Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-10-2024 17:14

General

  • Target

    cf2b8758dec69d650d88fea72b8ffcb34ade8f6b7f9b66401ce23a2160c53281N.exe

  • Size

    612KB

  • MD5

    d21f6b4bcb3c52061dd42d7830823940

  • SHA1

    5474cd41a7eca331c1fce96cb0acacc5161a1dd7

  • SHA256

    cf2b8758dec69d650d88fea72b8ffcb34ade8f6b7f9b66401ce23a2160c53281

  • SHA512

    abac923025aa36a6cff948eafea91f048fe1441be98f4375ab8ab7583c6011c428d1c76209505ba30281c1271240d6e64b166c0070654c0d4de2355ea35b1968

  • SSDEEP

    12288:+dXmAPpb7y6MeBG7QvsHdZ6MgQ5luq2G:ULy6Mek73TllLF

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECOVERY_+gsftr.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with AES More information about the encryption keys using AES can be found here: http://en.wikipedia.org/wiki/AES How did this happen ? !!! Specially for your PC was generated personal AES KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/5837E596D8C59F3 2. http://tes543berda73i48fsdfsd.keratadze.at/5837E596D8C59F3 3. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/5837E596D8C59F3 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/5837E596D8C59F3 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/5837E596D8C59F3 http://tes543berda73i48fsdfsd.keratadze.at/5837E596D8C59F3 http://tt54rfdjhb34rfbnknaerg.milerteddy.com/5837E596D8C59F3 *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/5837E596D8C59F3
URLs

http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/5837E596D8C59F3

http://tes543berda73i48fsdfsd.keratadze.at/5837E596D8C59F3

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/5837E596D8C59F3

http://xlowfznrg4wf7dli.ONION/5837E596D8C59F3

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Teslacrypt family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (411) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf2b8758dec69d650d88fea72b8ffcb34ade8f6b7f9b66401ce23a2160c53281N.exe
    "C:\Users\Admin\AppData\Local\Temp\cf2b8758dec69d650d88fea72b8ffcb34ade8f6b7f9b66401ce23a2160c53281N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2920
    • C:\Windows\paceqjoiveye.exe
      C:\Windows\paceqjoiveye.exe
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2588
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2620
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
        3⤵
        • System Location Discovery: System Language Discovery
        • Opens file in notepad (likely ransom note)
        PID:2784
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2596
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2596 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2528
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2312
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\PACEQJ~1.EXE
        3⤵
        • System Location Discovery: System Language Discovery
        PID:980
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\CF2B87~1.EXE
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2780
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2524
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2144

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECOVERY_+gsftr.html

    Filesize

    11KB

    MD5

    3fafe85b659c50d5a1083c4b0fad9114

    SHA1

    5f04f3f30b8c59cf727260accc748c3003f4496a

    SHA256

    f19bb0435a40afd82a42ef2e1f32681ad6ab70ae295a6795e5a4e375efca9f1b

    SHA512

    1437d25ac4bf40b5fb43e3c3f9ec14e2102a1e5e83b68b6a050e32782f45a1e1d8159731509b47039d7c3340a2634bdf79347c211e686b98e04c28ccfca71813

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECOVERY_+gsftr.png

    Filesize

    62KB

    MD5

    9ec5f044a6f0b43a0e14e91fde0e3424

    SHA1

    7ec9e53ddf16f1ddde07673a612a4fd70f9dcdd6

    SHA256

    a5b1668f0a6ee8dd2870a7452adfe71e342e96ca0b6ab5334fcb3fc405c53b3b

    SHA512

    7ebe981bcd397f7edf027fece3d1aaf048a8c23e9cc89abea97ed41599d552de54938919a75597f0afc01e0bf06afec675b97db3805e59ea4a32b75d6cdb80cb

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECOVERY_+gsftr.txt

    Filesize

    1KB

    MD5

    4b6b8e7ad095be14eb855099edfcbda4

    SHA1

    388f4a70e71e1661780e7046d271e663ab01a241

    SHA256

    f5a42ed23164a478982fca00a8f0186ea8f37ec90f94cabdc41412d70f322819

    SHA512

    bc5fd13a91b62e7c63c7783285b603380562c0410a63cb86cfa3562b99a8691eac08e8e22232805c47befc5ec52ada18349d9a975c30ed5df917cd1528bc68ee

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

    Filesize

    11KB

    MD5

    4e82691c9323394889234b4d0ee7105d

    SHA1

    e82e4e624fef6711df8a8b1d85fb6bd0d92bd6d5

    SHA256

    07122dd12d82bdb068cd254caefa82e1f2d6f6d64b87b9715b7b5bed54ad04ec

    SHA512

    e97237e7081d701a8736ccf357ecbfc7d17bcd9f76a49e0f089ebbbafdbff3a90c733122179266b68153774949cfac336c4053c7b4e880d1ee8c3016e05ec2e3

