Analysis

  • max time kernel
    126s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-10-2024 01:35

General

  • Target

    54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe

  • Size

    313KB

  • MD5

    54c1677a604fe3d1ea9f7e597cc74b1e

  • SHA1

    7710ec4d4067abc33c5f33c68b59c3d9eaeb0693

  • SHA256

    f10e91b83ee6d24a39fa606fe0d99897ef4dad6e3edaa82f610fbb77630f8ea0

  • SHA512

    f2e833d7e211b52b4634ace1f1ade91e9f3df14a881c1e6f3881401eee02076cedec63a6170eb91f17698c866de68404bec752bbcff2960b8d280de4d44bf441

  • SSDEEP

    3072:Kwrtf8H+INt2Q8fUIS7lYwqPF3vXN+h4QYouDwdMGdThD:Ky+eINt2RfU9lYRPF3vU4QYHDwdFdTR

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\# DECRYPT MY FILES #.txt

Family

cerber

Ransom Note
C E R B E R R A N S O M W A R E ######################################################################### Cannot you find the files you need? Is the content of the files that you looked for not readable? It is normal because the files' names, as well as the data in your files have been encrypted. Great!!! You have turned to be a part of a big community #CerberRansomware. ######################################################################### !!! If you are reading this message it means the software !!! "Cerber Ransomware" has been removed from your computer. ######################################################################### What is encryption? ------------------- Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users. To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key. But not only it. It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data. ######################################################################### Everything is clear for me but what should I do? ------------------------------------------------ The first step is reading these instructions to the end. Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you. After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions. It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them. !!! Any attempts to get back your files with the third-party tools can !!! be fatal for your encrypted files. The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files. Finally it will be impossible to decrypt your files. When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly. You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files. ######################################################################### !!! There are several plain steps to restore your files but if you do !!! not follow them we will not be able to help you, and we will not try !!! since you have read this warning already. ######################################################################### For your information the software to decrypt your files (as well as the private key provided together) are paid products. After purchase of the software package you will be able to: 1. decrypt all your files; 2. work with your documents; 3. view your photos and other media; 4. continue your usual and comfortable work at the computer. If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files. ######################################################################### There is a list of temporary addresses to go on your personal page below: _______________________________________________________________________ | | 1. http://cerberhhyed5frqa.6oifgr.win/4D3B-702C-DEB0-0291-2B39 | | 2. http://cerberhhyed5frqa.xo59ok.win/4D3B-702C-DEB0-0291-2B39 | | 3. http://cerberhhyed5frqa.zx34jk.win/4D3B-702C-DEB0-0291-2B39 | | 4. http://cerberhhyed5frqa.rt4e34.win/4D3B-702C-DEB0-0291-2B39 | | 5. http://cerberhhyed5frqa.as13fd.win/4D3B-702C-DEB0-0291-2B39 |_______________________________________________________________________ ######################################################################### What should you do with these addresses? ---------------------------------------- If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it): 1. take a look at the first address (in this case it is http://cerberhhyed5frqa.6oifgr.win/4D3B-702C-DEB0-0291-2B39); 2. select it with the mouse cursor holding the left mouse button and moving the cursor to the right; 3. release the left mouse button and press the right one; 4. select "Copy" in the appeared menu; 5. run your Internet browser (if you do not know what it is run the Internet Explorer); 6. move the mouse cursor to the address bar of the browser (this is the place where the site address is written); 7. click the right mouse button in the field where the site address is written; 8. select the button "Insert" in the appeared menu; 9. then you will see the address http://cerberhhyed5frqa.6oifgr.win/4D3B-702C-DEB0-0291-2B39 appeared there; 10. press ENTER; 11. the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling. If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions. If you browse the instructions in HTML format: 1. click the left mouse button on the first address (in this case it is http://cerberhhyed5frqa.6oifgr.win/4D3B-702C-DEB0-0291-2B39); 2. in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address. If for some reason the site cannot be opened check the connection to the Internet. ######################################################################### Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products. Unlike them we are ready to help you always. If you need our help but the temporary sites are not available: 1. run your Internet browser (if you do not know what it is run the Internet Explorer); 2. enter or copy the address https://www.torproject.org/download/download-easy.html.en into the address bar of your browser and press ENTER; 3. wait for the site loading; 4. on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed; 5. run Tor Browser; 6. connect with the button "Connect" (if you use the English version); 7. a normal Internet browser window will be opened after the initialization; 8. type or copy the address ________________________________________________________ | | | http://cerberhhyed5frqa.onion/4D3B-702C-DEB0-0291-2B39 | |________________________________________________________| in this browser address bar; 9. press ENTER; 10. the site should be loaded; if for some reason the site is not loading wait for a moment and try again. If you have any problems during installation or operation of Tor Browser, please, visit https://www.youtube.com/ and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation. If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files. ######################################################################### Additional information: You will find the instructions for restoring your files in those folders where you have your encrypted files only. The instructions are made in two file formats - HTML and TXT for your convenience. Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files. The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company. ######################################################################### Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data. The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection. Together we make the Internet a better and safer place. ######################################################################### If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support. ######################################################################### Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.
URLs

