Analysis

  • max time kernel
    128s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21-10-2024 09:41

General

  • Target

    6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe

  • Size

    392KB

  • MD5

    6653ef20d2a3a6ef656d9c886ebabd93

  • SHA1

    bb0cc0b05bb70a3d347faa94fb36a35c771b0692

  • SHA256

    48ff838a7fe98ec2c5bb59a8a76100047abcfa6db824f4982b8e7fdf2110f05d

  • SHA512

    b68b37147ce0d1389d62f5f72ebb616edc7d2ed2aaa484e85f6dc4b6070c9ce973a523e11e311686dc0efb0757fe52dcfa430afb1f48f98ecfdc257c6f3cc360

  • SSDEEP

    3072:viHZTdn6oWzjNtxPPnGau7GMuOYHAifZEeKPi6u7KzrN7ivE5oY4KppRsqYaefiU:QZqPtvGauSM4HAifkGOzrN+HKkalM

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt

Family

cerber

Ransom Note
C E R B E R R A N S O M W A R E ######################################################################### Cannot you find the files you need? Is the content of the files that you looked for not readable? It is normal because the files' names, as well as the data in your files have been encrypted. Great!!! You have turned to be a part of a big community #Cerber_Ransomware. ######################################################################### !!! If you are reading this message it means the software !!! "Cerber Ransomware" has been removed from your computer. ######################################################################### What is encryption? ------------------- Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users. To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key. But not only it. It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data. ######################################################################### Everything is clear for me but what should I do? ------------------------------------------------ The first step is reading these instructions to the end. Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you. After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions. It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them. !!! Any attempts to get back your files with the third-party tools can !!! be fatal for your encrypted files. The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files. Finally it will be impossible to decrypt your files. When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly. You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files. ######################################################################### !!! There are several plain steps to restore your files but if you do !!! not follow them we will not be able to help you, and we will not try !!! since you have read this warning already. ######################################################################### For your information the software to decrypt your files (as well as the private key provided together) are paid products. After purchase of the software package you will be able to: 1. decrypt all your files; 2. work with your documents; 3. view your photos and other media; 4. continue your usual and comfortable work at the computer. If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files. ######################################################################### There is a list of temporary addresses to go on your personal page below: _______________________________________________________________________ | | 1. http://cerberhhyed5frqa.xlfp45.win/2A01-D4E3-782D-0291-9A56 | | 2. http://cerberhhyed5frqa.slr849.win/2A01-D4E3-782D-0291-9A56 | | 3. http://cerberhhyed5frqa.ret5kr.win/2A01-D4E3-782D-0291-9A56 | | 4. http://cerberhhyed5frqa.zgf48j.win/2A01-D4E3-782D-0291-9A56 | | 5. http://cerberhhyed5frqa.xltnet.win/2A01-D4E3-782D-0291-9A56 |_______________________________________________________________________ ######################################################################### What should you do with these addresses? ---------------------------------------- If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it): 1. take a look at the first address (in this case it is http://cerberhhyed5frqa.xlfp45.win/2A01-D4E3-782D-0291-9A56); 2. select it with the mouse cursor holding the left mouse button and moving the cursor to the right; 3. release the left mouse button and press the right one; 4. select "Copy" in the appeared menu; 5. run your Internet browser (if you do not know what it is run the Internet Explorer); 6. move the mouse cursor to the address bar of the browser (this is the place where the site address is written); 7. click the right mouse button in the field where the site address is written; 8. select the button "Insert" in the appeared menu; 9. then you will see the address http://cerberhhyed5frqa.xlfp45.win/2A01-D4E3-782D-0291-9A56 appeared there; 10. press ENTER; 11. the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling. If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions. If you browse the instructions in HTML format: 1. click the left mouse button on the first address (in this case it is http://cerberhhyed5frqa.xlfp45.win/2A01-D4E3-782D-0291-9A56); 2. in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address. If for some reason the site cannot be opened check the connection to the Internet. ######################################################################### Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products. Unlike them we are ready to help you always. If you need our help but the temporary sites are not available: 1. run your Internet browser (if you do not know what it is run the Internet Explorer); 2. enter or copy the address https://www.torproject.org/download/download-easy.html.en into the address bar of your browser and press ENTER; 3. wait for the site loading; 4. on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed; 5. run Tor Browser; 6. connect with the button "Connect" (if you use the English version); 7. a normal Internet browser window will be opened after the initialization; 8. type or copy the address ________________________________________________________ | | | http://cerberhhyed5frqa.onion/2A01-D4E3-782D-0291-9A56 | |________________________________________________________| in this browser address bar; 9. press ENTER; 10. the site should be loaded; if for some reason the site is not loading wait for a moment and try again. If you have any problems during installation or operation of Tor Browser, please, visit https://www.youtube.com/ and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation. If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files. ######################################################################### Additional information: You will find the instructions for restoring your files in those folders where you have your encrypted files only. The instructions are made in two file formats - HTML and TXT for your convenience. Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files. The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company. ######################################################################### Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data. The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection. Together we make the Internet a better and safer place. ######################################################################### If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support. ######################################################################### Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.
URLs

http://cerberhhyed5frqa.xlfp45.win/2A01-D4E3-782D-0291-9A56

http://cerberhhyed5frqa.slr849.win/2A01-D4E3-782D-0291-9A56

http://cerberhhyed5frqa.ret5kr.win/2A01-D4E3-782D-0291-9A56

http://cerberhhyed5frqa.zgf48j.win/2A01-D4E3-782D-0291-9A56

http://cerberhhyed5frqa.xltnet.win/2A01-D4E3-782D-0291-9A56

http://cerberhhyed5frqa.onion/2A01-D4E3-782D-0291-9A56

Extracted

Path

C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html

Ransom Note
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <title>&#067;erber Ransomware</title> <style> a { color: #47c; text-decoration: none; } a:hover { text-decoration: underline; } body { background-color: #e7e7e7; color: #333; font-family: "Helvetica Neue", Helvetica, "Segoe UI", Arial, freesans, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 16px; line-height: 1.6; margin: 0; padding: 0; } hr { background-color: #e7e7e7; border: 0 none; border-bottom: 1px solid #c7c7c7; height: 5px; margin: 30px 0; } li { padding: 0 0 7px 7px; } ol { padding-left: 3em; } .container { background-color: #fff; border: 1px solid #c7c7c7; margin: 40px; padding: 40px 40px 20px 40px; } .info, .tor { background-color: #efe; border: 1px solid #bda; display: block; padding: 0px 20px; } .logo { font-size: 12px; font-weight: bold; line-height: 1; margin: 0; } .tor { padding: 10px 0; text-align: center; } .warning { background-color: #f5e7e7; border: 1px solid #ebccd1; color: #a44; display: block; padding: 15px 10px; text-align: center; } </style> </head> <body> <div class="container"> <h3>C E R B E R&nbsp;&nbsp;&nbsp;R A N S O M W A R E</h3> <hr> <p>Cannot you find the files you need?<br>Is the content of the files that you looked for not readable?</p> <p>It is normal because the files' names, as well as the data in your files have been encrypted.</p> <p>Great!!!<br>You have turned to be a part of a big community #Cerber_Ransomware.</p> <hr> <p><span class="warning">If you are reading this message it means the software "Cerber Ransomware" has been removed from your computer.</span></p> <hr> <h3>What is encryption?</h3> <p>Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users.</p> <p>To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key.</p> <p>But not only it.</p> <p>It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data.</p> <hr> <h3>Everything is clear for me but what should I do?</h3> <p>The first step is reading these instructions to the end.</p> <p>Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you.</p> <p>After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions.</p> <p>It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them.</p> <p><span class="warning">Any attempts to get back your files with the third-party tools can be fatal for your encrypted files.</span></p> <p>The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files.</p> <p>Finally it will be impossible to decrypt your files.</p> <p>When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly.</p> <p>You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files.</p> <hr> <p><span class="warning">There are several plain steps to restore your files but if you do not follow them we will not be able to help you, and we will not try since you have read this warning already.</span></p> <hr> <p>For your information the software to decrypt your files (as well as the private key provided together) are paid products.</p> <p>After purchase of the software package you will be able to:</p> <ol> <li>decrypt all your files;</li> <li>work with your documents;</li> <li>view your photos and other media;</li> <li>continue your usual and comfortable work at the computer.</li> </ol> <p>If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files.</p> <hr> <div class="info"> <p>There is a list of temporary addresses to go on your personal page below:</p> <ol> <li><a href="http://cerberhhyed5frqa.xlfp45.win/2A01-D4E3-782D-0291-9A56" target="_blank">http://cerberhhyed5frqa.xlfp45.win/2A01-D4E3-782D-0291-9A56</a></li> <li><a href="http://cerberhhyed5frqa.slr849.win/2A01-D4E3-782D-0291-9A56" target="_blank">http://cerberhhyed5frqa.slr849.win/2A01-D4E3-782D-0291-9A56</a></li> <li><a href="http://cerberhhyed5frqa.ret5kr.win/2A01-D4E3-782D-0291-9A56" target="_blank">http://cerberhhyed5frqa.ret5kr.win/2A01-D4E3-782D-0291-9A56</a></li> <li><a href="http://cerberhhyed5frqa.zgf48j.win/2A01-D4E3-782D-0291-9A56" target="_blank">http://cerberhhyed5frqa.zgf48j.win/2A01-D4E3-782D-0291-9A56</a></li> <li><a href="http://cerberhhyed5frqa.xltnet.win/2A01-D4E3-782D-0291-9A56" target="_blank">http://cerberhhyed5frqa.xltnet.win/2A01-D4E3-782D-0291-9A56</a></li> </ol> </div> <hr> <h3>What should you do with these addresses?</h3> <p>If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it):</p> <ol> <li>take a look at the first address (in this case it is <a href="http://cerberhhyed5frqa.xlfp45.win/2A01-D4E3-782D-0291-9A56" target="_blank">http://cerberhhyed5frqa.xlfp45.win/2A01-D4E3-782D-0291-9A56</a>);</li> <li>select it with the mouse cursor holding the left mouse button and moving the cursor to the right;</li> <li>release the left mouse button and press the right one;</li> <li>select "Copy" in the appeared menu;</li> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>move the mouse cursor to the address bar of the browser (this is the place where the site address is written);</li> <li>click the right mouse button in the field where the site address is written;</li> <li>select the button "Insert" in the appeared menu;</li> <li>then you will see the address <a href="http://cerberhhyed5frqa.xlfp45.win/2A01-D4E3-782D-0291-9A56" target="_blank">http://cerberhhyed5frqa.xlfp45.win/2A01-D4E3-782D-0291-9A56</a> appeared there;</li> <li>press ENTER;</li> <li>the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions.</p> <p>If you browse the instructions in HTML format:</p> <ol> <li>click the left mouse button on the first address (in this case it is <a href="http://cerberhhyed5frqa.xlfp45.win/2A01-D4E3-782D-0291-9A56" target="_blank">http://cerberhhyed5frqa.xlfp45.win/2A01-D4E3-782D-0291-9A56</a>);</li> <li>in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet.</p> <hr> <p>Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products.</p> <p>Unlike them we are ready to help you always.</p> <p>If you need our help but the temporary sites are not available:</p> <ol> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>enter or copy the address <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> into the address bar of your browser and press ENTER;</li> <li>wait for the site loading;</li> <li>on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed;</li> <li>run Tor Browser;</li> <li>connect with the button "Connect" (if you use the English version);</li> <li>a normal Internet browser window will be opened after the initialization;</li> <li>type or copy the address <span class="tor">http://cerberhhyed5frqa.onion/2A01-D4E3-782D-0291-9A56</span> in this browser address bar;</li> <li>press ENTER;</li> <li>the site should be loaded; if for some reason the site is not loading wait for a moment and try again.</li> </ol> <p>If you have any problems during installation or operation of Tor Browser, please, visit <a href="https://www.youtube.com/results?search_query=install+tor+browser+windows" target="_blank">https://www.youtube.com/</a> and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation.</p> <p>If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files.</p> <hr> <h3>Additional information:</h3> <p>You will find the instructions for restoring your files in those folders where you have your encrypted files only.</p> <p>The instructions are made in two file formats - HTML and TXT for your convenience.</p> <p>Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files.</p> <p>The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company.</p> <hr> <p>Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data.</p> <p>The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection.</p> <p>Together we make the Internet a better and safer place.</p> <hr> <p>If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support.</p> <hr> <p>Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.</p> </div> </body> </html>

Signatures

  • Cerber

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Contacts a large (16389) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 61 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 47 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Users\Admin\AppData\Roaming\{E7F19A57-C953-7B64-1413-296E95479BC0}\waitfor.exe
      "C:\Users\Admin\AppData\Roaming\{E7F19A57-C953-7B64-1413-296E95479BC0}\waitfor.exe"
      2⤵
      • Adds policy Run key to start application
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Sets desktop wallpaper using registry
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:980
      • C:\Windows\system32\vssadmin.exe
        "C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:2416
      • C:\Windows\system32\wbem\wmic.exe
        "C:\Windows\system32\wbem\wmic.exe" shadowcopy delete
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2336
      • C:\Windows\System32\bcdedit.exe
        "C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:1636
      • C:\Windows\System32\bcdedit.exe
        "C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:2024
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1604
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1604 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3024
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1604 CREDAT:537601 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2716
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt
        3⤵
          PID:1476
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"
          3⤵
            PID:2712
          • C:\Windows\system32\cmd.exe
            /d /c taskkill /t /f /im "waitfor.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{E7F19A57-C953-7B64-1413-296E95479BC0}\waitfor.exe" > NUL
            3⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Suspicious use of WriteProcessMemory
            PID:2472
            • C:\Windows\system32\taskkill.exe
              taskkill /t /f /im "waitfor.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:836
            • C:\Windows\system32\PING.EXE
              ping -n 1 127.0.0.1
              4⤵
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:1696
        • C:\Windows\SysWOW64\cmd.exe
          /d /c taskkill /t /f /im "6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe" > NUL
          2⤵
          • Deletes itself
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:2276
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /t /f /im "6653ef20d2a3a6ef656d9c886ebabd93_JaffaCakes118.exe"
            3⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2740
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 1 127.0.0.1
            3⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:2752
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2848
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:536
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:536 CREDAT:275457 /prefetch:2
          2⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2624
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
        1⤵
        • System Location Discovery: System Language Discovery
        PID:872

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html

        Filesize

        12KB

        MD5

        c09f0da5c4531ccf8336a60f6ede0ac8

        SHA1

        e4dbf1ba2bbbdfba9b644d18d63a61c600a2961f

        SHA256

        4f226a0ac73d48e81b2df40eb3ceb4c99336deec05755cba9ff794a2702dd888

        SHA512

        3e05e91550cad6ae5812446530cd7f1d50a2cbf743cf1447b47ad7d8640f6d57d5cbb6de17abd35600ef4dc0090f62d9aa06dd39f0899e8f4c5414d77e28d3d0

      • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt

        Filesize

        10KB

        MD5

        1ee77169907eaa8c02bc7a6236489497

        SHA1

        170fc62967c3105c831079c40f5070db489c3d4a

        SHA256

        658c1893d6db0e1b9d39bd2e9544892ee9e6dcb915297b08e16e1a0f5de0739d

        SHA512

        f5dd1c5c73f9edf917c9acf43e500175af36d359408e935b09750b6965d63e3114bbbe53042c40088d268b61aa59e8aad6a81e1a6da7a96b4ac6792cd822ea2f

      • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.url

        Filesize

        85B

        MD5

        beb126157f13187dfd6f20552de5af86

        SHA1

        eb90c0db83d2938fdcda53bf48b9cd78a4d058bf

        SHA256

        22735af742fa219d55266bec0a52d216b620039b3f5ef1f720a2dd19a3e4a28c

        SHA512

        2e2c91b0b25855626b53150ca6b3ad5f392d10ad7f0e933ed5a1af5cce2d0f0f156e5295762897f98b4cf9e8231c5e7d2c1998acb9ec3c2aa471f2510da48955

      • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.vbs

        Filesize

        219B

        MD5

        35a3e3b45dcfc1e6c4fd4a160873a0d1

        SHA1

        a0bcc855f2b75d82cbaae3a8710f816956e94b37

        SHA256

        8ad5e0f423ce1ff13f45a79746813f0f1d56993d7f125ab96f3d93fb54bdc934

        SHA512

        6d8e68b969ef67903aff526e983b0fb496678e4c819139e560a11f754a36c4b5770ac2ecf3fc1d9cb5aaa84f80363b4f55553255569503893192911b80d9d853

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        e6847963711efe7d54ee256348d30362

        SHA1

        af114bc22c3913d7cb51ad9d26baa65d427a2304

        SHA256

        f0eea203b95b4c410d0cc10a5ee3c30f74044d455339a64d2b21e34d82ac5448

        SHA512

        477ae39dd0041dc9c842e693824273a913517d313fd013bb700e3a9c95d388f229522a1a0d8e803a1baed267adec032a3ccb6330622b9340195b95ea37f6faa4

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        49e384c17493bfce4db7c1924f221785

        SHA1

        253e7cc0287e0ef197d402e384527eaf6e4be182

        SHA256

        02038f88bf4c2b570d25b11c0f9c06c114be30fd21cb2e7f862dabd1e0b78ccc

        SHA512

        f044896a15a3ced17d0b9edacd131ad2737acd2277b5a4a93e4a22bdfc821349f1c9314ffa860fe25925f0214a38f1505d45e1a32d1fc8dac94ec9e1f0a3fd73

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        f050f65a5d3ab4fb1034d6a32a90dca2

        SHA1

        703ee084c5fc4e9ad98c69cc33869d0763b6fa21

        SHA256

        d3b3564dd4f2b10a73f5217a7f928e137ce1d2343fc4b0f8d11bc5ec26ed7f4a

        SHA512

        4c5cc62aa198aa39d60f5cefa0a520f26edaf7e5b05147fa99720cf932571bb3fad0b7d92298e7355557adcb19a9e78ea76cb0f1a84e439b9c315ff2fea5edf6

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        6c6e05ca763df012ddeaac6dbf979666

        SHA1

        1c4d72b6e5f948f640c67deb627e16e93e299010

        SHA256

        713bc47480290f9ff1311dbeae1bd526079f45b129bf07869f0500804cd5d003

        SHA512

        4d79942f034afcb1b2df12c0a97414644b197240b1cbd27e1ad555d468a287c9aa866b7f2f1127986be70e4db295dcd77c4c05388035109a8fb0ad99bb5b4a2a

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        2076a1579f2c0a0840e18bd6a9736fa9

        SHA1

        3ce3dd6546a6f6db3499ab6830045c1825c6c18a

        SHA256

        e3d2718008d77c2908a4d54101cbb7a8610a772dcdba053533ecb2abf1766d69

        SHA512

        0447ca971e9972302eef0fc0de31267412d6a199643b80a8827794451ff425a3b1de1bf0e071d1a578bfaa61e20cc0ac9cb376238ba5ea56c4c1dfa2304e0028

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        03e1f17df45f7f7d8f24087ed7850c66

        SHA1

        bf9594340d5d44ff600cc05d6a0a205a6a1ae8e7

        SHA256

        c7be8abc4b331b944b15f0d2d17ee69e44a4d24336042e6738ea7427c58d6d03

        SHA512

        fefee60fe0dcc1737075774b40989d41c398ee4e76ebcd2d0a820ffaa5aad3cf3b979b0a1383d81bb1381c87a1caf86cfba3befd2a2ee7da1c341c57c2798eb7

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        bded478cb0e89414c2c1028ddcfc1786

        SHA1

        a31c652b079070a55f6c6cc706db97fbab4f9ac3

        SHA256

        a5f1bbce155d586c977d3bc935a43352ac5a91f16fd9b30cffda047760a4606e

        SHA512

        f60da5ef9aa29dd7218a094d352cf3c99caecbdf891c10e235594d87532260dc83da134d28d0fc1a24532f71da8134d73d904b84108846a2398cd6f40a4daec3

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        974cfb92fa1dbf629ee2f8a243f27336

        SHA1

        76b2b438c9f6f2fe8b31668f25a6e25003ef1756

        SHA256

        f98f974146a05adc805014ae0a35a6f71fb46267b7a292df631e0c26441b3455

        SHA512

        8e791ac25d66cb825e20f46b876ce16168407c96d4b4d5f2113e4049e0a3b0245e8586da8939ef8920b44dbfd7f6c96f8a837d683d471bd4fec9e8556eee7945

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        fee7f041a03a1500ffe7c597e54711e6

        SHA1

        38632ab7981f3a00a36701ed20d13d821e39a76d

        SHA256

        c054eeef2036d43ee336158426a20948d269575ef5ec899f098044b27b268304

        SHA512

        fe85d5a6d0819d7c63e4f47a908ee98c74805c954dee8dcca48656ddda668d7c22c099101dc5ebe9ce1d52c575ca5abcf984ba28779eef7fdf30261d358b2e4f

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        95c4977ad94310dfa1a3398a3260c918

        SHA1

        a03db4774c25209591e4d8f56b43ad0dd6abe682

        SHA256

        019484d5af0fba527270e478eb2e8dfdcee3337a5d5f058c4e3bf5b5846decf6

        SHA512

        11151d8f73903b337d0ce99996c3719259f0edf163df33f95c58094fe5722500d68656997889f44cbb8f2e26a9827c76c95778aa4c88f4e6ab4bfe3f798a4f44

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        848b20413f8b0160444ae6cc25d2c435

        SHA1

        477de5ea37d63425ca141dc1dd3f65c8dc7ac8ca

        SHA256

        d506db4b97f3fbdcdfa14bca0d452804f7b97223c4b9787868e310848b459aa6

        SHA512

        5759a56ab56dcdbf90340270d96e547587904f731f6930aa019e6ee00784c0ed1a8479ce672f5bd89d682c15c9f529d58fc432d3b9d227607a373c41602800e3

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        d7896e89e289e8800c82ac23ac7bb9d8

        SHA1

        3fd95804fb7898f7485d9bd36eca1a135ee79a16

        SHA256

        3990c2adfd6bdeb606bc4224aa048763a589f53b3d0a03aaaddd2336a727651d

        SHA512

        9f6f1465e41ebceca3516f8683525babd9c904d17379d6bf82f6ec41fd99c90fec45263193c9d0a63682bd328f33747103c921e3425b477365e5068369ef52c2

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        fde9ebd93e3f860489890d4239e31028

        SHA1

        1396526706d44777b6f2765a8bcbb37947659241

        SHA256

        5380b492dcb26b0fec97a45f896f3ad024c8ca8ed185a4f82712adfa1d80adf9

        SHA512

        b07838f6c5c55b0c8d2442fb9069f2c5c9515a46e62ba063da6ccc2179cf93606dbd8527aa39b185c690ba8384ab5d288dc39f1dde5ae215a0f7f95c485598fc

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        1f6704f65a18f83a8575e0b2ef701f0c

        SHA1

        698b14b293d12350257c1e92ce1ed5c7eb4aafc7

        SHA256

        254cacb38aa4a1c0f8753c649b24d952dc2fbafbeb1dcea4bafa109d1bdef523

        SHA512

        0a5d892426d84979cee2489c1e1fffee8c9461b2aae48109b1f62ff405756c0cb8bc2ad85b93133f8fdc9e583fd5be1a7ad5ce5740c05be98958b84c4743516d

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        e9d9b051d9a832c6fb44a2cc2558691f

        SHA1

        015f275c2da25243c9922964ca60b9a861ed5f47

        SHA256

        91acbfbc38ba07b1fe48befc74d20d349160519e53288ecbba1685978b2b5a92

        SHA512

        c8ac884951a17fba66d72bc2c9ca41323cb862e9658708515f8609652480bd40d9f200322f4c37668e36989e3a54cc77923c40eb342f0dc071e7b375fc263bd2

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        410ef30a450153e24fcf728fb3a2ab50

        SHA1

        e7fdb5a38095e1e6d963334da1c79a4f3bfe1ac0

        SHA256

        15e316ee75c75283a7f38db2d0608783201fd5946e8a9b5280025eb49d63eae7

        SHA512

        1d4cf4ac3c53c5e02b40d285ad7e297296ee52578e96fa7ea2b34bf4761ce0c05f831e425ac482c9c40aa66bff9032cf517c2e392ad152bc2ed4e722220ebda4

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        1a86f5b140eaf182cb41d54ac17d9aff

        SHA1

        d4415e1cf5830d0b77ebd10b52adc97872170b86

        SHA256

        aeb4b46f49bf750d5ecbbab75be7921d3a110f7adfc240cfe13023af16b555a8

        SHA512

        743116c4d657ccaa2cabe17abe1615776b75ca1bfd5a555bcf463008a3f0480fedfcfedf61e693d08d2cddd105f185041b787579aac68fdfea757f85d7014472

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        19496e8348e9d3489e0275021e7ee4e0

        SHA1

        376a62f8f4930f24675d31621ad7fb9d564f07fe

        SHA256

        d9a65079b2310290aa118596544ddc146f47e20a347039b1851e88dd4eeb6bb0

        SHA512

        5d679bb2e34be952623afcdcce11240ee5c9507f523ba988ce27c266162ef04fa05ba89d16eb1009a90d80ff2df8d3788d7a40853d946756292afeddf2c1d8ac

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        f89ac7d74ff6b04ef91b7b0001d50684

        SHA1

        fde58441ede0f0584ed3483288a857d36250ae13

        SHA256

        2e08db45157d2d882bf0a5457faaf8aa91af7fe404ed4946905fe5500012afd9

        SHA512

        311229f67cff2bd8a4af522ad1f552ca07c5cc926703da7f67a5ca71fc565b17cbdd894cc3cc74470f0f4a213d5d651a3f8694cb126b8ecef9ae618cb406cf28

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{CFE70871-8F90-11EF-BCE0-DECC44E0FF92}.dat

        Filesize

        5KB

        MD5

        94d9ae9eefe3448c927c85899579691a

        SHA1

        f0916dec3921adcde83b86aa4fb8e862d048c1eb

        SHA256

        5d9b62d35cf5769fcb57e6a2cfe251b5b17fa48476ea0a5f6989d9342a21e0ff

        SHA512

        40a07b857257b471632700bc049043930d12582ec8f9bc1a0abd2a8abd16d740f6fa5c934e9bd6760f5c450e9f9e2101288dba98ee8565fba43a05afb56045a5

      • C:\Users\Admin\AppData\Local\Temp\CabC41B.tmp

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\Local\Temp\TarC4BC.tmp

        Filesize

        181KB

        MD5

        4ea6026cf93ec6338144661bf1202cd1

        SHA1

        a1dec9044f750ad887935a01430bf49322fbdcb7

        SHA256

        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

        SHA512

        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\waitfor.lnk

        Filesize

        1KB

        MD5

        272fb6e32f182f81ce229dfc45cce90c

        SHA1

        d3f29cb7b3282b3f11ccca678301738ed119cdde

        SHA256

        add3bb6ae51b86c1a2b314ae61b78a6116f99d6ca60e3ca4aa61e16a10cecdb7

        SHA512

        4c4024c5c2f6d151db5dc255b2fbd83388a0feaaf09601cedb949acaf06d196cc8161310c8f4c7e0aa50f25d3bd8880c8dc294e6b4d8973fd5863b77b7660d76

      • \Users\Admin\AppData\Roaming\{E7F19A57-C953-7B64-1413-296E95479BC0}\waitfor.exe

        Filesize

        392KB

        MD5

        6653ef20d2a3a6ef656d9c886ebabd93

        SHA1

        bb0cc0b05bb70a3d347faa94fb36a35c771b0692

        SHA256

        48ff838a7fe98ec2c5bb59a8a76100047abcfa6db824f4982b8e7fdf2110f05d

        SHA512

        b68b37147ce0d1389d62f5f72ebb616edc7d2ed2aaa484e85f6dc4b6070c9ce973a523e11e311686dc0efb0757fe52dcfa430afb1f48f98ecfdc257c6f3cc360

      • memory/980-23-0x00000000022F0000-0x00000000022F1000-memory.dmp

        Filesize

        4KB

      • memory/980-428-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/980-452-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/980-438-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/980-437-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/980-436-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/980-450-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/980-463-0x00000000043A0000-0x00000000043A2000-memory.dmp

        Filesize

        8KB

      • memory/980-28-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/980-442-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/980-26-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/980-25-0x0000000000400000-0x0000000000464000-memory.dmp

        Filesize

        400KB

      • memory/980-444-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/980-448-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/980-439-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/980-446-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/980-440-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/980-422-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/980-424-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/980-903-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/980-905-0x0000000000400000-0x0000000000464000-memory.dmp

        Filesize

        400KB

      • memory/980-426-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/980-454-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/980-29-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/980-15-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/980-20-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/980-19-0x0000000000400000-0x0000000000464000-memory.dmp

        Filesize

        400KB

      • memory/2152-18-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/2152-0-0x0000000000220000-0x000000000023F000-memory.dmp

        Filesize

        124KB

      • memory/2152-2-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB

      • memory/2152-1-0x0000000000400000-0x0000000000420000-memory.dmp

        Filesize

        128KB