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

    Filesize

    109KB

    MD5

    b15c192740a38306605049557f47d354

    SHA1

    c874d514e219031b98271f48e451daa119b2310e

    SHA256

    89af6aa9b4f72d692272403f65a31e6fb92d642d5b7491d7e158d606fc126ff4

    SHA512

    d7c7e3d29c1d6497a111f9b80626029dd861f679c5ebc8294aefae78bd59e193e0b1297051428c9cb52613b5637cc87c6505cd82ed4e3adc75d3cedb34372aad

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

    Filesize

    173KB

    MD5

    18340065ee49b7ac1ea8bb30c72aaafc

    SHA1

    ecb046ae538adfdf11e0c3befffacae202962260

    SHA256

    c31abd454635bb70b8787974f3cfa427524868ed081f6b46c66d5a07ad6c70b4

    SHA512

    257e380cd90af993740819296be02c23a1773b2f27e036296eb03d47e4c0e9b09520ae8041766475eb56b0daaf89e05006592f7de8164288d0cb86e477c2ff33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c3d934efd7f722223bd430376d9675c9

    SHA1

    36679fd7407c183e928890fd48b9b630de378144

    SHA256

    f8542c1a86bf0f021ee11927fd55c6cc85d0ec9952716838a594d7eabc873700

    SHA512

    3778c38d21b16bea51887b5dab3fae75fcc3d6e84e6e9119eb6e048dbcd369d4e67019eecbe1d447a51efbbfaaaf85f21e18baf1018cd872c91319b7a7bd103a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    554bec11f3e3e1af0f47415cf2b03aa1

    SHA1

    0e31b7d82f3322e06a2dd9bdef6cb0d24214cb21

    SHA256

    16a428154e123b46e1304645ea2388a9528a5fcb2ff50f2c65a8628c2286d2bf

    SHA512

    dd1fc2bfbfe4e750f3e1e2fb7e912a9797abaa524570849065061f807f0e0f888922c1ee8a7f57a397daea9433213bb2ea485e6a09d4ceb1ea0b3cf2bf7f67eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e5094dc6706705e78ca16fa7639f2700

    SHA1

    e202bee6b1edb505140c29548dc5eba338a1c12c

    SHA256

    1949ad61577c2c6d25b6eef12c9150b460a3726ff99544eae683dd2dd87f1949

    SHA512

    4f7dc556c0a8228f9ca82058042d1f4737e47c8e381d8df0fa58a1a7ebff2b3babe53cc356aa486a762976e6acad3e2781e85e452b3d477563579108f187bec7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    84c48890511b1a8d8eaf72c80fc6df55

    SHA1

    ec8aed056722f37cfd1c72d590e3feacb5a2cdc5

    SHA256

    3a81fb5ad84109b91a34d2a644e3f50146b0e72326ae4e5f59f3dcf1e2da28fd

    SHA512

    143996bb40c44783c265017251880e770e5f6b78351e1b184e0b98b8b590ab55236ea6889e4dde45e04c1d1a3a80a5176e5892f0199fd6c808caabf4a98bf3bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ef48da421afd7a1d3576bd8a56e6c7dd

    SHA1

    4d56bb75acc617a6dfbed125ad6652f0374c7f60

    SHA256

    5693c30af91abce61d631bb03578919008cc328ed2781c912073b507e34e0466

    SHA512

    23ddf41914ddfbb4364bf962d4f3124fdefbf07632d2239d05e63d4ae6fcdae8e2de837431d9ef2bf57d6d8e9ec185d955ea15a0b7ee224d9b55fad36c78f4e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b35080f929930f435c569e59f0173e07

    SHA1

    5e3d2d31e2d1bbba9859c540db44bb39bc6bf184

    SHA256

    90ca3328dac92a7d2a5159111218aa5eaf1f653b54d6eca04d6aadc7936f3acd

    SHA512

    c395fd7d850721a0f854de3c5ba171a840f6718daba965f163f995d67f4247223c81e1be38ba051ad8b1ce21aeb87a7f30a810f6b42a19a55156e23d1ce38094

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f22bceeebe7b3a641a70f644ed9395e

    SHA1

    3c0f1b5def3b14a4095b92658f2633cd451acfa4

    SHA256

    df763eaf623070bdc1fc70f4002576853dd77d596e1605c9c828e52c0d847b59

    SHA512

    76d1d1ad1b4f1366c7a56889ee766130d50c90bca962ee29fbd4c2544aaa8dec2e11f06fed8ac42eb17e36c96a38e08209ae722a28ff6e972a8a8ffd2feac611

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a9090b2d672732dfa8b9f9f0193a3bc1

    SHA1

    400c431cde3cca591fe69454db83b423029d9a76

    SHA256

    3e9150f9f071489207407b490a04358eb75b96a2cf7be92bce57a2b1e0555638

    SHA512

    db3e064f9bd600fdffdcc191be91bf39fad1dbb2c58c37e9f919e9bcedaa8161b8e52c24755084c73617c9aa007f3e84fd186e42833926b64378d72a67929b74

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c3fd2c44dda97e2ddc0d9be3b99ef16

    SHA1

    18b4cebbb39e595fb8d1e63a9da3f29da9dc99be

    SHA256

    d57a0265005b577419e5cf7554d14a0dbdd55385ae98909781ea76f2666a2e30

    SHA512

    b78b6480565189c1ac4a0310a92da48283d7d616827c64b95d6d7f3436cf0f05f55d94b3c05a9dcf4bc2395aba70a3059ed0e2d118066e911a28a9f40843d5e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff758bc17c5a230cab8663d2dee01f41

    SHA1

    a08b5cf3ffd23ade3a39fb42950721241c04bfcb

    SHA256

    13250051afe91768f79ca8446bd247254b3b2a3fc501c6ff6a729cc7ba48b54b

    SHA512

    8a53b7f921b1de85a581fd59748a9cccfe208f997aba7be2304ff78e49097d942919a63c39c0e1a607a2fac66efd47dece3ea5643fb1304f476aae7171414394

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1097a8585b5c0a142b918fa852703cf0

    SHA1

    4e32d04a16880cb31c899265aff1d2c227043817

    SHA256

    49efd8cb1fd5821e921b103d6d9013128db9039645ef89491645c57e1e86c5af

    SHA512

    39c95c908dbae1f8615a9871b68c273fc92ff6674bb64f63be2ace49033aa5d20bc20adc10c824aee3a93b2815cbe9ee5bbaecd9c1cff8882641f1dcbf43810d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d1406ec887211f0737fbd65e2e9b8db5

    SHA1

    ae87b65f7f2853c3ff0e36faaccc2a3f5b455218

    SHA256

    57cd607ccdbef7cdbf7c830053cc7a8927cab5de8cde2991fa3e22c6a70222a5

    SHA512

    553823b8190faca34ca5ce4505dc09d8c0899a286ecd8d6cb9ebadac1ef1bcdd1cfca60a21e4e6867c2d4d681f8793dd8c6b9bd0c3beac95c00d3bd43e48ca3b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    52cec898c611bb5d7a714690f71f1655

    SHA1

    9142b6451c25e676b9c2d62c8aa9b09845d6765a

    SHA256

    bf28bc15941f08156cc485540dfb46692c36247ba6ae0b6f826e301544238e23

    SHA512

    0fbad4e247a78d30fa91b359bc9d4c2612033cd0725d5b1eed83e2af7b508c8d833a52180059f2889de3342a539de403e24f9b5ceb3658b0a624eebd06ef1a2b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1df56cfc395a94b4da47880f5f4db091

    SHA1

    6fb494a772f9dae89b1779572e6ef94126c74bbb

    SHA256

    a755426ee1e15c5029934fad07efde3d0c25fb2e4b4031389a4169876c02f9ea

    SHA512

    0d8692738d70416b91e8e4c4641f93a151c35125306552f720647e464f3648e9d368f63532dc0c6c8be18771e1aa6444a92412fe53b5b3f0b3071caa621d10b7

  • C:\Users\Admin\AppData\Local\Temp\Cab346B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar352A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\paceqjoiveye.exe

    Filesize

    612KB

    MD5

    d21f6b4bcb3c52061dd42d7830823940

    SHA1

    5474cd41a7eca331c1fce96cb0acacc5161a1dd7

    SHA256

    cf2b8758dec69d650d88fea72b8ffcb34ade8f6b7f9b66401ce23a2160c53281

    SHA512

    abac923025aa36a6cff948eafea91f048fe1441be98f4375ab8ab7583c6011c428d1c76209505ba30281c1271240d6e64b166c0070654c0d4de2355ea35b1968

  • memory/2144-6027-0x0000000000160000-0x0000000000162000-memory.dmp

    Filesize

    8KB

  • memory/2588-9-0x0000000000400000-0x0000000000493000-memory.dmp

    Filesize

    588KB

  • memory/2588-6020-0x0000000000400000-0x0000000000493000-memory.dmp

    Filesize

    588KB

  • memory/2588-1075-0x0000000000400000-0x0000000000493000-memory.dmp

    Filesize

    588KB

  • memory/2588-1392-0x0000000000400000-0x0000000000493000-memory.dmp

    Filesize

    588KB

  • memory/2588-6446-0x0000000000400000-0x0000000000493000-memory.dmp

    Filesize

    588KB

  • memory/2588-6039-0x0000000000400000-0x0000000000493000-memory.dmp

    Filesize

    588KB

  • memory/2588-6040-0x0000000000400000-0x0000000000493000-memory.dmp

    Filesize

    588KB

  • memory/2588-6026-0x0000000004590000-0x0000000004592000-memory.dmp

    Filesize

    8KB

  • memory/2588-8-0x0000000000400000-0x0000000000493000-memory.dmp

    Filesize

    588KB

  • memory/2588-3999-0x0000000000400000-0x0000000000493000-memory.dmp

    Filesize

    588KB

  • memory/2920-10-0x0000000000400000-0x0000000000493000-memory.dmp

    Filesize

    588KB

  • memory/2920-0-0x0000000001EE0000-0x0000000001F0E000-memory.dmp

    Filesize

    184KB

  • memory/2920-1-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/2920-11-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2920-2-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB