837fdab7352875

    SHA256

    ecf5bbba25ed7af726313b43b574ca6b2c09ca519b510bfaae94568a0938356a

    SHA512

    fafb74be0cebfcfa2d10f10e10022caebc7ba093d4eac0d025c5961d8fd1b30ff7f7cb6e2c60bfc7cc57ae41f9caf71908dddfbfa3dcfac3cb1f2259612e33c6

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

    Filesize

    11KB

    MD5

    65b8a4f5321ddc5c7a5f4c4a5f2ab3bd

    SHA1

    1a745a09702df3c064ca8c4c658bb9223738415b

    SHA256

    a54b45e9c93fa31683ad4d00f5e0b4fa4c46cccf351899f3f559fa616f69c4d2

    SHA512

    89fded75896a00b68898ad094a1f6a9b4d6f543c2643e8e7541e58f32fd0717a634e77bbc50ddbfa130b676262246d92f69a7616c9bace3c383b3ebc02ed544e

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

    Filesize

    109KB

    MD5

    c7124eae77720cd242ed8a389b32c6af

    SHA1

    57b699ec0aee53c4e9ebad5ca36b1fced44499a1

    SHA256

    4869686f31926f29c04417848a697f1f612269386c9541bf973786fde65c61c2

    SHA512

    13c30d569a84a2d2932324b42d27d6634c4b95db9dea18861431d3216049b435bc1c8fc0a4a6f826006cb26134397d2289e28522876afaa94d9b20e5f0abdd4e

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

    Filesize

    173KB

    MD5

    f3e3da44246863d839a88c6aa0906c6c

    SHA1

    95702d8f587b46a9d128ac47d87e511a5e11c54b

    SHA256

    c230e7ddd284ede09edb2a9bc38ddee086404b07b91753a64b73850ccd346312

    SHA512

    204b10d13d996ed955afa39adb8ce8298484f3f26719900b4a051b28ac77efcdf4ed44c7244a50a096a9e6025ef11da48fd140c186f5315c319e310cee6eab96

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    5d13166c40b6e2dba04ece4af8a22227

    SHA1

    2547c9b6fe589c8e4504c834508efc74ae69e269

    SHA256

    2713a8e8ad9ba40e9bbe146f21d649ffe5d866db9bba17172fd122eaa9230b7e

    SHA512

    5c599185c00a518ebaecfd2199c234a9fb98210c63c9b222151c65936995b681388a32784527b55d85570429704d78db972e03b0f08c777279daa2e0e4aaccc7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4e86afec2d4066c013a1c1dcf26c548f

    SHA1

    dd13d93fbe760451a6a359abb2af01c4edbf337c

    SHA256

    02b83b923f369b268150be817ea2c0ce81cf64cd77284071a7e716e142aece54

    SHA512

    4c8d69bed5fd4bcd84cec59d7ac9546259ce4fd8b9c2c02cfc16e9e7451836fe55639f6c4692f8b05d21e16aee75551cfbf4c39914fa2ed81d0e71feded0ac02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    728fff9cfc5494cd2710c12c1be563d5

    SHA1

    d0861705c26bacf1a76b3346ea68c2bf81f8b4be

    SHA256

    e2863ee90afde03e525c4729bf397f165d805649e5c8a63c4046c54e7822e5be

    SHA512

    bbceef354b5069f3eb3a45b2662717214f8993976caeaa4583cd4bb878e3f517f2e9091d1d934f1e3cc2b562da281f465d7cf3b9e46912a9e5ad636f7aa657cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    13ce041dd53c8749f9e003d2767c0225

    SHA1

    a51b5c276e28f68474839ce18bc04c223342fc50

    SHA256

    342948a78b56ae50ba63b34087961a9183c593b4545979cd991449a0d7a87cab

    SHA512

    aff5ee313edfdee1a074f7b0e5a9cbeb5ef6362dd516c8712527ffa532e12c6d00086b07ccb760c0a7623bd3a7c577757cbcb25a1812af1519def56e8ab04cb2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a13f85759ef7615e9e01883bfdce4420

    SHA1

    3bfed13b0a0014d0fcf60bda28de023979487648

    SHA256

    432c106d5b3ca420fb5b1e845586a540f3a11cf5b4dd8a98a3362b94d5097153

    SHA512

    ee101dec714829d97c0eca2a5088a2dc184b937c9ce8e000e7a59bab8ef3445a76c90cef9abf8acc17d7e8b925892c2cabbe4b35e693a5f12a31435260542661

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d85ca0caa52aeb282d90941c0f9d2000

    SHA1

    7f296a14ba42b89ad0a49116927d9e0317cbaa60

    SHA256

    229a780ddd2a878ffcbd1acb7be70c9ddf454aba6052089d83d686414a482a3c

    SHA512

    80da979ea63b546387de85116eb0a3e9f50699962bf224794b015ece2caae620f5fef3e3310fe62ae7209afb9a77f647afdfe47288fd2b074f40615674cb2185

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    05354d6b87c7bf26c10e2cb2dd64cbdf

    SHA1

    45e93aedc7291b9cdfed415303cba16e48a7f484

    SHA256

    41efecb3fe32751a634b3599b8d9c15bdf9e935c2e341cb6eae1f77023f366fc

    SHA512

    8161497bae89be3f2eb213d896e3d0d8df992732e1b047f1d38a4fe00e3667199f8c993a36e25794ce95cc477bd30ddff2d67b3ebcfbe11cfa6e46183320ddb0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    244efcdb936624357cddbde73ded1a43

    SHA1

    30d49bebbd5e1d0d9ae8609116f8991cd78bd632

    SHA256

    632a2d33f1098cee0ded93afdc4762d86a67e191f38db1024f7d17f6b0900c9e

    SHA512

    e2b96cd519620b6db6f2d60d763ec9e197709833965c87c20f37f5bc22e42e999f6054bcd38ae41c4a32efdadbd10e3d8ac5c9802702bfba7ab24ab905c64ff5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c114e1c318a99bf22513c78fc37b56d

    SHA1

    f6cfccd35a59d8fe636f2d6f3971cdddb43a4379

    SHA256

    227dbbf0647ca312409a6e94b803196312fde46230a9976efc91697fb419a559

    SHA512

    3c5bb71b8029d6ed41cb01c648aab3e6ddaeeced869fee502b3e330fb15652c71c428510ab4ee0a54c281a7146c054814c185adc6edf178f40930e6c04036433

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    baa7c906ea6748e37d54674bd63a6b97

    SHA1

    603464779e2d8462b6b6892cb63e30c1d8c4bff5

    SHA256

    fbdda43de0ba60b6765ab69d2dd908d6da556ac88e6fed3bb4c6bf1aeb57bca2

    SHA512

    e1c41b7ab6dff348c06bfc60d7795b95fe85cae2c0bcb7262215d9b22b7b123c02489e64920c54c558a316b33cc7ecf60c206284c92bb6af539f8567e6850025

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    c31b4be57762d749d451cafd56a51f07

    SHA1

    9a3b969e63e6ab84c065701a68f9a4ed8c5915ea

    SHA256

    63b0308b05694604d214b7db9a003b64f2fb14748b38fe379da7ada1b0ada7a5

    SHA512

    439ed2476cc33301784f811cbe00c0bc2b57899c9d7ed30f9779a9a6d1759192e69c8c7d6ee06596a761842fefa2eb44dd966c3325861a552efe24572a83ef4f

  • C:\Users\Admin\AppData\Local\Temp\Cab605A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar606C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\xsynhttanrqx.exe

    Filesize

    388KB

    MD5

    2b15e8b996a5e439f4bb7c9e98a2ae0e

    SHA1

    a8dd6a2388e0e75add58a86bc0b72448e969e7c5

    SHA256

    0349b7b5d9d720f8c454b69716f21346967bfff297ac2f6ceec40ce80747054d

    SHA512

    ed6e2b79df27034d2f72230db1b3c83ed1d5acdc6cdae3ce9ce456884f682a18cfe6995b7169cb6c7cca668d662d0e72b6bd971799de5e5e0e280df3d089e1d3

  • memory/880-6153-0x00000000001A0000-0x00000000001A2000-memory.dmp

    Filesize

    8KB

  • memory/2284-6-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2284-30-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2284-2-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2284-4-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2284-16-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2284-19-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2284-20-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2284-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2284-12-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2284-10-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2284-8-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2344-6099-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2344-6152-0x0000000002CA0000-0x0000000002CA2000-memory.dmp

    Filesize

    8KB

  • memory/2344-6156-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2344-6181-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2344-6178-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2344-50-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2344-1101-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2344-51-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2344-1103-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2344-6155-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2344-6146-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2344-1102-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2344-3701-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2344-56-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2344-52-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2344-54-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2792-31-0x0000000000400000-0x00000000004FC000-memory.dmp

    Filesize

    1008KB

  • memory/3032-18-0x0000000000320000-0x0000000000323000-memory.dmp

    Filesize

    12KB

  • memory/3032-0-0x0000000000320000-0x0000000000323000-memory.dmp

    Filesize

    12KB

  • memory/3032-1-0x0000000000320000-0x0000000000323000-memory.dmp

    Filesize

    12KB