http://cerberhhyed5frqa.6oifgr.win/4D3B-702C-DEB0-0291-2B39

http://cerberhhyed5frqa.xo59ok.win/4D3B-702C-DEB0-0291-2B39

http://cerberhhyed5frqa.zx34jk.win/4D3B-702C-DEB0-0291-2B39

http://cerberhhyed5frqa.rt4e34.win/4D3B-702C-DEB0-0291-2B39

http://cerberhhyed5frqa.as13fd.win/4D3B-702C-DEB0-0291-2B39

http://cerberhhyed5frqa.onion/4D3B-702C-DEB0-0291-2B39

Extracted

Path

C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\# DECRYPT MY FILES #.html

Ransom Note
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <title>&#067;erber Ransomware</title> <style> a { color: #47c; text-decoration: none; } a:hover { text-decoration: underline; } body { background-color: #e7e7e7; color: #333; font-family: "Helvetica Neue", Helvetica, "Segoe UI", Arial, freesans, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 16px; line-height: 1.6; margin: 0; padding: 0; } hr { background-color: #e7e7e7; border: 0 none; border-bottom: 1px solid #c7c7c7; height: 5px; margin: 30px 0; } li { padding: 0 0 7px 7px; } ol { padding-left: 3em; } .container { background-color: #fff; border: 1px solid #c7c7c7; margin: 40px; padding: 40px 40px 20px 40px; } .info, .tor { background-color: #efe; border: 1px solid #bda; display: block; padding: 0px 20px; } .logo { font-size: 12px; font-weight: bold; line-height: 1; margin: 0; } .tor { padding: 10px 0; text-align: center; } .warning { background-color: #f5e7e7; border: 1px solid #ebccd1; color: #a44; display: block; padding: 15px 10px; text-align: center; } </style> </head> <body> <div class="container"> <h3>C E R B E R&nbsp;&nbsp;&nbsp;R A N S O M W A R E</h3> <hr> <p>Cannot you find the files you need?<br>Is the content of the files that you looked for not readable?</p> <p>It is normal because the files' names, as well as the data in your files have been encrypted.</p> <p>Great!!!<br>You have turned to be a part of a big community #CerberRansomware.</p> <hr> <p><span class="warning">If you are reading this message it means the software "Cerber Ransomware" has been removed from your computer.</span></p> <hr> <h3>What is encryption?</h3> <p>Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users.</p> <p>To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key.</p> <p>But not only it.</p> <p>It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data.</p> <hr> <h3>Everything is clear for me but what should I do?</h3> <p>The first step is reading these instructions to the end.</p> <p>Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you.</p> <p>After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions.</p> <p>It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them.</p> <p><span class="warning">Any attempts to get back your files with the third-party tools can be fatal for your encrypted files.</span></p> <p>The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files.</p> <p>Finally it will be impossible to decrypt your files.</p> <p>When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly.</p> <p>You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files.</p> <hr> <p><span class="warning">There are several plain steps to restore your files but if you do not follow them we will not be able to help you, and we will not try since you have read this warning already.</span></p> <hr> <p>For your information the software to decrypt your files (as well as the private key provided together) are paid products.</p> <p>After purchase of the software package you will be able to:</p> <ol> <li>decrypt all your files;</li> <li>work with your documents;</li> <li>view your photos and other media;</li> <li>continue your usual and comfortable work at the computer.</li> </ol> <p>If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files.</p> <hr> <div class="info"> <p>There is a list of temporary addresses to go on your personal page below:</p> <ol> <li><a href="http://cerberhhyed5frqa.6oifgr.win/4D3B-702C-DEB0-0291-2B39" target="_blank">http://cerberhhyed5frqa.6oifgr.win/4D3B-702C-DEB0-0291-2B39</a></li> <li><a href="http://cerberhhyed5frqa.xo59ok.win/4D3B-702C-DEB0-0291-2B39" target="_blank">http://cerberhhyed5frqa.xo59ok.win/4D3B-702C-DEB0-0291-2B39</a></li> <li><a href="http://cerberhhyed5frqa.zx34jk.win/4D3B-702C-DEB0-0291-2B39" target="_blank">http://cerberhhyed5frqa.zx34jk.win/4D3B-702C-DEB0-0291-2B39</a></li> <li><a href="http://cerberhhyed5frqa.rt4e34.win/4D3B-702C-DEB0-0291-2B39" target="_blank">http://cerberhhyed5frqa.rt4e34.win/4D3B-702C-DEB0-0291-2B39</a></li> <li><a href="http://cerberhhyed5frqa.as13fd.win/4D3B-702C-DEB0-0291-2B39" target="_blank">http://cerberhhyed5frqa.as13fd.win/4D3B-702C-DEB0-0291-2B39</a></li> </ol> </div> <hr> <h3>What should you do with these addresses?</h3> <p>If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it):</p> <ol> <li>take a look at the first address (in this case it is <a href="http://cerberhhyed5frqa.6oifgr.win/4D3B-702C-DEB0-0291-2B39" target="_blank">http://cerberhhyed5frqa.6oifgr.win/4D3B-702C-DEB0-0291-2B39</a>);</li> <li>select it with the mouse cursor holding the left mouse button and moving the cursor to the right;</li> <li>release the left mouse button and press the right one;</li> <li>select "Copy" in the appeared menu;</li> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>move the mouse cursor to the address bar of the browser (this is the place where the site address is written);</li> <li>click the right mouse button in the field where the site address is written;</li> <li>select the button "Insert" in the appeared menu;</li> <li>then you will see the address <a href="http://cerberhhyed5frqa.6oifgr.win/4D3B-702C-DEB0-0291-2B39" target="_blank">http://cerberhhyed5frqa.6oifgr.win/4D3B-702C-DEB0-0291-2B39</a> appeared there;</li> <li>press ENTER;</li> <li>the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions.</p> <p>If you browse the instructions in HTML format:</p> <ol> <li>click the left mouse button on the first address (in this case it is <a href="http://cerberhhyed5frqa.6oifgr.win/4D3B-702C-DEB0-0291-2B39" target="_blank">http://cerberhhyed5frqa.6oifgr.win/4D3B-702C-DEB0-0291-2B39</a>);</li> <li>in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet.</p> <hr> <p>Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products.</p> <p>Unlike them we are ready to help you always.</p> <p>If you need our help but the temporary sites are not available:</p> <ol> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>enter or copy the address <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> into the address bar of your browser and press ENTER;</li> <li>wait for the site loading;</li> <li>on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed;</li> <li>run Tor Browser;</li> <li>connect with the button "Connect" (if you use the English version);</li> <li>a normal Internet browser window will be opened after the initialization;</li> <li>type or copy the address <span class="tor">http://cerberhhyed5frqa.onion/4D3B-702C-DEB0-0291-2B39</span> in this browser address bar;</li> <li>press ENTER;</li> <li>the site should be loaded; if for some reason the site is not loading wait for a moment and try again.</li> </ol> <p>If you have any problems during installation or operation of Tor Browser, please, visit <a href="https://www.youtube.com/results?search_query=install+tor+browser+windows" target="_blank">https://www.youtube.com/</a> and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation.</p> <p>If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files.</p> <hr> <h3>Additional information:</h3> <p>You will find the instructions for restoring your files in those folders where you have your encrypted files only.</p> <p>The instructions are made in two file formats - HTML and TXT for your convenience.</p> <p>Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files.</p> <p>The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company.</p> <hr> <p>Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data.</p> <p>The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection.</p> <p>Together we make the Internet a better and safer place.</p> <hr> <p>If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support.</p> <hr> <p>Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.</p> </div> </body> </html>

Signatures

  • Cerber

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Contacts a large (16390) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 61 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 51 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\rdrleakdiag.exe
      "C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\rdrleakdiag.exe"
      2⤵
      • Adds policy Run key to start application
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Sets desktop wallpaper using registry
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2812
      • C:\Windows\system32\vssadmin.exe
        "C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:2796
      • C:\Windows\system32\wbem\wmic.exe
        "C:\Windows\system32\wbem\wmic.exe" shadowcopy delete
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1652
      • C:\Windows\System32\bcdedit.exe
        "C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:1948
      • C:\Windows\System32\bcdedit.exe
        "C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:668
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3652
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3652 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3728
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3652 CREDAT:537601 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3840
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt
        3⤵
          PID:3664
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"
          3⤵
            PID:4004
          • C:\Windows\system32\cmd.exe
            /d /c taskkill /t /f /im "rdrleakdiag.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\rdrleakdiag.exe" > NUL
            3⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Suspicious use of WriteProcessMemory
            PID:2512
            • C:\Windows\system32\taskkill.exe
              taskkill /t /f /im "rdrleakdiag.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2420
            • C:\Windows\system32\PING.EXE
              ping -n 1 127.0.0.1
              4⤵
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:1608
        • C:\Windows\SysWOW64\cmd.exe
          /d /c taskkill /t /f /im "54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe" > NUL
          2⤵
          • Deletes itself
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:2664
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /t /f /im "54c1677a604fe3d1ea9f7e597cc74b1e_JaffaCakes118.exe"
            3⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2816
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 1 127.0.0.1
            3⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:1748
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2544
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3744
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3744 CREDAT:275457 /prefetch:2
          2⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3860
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
        1⤵
        • System Location Discovery: System Language Discovery
        PID:4088
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x500
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:788

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\# DECRYPT MY FILES #.html

        Filesize

        12KB

        MD5

        4a03c4c6893cc22e4a094f1b5789efb3

        SHA1

        614b7a09c269263bbbe09f0f1c53e4e72a6e8f79

        SHA256

        bc123431093c0e9459911757c5f4c01f0f4be38fe34ccd26e3a13c5facf060c4

        SHA512

        23a79af08f243490c6e0645c28a65e160507e2e84859def40d69e438482763b2b6a0fe70c66d21c89d568c10d47afbf75270216f3bfadb57123e07bf40e8341a

      • C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\# DECRYPT MY FILES #.txt

        Filesize

        10KB

        MD5

        dbd4a9d19eb7bb9d54500f3e01423036

        SHA1

        9b832c3cd08fd36c87b0176fab316ff61ceef5ff

        SHA256

        eff4e023cb72ff9c06dac8b0f07e776825e2371b11954f0e70ac7f63bc8b6e25

        SHA512

        c1db21097553abb734ceb4638a21ed0b482ff572be5a5d58cf26a9a931934af096a03edc2d8454459ff4318afc20398fd760c8a80dca042808f35f6bfd74bc09

      • C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\# DECRYPT MY FILES #.url

        Filesize

        85B

        MD5

        76b9d65813a15e6fdb5103fc2a5ade93

        SHA1

        77ff7f6888d2696793fb811d6abe53817da7e6e8

        SHA256

        92df3bb3c0159d2109252dc10848c0914d6244f8cb72edbae85434a155b58557

        SHA512

        26601304a3e9616dad019f991fac55ea628c8534bb5f5c7d9a3675d9aaa9e45ad944bb48c2c5cf1c2101e8ada72174a7ae3d05d5d9b71cd4fca528d27f9099df

      • C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\# DECRYPT MY FILES #.vbs

        Filesize

        216B

        MD5

        48ac29422570636cae371b68c858b988

        SHA1

        ff86dea198c93a8ae49ee52c6eb919fcbd259aab

        SHA256

        3926b08f205999c2f1a24121117ecfeed31557bf6f0529416f3432321292c6b0

        SHA512

        75019e6fd4b53528aab1af668149540e1bc372e58e4786eda1da75e7c9718dbc274cbf3f37cd38fbe7e618ea9c1b24c2534d18aecfcc3264ec55f83f206faaa3

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        f500808f9a708ddae2ec762269c62988

        SHA1

        66ddf23cf333c77a605ae464b459b2000fd08760

        SHA256

        7f4883c095a4a6c08c935429bca21ac21ce1309a6438ea4200a34aa25acfc5b6

        SHA512

        915165412bee91bd48ff98080c5ebcad8df5415eec80884d7088cab9354dacf3ecb24f3f8892ceb2c207bb63b1a337b0d9f9c2af8b3bb225a5e5b9ad5cf21cb6

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        97b69c2cb49a1ebe08c0057c82e3c49a

        SHA1

        207b9cd6aa544128ca8dc7bcf34558def270e281

        SHA256

        213762d2ff5d04aeeb21404c90c45a1e3bbd0c8566e5e6925ffb59f7ef6cd3e3

        SHA512

        c62e8cfe6634a95cb76e39aafebba1f34486f8dd32bc0e9c72cc560567dd5b5346fbec851e4bcf5dcd1ece5ab7352fd97e8ff6dfe58ae9163847596efcadc4d0

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        45a3d71976258644e6c6216e1357196c

        SHA1

        d9f6cf004ab34d3fcee25c183dc78f70f9af3dd8

        SHA256

        c4cbb7f757e47f006a2130d33ba6ddb3b395acc363922a8883d2ff17aaa12c10

        SHA512

        fc9e0a3042cf20c349f282370e4af7c1299316690d8cf296875f85596017422feb8a46bfbc0e6dc33b90e4eb1547da0c194e6680d38eb78da425cb0e6b8a803e

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        0a87b8622734d173349cf7ba3dad28a9

        SHA1

        2ba61b26307c1afb14333b202e29afb11c68a932

        SHA256

        406c6287a3a3c073154161160abd60e78b6800bf381edaf7653be2bbc789adc3

        SHA512

        591d8adf8f5f052692f62d3124cf8326db9bf0aa4dff3fe29983ab14a3bb3f5bc6f24f13833bedcfa7df85a365250040b76bd3d61c6dbd2d8b43621e1bb0d58d

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        1a8978cdc31a3cd81aff015ef11688da

        SHA1

        232d800d081c5c6bcf5fb815f228b97243b74657

        SHA256

        75c367f10202140e74e3b003973d7704eaa9a3eab13c7da6284da83d3ab1bea4

        SHA512

        3cbc8e07a9f2c0604c1a09823aaf743f9b30665a9a7a8e7f8a6b0b50bcf2d44cc8df92286f3ab09fac9b7d18176b20acd15de6caec9b3b32d81a3dae5e2cbcc1

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        e5310d34df0fec03fc41c1d683f28f73

        SHA1

        18c6e02b7627637f550e5766abed4acb20b3d545

        SHA256

        d36be20953255209011a05e97e38a3517306a0053a616883760bfbe9799a26d5

        SHA512

        e7155d9b89da87564a8f87906490806b47c66b96465a3ffd4ded5bbf73c671c1e6bcc632894396701f2fdf8b03a47db1a5bb179ecc1683427be0e58bcd5b9e88

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        502f7ded83796c5794290d0615448c3e

        SHA1

        b9f2caf91fcfb248777ba1975d4dd90fb7d037ff

        SHA256

        734b1fcde26d27aa65d4bd560f9950ba62ed47ebd7ac93a95c6423adf2e7dc21

        SHA512

        10619fd0232b1b2ff777970c66490f67549d112bfd20c38c8f9412c1c8683a844b783f33afac23a107004b19c1cea13b26def5928b8a0f60c0f4d5d6778528aa

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        f66f5b6dea33fb404bb9303f8d70e074

        SHA1

        700136c0dec8e9b84a8887acf83e2513fae3d204

        SHA256

        01f8206660fc71cfd312d76611fa0f95af34dbd72e041da369e8fc4316202138

        SHA512

        61be56a52feb3ab9bbe3da413abf1fd6a8bd09ffe9128637ff41617c20df987e1f6008029554f064c3270c81c768d31bd27157a39502dd4a3958f04981674510

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        9dae3d3dbb23a3fbe344d5b6c40f52c5

        SHA1

        0fc063c36c5c9d5d755a181148316ac46d9edddf

        SHA256

        28bb55112487bca05b7f65a954c4d613b3c326027103e73fcad9512c820faa22

        SHA512

        4d51d3b02b00b22c418789c06b90964416ee4af6382dc75a90e8b9362c6b32150ae0f18cd7e0fe303b9622d456f1d0986984f532ca8fedd21e2bc9f3e26fc298

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        8d4f9f0f2e6cf0deb34c0fcfb1b4a655

        SHA1

        7d512059e3e545101762b014393bc78f8ea1044a

        SHA256

        e31e69c9edfd98a8122767a77e6fad5364d73203dfb493ea703a2861f07a6017

        SHA512

        ccf0f130517e5fe26ec1427f1cc273d970412941b22e0cfb33bf6109aa5b613fa1589dacc9d0c01f205b4a0cec6f62d2341fb8b7f34e2f67d9acc83a3e28eb16

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        e2dcf6a3615f82817491124a16053f80

        SHA1

        48da9760ea4d593d7b6b2db6292433ec3621fa0d

        SHA256

        563379129767fac008f6feb410269d810ee1afce49d984c8601452671653f0b9

        SHA512

        3edabdbe00c8a89f828e1b4436ec365bbe8bce234ce37128694f8f77fe94a150c74f3da8ff4d0d09026cd907c677f172a309be9149ca4f96259ed46f236684a0

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        25b1d11c8b169240c8245bc1003f3dc7

        SHA1

        82e25f1eab34073ebb17a6f75c8ba4b5c9043626

        SHA256

        eac931f37883fdea3fc7e6bb7b2dcd04370d482a68698b871b3a9c4d4e523dc0

        SHA512

        bdcdaa5cb8b11488cab4a29c3cf6a157737d85dd4163c21268d6df33fd8c65ea00f5c398cfad3950860c526081e1f7c28d726b1225a8db927c49e10e55dd6ea0

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        36a22ebb51cd279cc6aebf24ddaa2e4e

        SHA1

        a19480ba4a7f64a2cbf898fcd3e70b10683a3cb7

        SHA256

        d3a577fdb559e1e2cf9cd3542330340244e767b5cd056d7710935715484b2104

        SHA512

        4832bf2d9b0fee02f2152c1f6066f89f36b9d46a4a64bdd5d9da0a4c21efe6d92d8f06aa67312dd96331fe07c18b7caa951e06dde45a8a3362bc8971d0780b28

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        6db26b05b0009c5530d8254ea9789656

        SHA1

        06e9358d5d30f5a32e1526af44d8bf5ff1256a35

        SHA256

        1cbaca35dac0b0ed4498c23e3dbc7f8ef04b544b1f0b6f8265599c49cdba423c

        SHA512

        38e0002f2ccb4a4aca99fc9a203d6a789547bb9d77ec61617bce66528689d9f2a7cb9d6a77a4a21bce166b8a56ba8ecd9a3a696d7f4e4f9bfa62394838d5efca

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        9bf85cee2fd6e741d8260d7ee12f7e73

        SHA1

        b3080007324fbc2952c05459eb987e8726e8cc07

        SHA256

        4f27ae7bcf079450942463e4d10a66a7043bf5ac7da5666a4e4f58270b3fe1c7

        SHA512

        60b95d298d86bb32a2cbdf49f6cbcd58c4da9755dd1f1fa2db12d1047ddfb9074c7a5f983ffcc74faea88af112a0aa3937031ae3fa997a67e9a58d7617f4481b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        4b637aa27bfb0933e6d089a6a0158a2e

        SHA1

        765decf75f0a9d83c4750b01ca9506ecd2fd7b7e

        SHA256

        d941b73fedeac95c0b7e6d31378463431eebcce92c9be95f5ad14e3428188d6d

        SHA512

        ecb8b44d405020f40457efc8f03e59bd9cca5c453236d2fc98fbc22485f2a6ae622d9baa49248649d6bdfa825eaf6a8ebaf020e71fc9315821a0cc47c5516aad

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        3a0c8b3cb33eb40552cc11f26aa5f011

        SHA1

        5a436885e06aa47d0ebbbff6ae5cc9a90bf0f523

        SHA256

        baa3996fe37929a5fad8bb1b4ad4e91890c97eaa772d0eae4b571d8e4fba6058

        SHA512

        50840189526d72547819994989f08e66f98cf711ba434ffb0bb9ea993515781fad820a6985aad922c4301f7c324ada75eaad34b493f488d3496f4ad32e305421

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        ade437c05ad4bfa8f58e8ae96ac8a1b7

        SHA1

        be8fd16683fd1560dfc1dd6a4a90266b084312d5

        SHA256

        a89448a3607c48ff938e6eb6ac10646b5c34949befa84735451850f5db5fe085

        SHA512

        469f652631a25539442398d93329e8d10f8c28fb9b7eabaaf62d1c5dfde8b956f4dbc039d55e7552a53117faea41f0c143fea6357d4e30bcbec89a441d3010bf

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        4c6c3e4a8d4c4aefc55d2744b3d48dd7

        SHA1

        1fb7358d2425d991d8796339258c04996c4be902

        SHA256

        3ad3e3ddf822a8495877060c2188eb061ce714e95f06a6eb33e78a8638374326

        SHA512

        e3fef59979576a32f40df098631c36532dd8824001505fd8be5c7490c09c21232fef281b426933da115349ce12b8c768e956f9f7141f211862d7d54bcb963b12

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{6C5C6441-8CF1-11EF-90A9-D60C98DC526F}.dat

        Filesize

        5KB

        MD5

        519a26eed0fedc5cd217b52d2e3a8081

        SHA1

        3b68032fcba9f5f0c335b9bdbe55af77031fe2c5

        SHA256

        55662edd2b68ff01c7b0d7a5fcf17feea7bdc65d302b75be48c5627c2aae72f2

        SHA512

        013ffa58f8388fa429d4ca34cba69ddc32d6c1cdb2375437723f408631380a12a11b0249d3c0bd0b1f6ebfea8f4a89e97a326334ea17830f730d6bfa8b6a2842

      • C:\Users\Admin\AppData\Local\Temp\CabFBB0.tmp

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\Local\Temp\TarFC20.tmp

        Filesize

        181KB

        MD5

        4ea6026cf93ec6338144661bf1202cd1

        SHA1

        a1dec9044f750ad887935a01430bf49322fbdcb7

        SHA256

        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

        SHA512

        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\rdrleakdiag.lnk

        Filesize

        1KB

        MD5

        d770d781d0b277931d2cb4b3f18ba60d

        SHA1

        c6c1c9ca25fd5192d2431af1e883bef9a876daec

        SHA256

        c675747a91f4bb03d4f37819e4491c6745a8e2606eebd654c68cb05a240e2e0b

        SHA512

        9cf9044725040db554804628a6f44664a31a9fe67ed7b7da46b1df9f61d502166798619e82e8c77e2db406094e0be5424c774fa84859a3066924ca58783bea2e

      • \Users\Admin\AppData\Roaming\{0FB3C083-DBC2-04E3-36AB-7D13DD964B1E}\rdrleakdiag.exe

        Filesize

        313KB

        MD5

        54c1677a604fe3d1ea9f7e597cc74b1e

        SHA1

        7710ec4d4067abc33c5f33c68b59c3d9eaeb0693

        SHA256

        f10e91b83ee6d24a39fa606fe0d99897ef4dad6e3edaa82f610fbb77630f8ea0

        SHA512

        f2e833d7e211b52b4634ace1f1ade91e9f3df14a881c1e6f3881401eee02076cedec63a6170eb91f17698c866de68404bec752bbcff2960b8d280de4d44bf441

      • memory/2068-1-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/2068-2-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/2068-15-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/2068-0-0x0000000000230000-0x000000000024E000-memory.dmp

        Filesize

        120KB

      • memory/2812-484-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/2812-506-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/2812-497-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/2812-500-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/2812-491-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/2812-493-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/2812-489-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/2812-32-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/2812-39-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/2812-43-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/2812-502-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/2812-524-0x0000000003EA0000-0x0000000003EA2000-memory.dmp

        Filesize

        8KB

      • memory/2812-511-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/2812-965-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/2812-515-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/2812-22-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/2812-21-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/2812-20-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/2812-513-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/2812-509-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/2812-13-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/2812-507-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/2812-503-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/2812-487-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB