Resubmissions

27-11-2024 09:18

241127-k9zz4atpgm 10

27-11-2024 07:19

241127-h5x9laznhp 10

26-11-2024 11:44

241126-nwbl5awlcj 10

26-11-2024 11:26

241126-nj43xavqgk 10

26-11-2024 11:06

241126-m7p38aykas 10

26-11-2024 11:05

241126-m64j8avlem 10

26-11-2024 10:59

241126-m3e3fsvkcm 10

26-11-2024 06:07

241126-gvaj4svlhl 10

26-11-2024 06:03

241126-gsj1rsvlbr 10

Analysis

  • max time kernel
    123s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2024 05:57

General

  • Target

    a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe

  • Size

    388KB

  • MD5

    a0340430d4b1c1f6dd4048ab98f2e4b2

  • SHA1

    a43ff275972b4ed9b7f3ece61d7d49375db635e9

  • SHA256

    9b1622602d4ae8196316deeb91fbdd1346a4b31453f3762be119e24c84827217

  • SHA512

    54ca85bee0ded2a742c767565159c0e3121d8cd1d97cebc751d067b1ea45d9fca86b6d5acad5b472eddef23d20afcc8ae3497cdd411fd9f393d80e0c90f2cd8d

  • SSDEEP

    12288:XhTjRwlkwFrnAEryLFcG3yBrZTRDgZ8zOhG6:p4DRw7325gPh

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+pwdju.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/6CDDF1B65075EB2B 2. http://kkd47eh4hdjshb5t.angortra.at/6CDDF1B65075EB2B 3. http://ytrest84y5i456hghadefdsd.pontogrot.com/6CDDF1B65075EB2B If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/6CDDF1B65075EB2B 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://tt54rfdjhb34rfbnknaerg.milerteddy.com/6CDDF1B65075EB2B http://kkd47eh4hdjshb5t.angortra.at/6CDDF1B65075EB2B http://ytrest84y5i456hghadefdsd.pontogrot.com/6CDDF1B65075EB2B *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/6CDDF1B65075EB2B
URLs

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/6CDDF1B65075EB2B

http://kkd47eh4hdjshb5t.angortra.at/6CDDF1B65075EB2B

http://ytrest84y5i456hghadefdsd.pontogrot.com/6CDDF1B65075EB2B

http://xlowfznrg4wf7dli.ONION/6CDDF1B65075EB2B

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Teslacrypt family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (418) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Drops startup file 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Users\Admin\AppData\Local\Temp\a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\a0340430d4b1c1f6dd4048ab98f2e4b2_JaffaCakes118.exe"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2820
      • C:\Windows\quuwamwjkaqf.exe
        C:\Windows\quuwamwjkaqf.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2844
        • C:\Windows\quuwamwjkaqf.exe
          C:\Windows\quuwamwjkaqf.exe
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2140
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1588
          • C:\Windows\SysWOW64\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
            5⤵
            • System Location Discovery: System Language Discovery
            • Opens file in notepad (likely ransom note)
            PID:2396
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3000
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2856
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2884
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\QUUWAM~1.EXE
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1988
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\A03404~1.EXE
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:2872
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+pwdju.html

    Filesize

    9KB

    MD5

    01cafa0944c383e9f01b0dbb0a3295ad

    SHA1

    a38d6b9b6c6b82d47b2085de6099f4d9173591d5

    SHA256

    923e8a082a333087b9de9a9223d4f8bff055193e09242b217bb502e7e8fbb190

    SHA512

    78bc02525425fde93405029c6c4a12340dc14a7774a92404f58a9de257c538c1c6147f1ccd550126f377e2c1783543eaf0b7d6b2a4b734b71f1b299ade4bdec3

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+pwdju.png

    Filesize

    63KB

    MD5

    f3cdf7992fad1bfb969a89daf4b0a23f

    SHA1

    d97c29564d34af4fe3262397979751d71c4ebe6a

    SHA256

    71b14cb3566ae7fa2f831e7d3938c5a7262c80a1f3da795847dcc69d3e9c7fbf

    SHA512

    6d05ed1083c307484ca2532fd0aa13c3629ba3aacc0418b6add2270d82304b979547f45c50e9cd1f4d56ad6d8c63f30d31c594bdabd281df889347a3424ac4f1

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+pwdju.txt

    Filesize

    1KB

    MD5

    dffeea39202532b7328389b61f1ba709

    SHA1

    0a7c181241df028969786276c5190a25b5dd764e

    SHA256

    dad9bd4761bcfebd732b08299576660ca281c22c3113236cb4ec847e079e5051

    SHA512

    e02f04fa1bd68bcd09cf4c4966ac8647cd3eb6e43791ee1b23171670849e4f2d2b6e989cdcf78347f6ef4fea42cc742114256e812ea44e274ac34ac068fc7b77

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

    Filesize

    11KB

    MD5

    1ddca504b9f2e8a9742dad73c8026b28

    SHA1

    38a625f52b11f0fca0ff2871bf6a441ee21aa3bc

    SHA256

    88a2bee1b333d7a3498ead37454c670aea67fa588b8f3dd7339186e6a603b3ec

    SHA512

    d0250ded8892610be22b8b21bb55adfcbbf2f47f1ba6e5025efbecf4ea774a709720025e9e3577d72604d3fb376d859378283624ec2fe620917da1996299ac75

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

    Filesize

    109KB

    MD5

    9c281b0975a3b054b45ab07cd786b1cd

    SHA1

    033200594e61093595d73c3eec02ec3dbcdbe9aa

    SHA256

    ba01ee7d801d8b6a5d280d521890d55ec9d985b93963f8141c8aaab7cfbf2e7c

    SHA512

    7e7f405a726061938abde8ee373c57ee2be474a28cd516e7c8bec345738d92f008fce0bdd0997a863f0c6155640ef511d583566fdaf7574efa7995ba675df7b5

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

    Filesize

    173KB

    MD5

    cc10da24b3e75044b1550f22944bc146

    SHA1

    825622c290daa57edb2add9703bde9f000ac9b38

    SHA256

    6d2f7c6519cbfcb7df331add02b70bf660334891cf39adb3c59dcffcfb240e3f

    SHA512

    59db51631572db6764782fa7fdb851dcb1c01b4c59bc81b5164fc8733187aae1ebc4d68c24429ad31849027302d8adfe32825edbb11db6a41614d05266802ae6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    45fc0af4ed7fd6654131ee1a1fde50a6

    SHA1

    b27a6989646b8f8257beaf130258ecdc7103202d

    SHA256

    79854e1573b267cc86f06f07bafccab2a0ba64fb456ec6b2157bcfe2dd645473

    SHA512

    464872028fd7fd71986daedbec4807392e949b6431e04da460ef66184e644ca2ac5a4cd384e6e76e7977f3823e43a6e9de602c1b0e83483bd37aa6c05158fcb5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9cee627b5e62d6f712a68b5ba2946a05

    SHA1

    f0d3bc42355f9e9c3cf24202298d69c78442c81b

    SHA256

    b81bfef0c38d79a9dbccd1634532c2d1e523ee0b35a243f57b69d4a622cdf97c

    SHA512

    11d09ff5a50d8300f867e11ecb7a318e019facd99b23c2b4b159b228549ef9f7ce493ddf4ca228d948add5daeb90375c88beaa81029c757fe261838224288c3b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    41a10ac88b06829d5cccd2f0128c2ad9

    SHA1

    be7527e04b7e996c6a5f30c0943230849ad523bd

    SHA256

    f416cb04cbd3056a989c009e00d771a9dedbd4d9c89938fa649cabb215f78ee7

    SHA512

    c41ed47178d50b2f402d8ce36528110fe896901c8e63a3777177d2fd5ccfc36a5492dda64f8fffbe2cf7d084fd8fb585e7c6b57bbba1c7a3b91e3da0c765b8a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3fb87b6d7d5f56da9f71e21ead3525dc

    SHA1

    3d30896b7621cb02dbec48d33be1048c063416ba

    SHA256

    64dc66088d1c83be4a253ba9bbf5ebb5b3af5fbcf1641d56d42c513ab3e51793

    SHA512

    b27feccbb402d23faa281cdbddecdae15dd2aa5e996bbd6c0f723dd4649112a4448aeecd91d17ca6cf4b1a6c6da0031ae39ae3223c1228ec4041254e72ff23f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a4b7f7fad381a8a97e4241964051d91b

    SHA1

    deedf191203797540faa0ebb18e3d42e69149f7a

    SHA256

    c9900e498a80a981f612c956d1a10cd0955e30188611a64bed74c1c2e3e6c5e6

    SHA512

    d4a050f76d6733ae3799048ad9850f3b290f6d4eddbb2d928685ac51d7f8e5d704519de7e7e17941e3752c5e57445214afd42dbf2bcff0c85e1d2a748047f658

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b345b533a432aed9c047f4529a731f25

    SHA1

    d4f6d0cb9baaa9074fbc8f0d5f4b42ddd8438283

    SHA256

    8f3bdf60b83ac686b7a01aaa0b41dd2fb315556bbb18221d30b6e9b8f6442f8b

    SHA512

    f37c1f075a7947c257633dbd9cc420a6a9286e09226645096052b9979570c3b06291f7695cb06b26079c692e3bb726e0231e8ed76dafe3d7967f4dd786554051

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c024ffe06036a8e2cc40c499270cc41f

    SHA1

    ece0a5a3640d24e45366b46fc7c202f371984786

    SHA256

    b6da74d77214b8d2a13770754df5138773dc0ba6a39a7f61624acee6ff374bf3

    SHA512

    1292b6d5dbe7ddb966d9fb8691e86667d4757df726127617cc67b53341f4b59a3bcabe41959efdd24219834e702d0915fdf28cdb0b9d07ba4cc1be9390fae8db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    82ead53a615fc2452b85f775874b2ef7

    SHA1

    d360b245db6e5b26446cdebed872e33f3d6ff301

    SHA256

    3bb4e78ca031215b2c1daea6d728ed9b689c74d348ecf09ada17d1416a13b4d9

    SHA512

    6cd372350e55457352ee13f63546d4482cdf218e2d324371fed348d6fd3cac46f3b1dcc6ff42e62035792c4a6708b48555f69bd23b65d1387f20271b02fcbbb7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    92030e8e2d6e71817f7bff45ebfa48f7

    SHA1

    7b496d4496e22951d86c0fc73c2cc19bed2e3260

    SHA256

    e1731181014b4d41c6d270e767d11d438548b56499aed5ca8f9e5fda1c9a505c

    SHA512

    47425b3919038200e32fa84750f90993f8f1074efa6f4cf6469e1b0d3768057a1af7acf8d9d107a0022a26e148aa4874aa542c3903fdf1ecc99787843e13cdf5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    fc59f0257bfb7b936cec1f6fe7846f35

    SHA1

    6a59e966d70c83314467ddafe9468a1cd82d179c

    SHA256

    ea7ae7811858c14a81005f8d3e8b06ad80c7ab89c6433edbe0af725aac0bd509

    SHA512

    bd5cf6b22c4ac14f299e60b534d7cca5b1f502683f565509f461b6d686d3698c3d7c96b661923c63ddb79202fba1b4cd15ce8e9bd80aa57cde68be2f6a843b77

  • C:\Users\Admin\AppData\Local\Temp\Cab5A61.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar5A93.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\quuwamwjkaqf.exe

    Filesize

    388KB

    MD5

    a0340430d4b1c1f6dd4048ab98f2e4b2

    SHA1

    a43ff275972b4ed9b7f3ece61d7d49375db635e9

    SHA256

    9b1622602d4ae8196316deeb91fbdd1346a4b31453f3762be119e24c84827217

    SHA512

    54ca85bee0ded2a742c767565159c0e3121d8cd1d97cebc751d067b1ea45d9fca86b6d5acad5b472eddef23d20afcc8ae3497cdd411fd9f393d80e0c90f2cd8d

  • memory/2140-6132-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2140-4356-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2140-54-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2140-51-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2140-50-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2140-1567-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2140-1576-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2140-49-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2140-55-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2140-6129-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2140-6096-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2140-6102-0x0000000002B70000-0x0000000002B72000-memory.dmp

    Filesize

    8KB

  • memory/2140-6106-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2140-6105-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2316-0-0x0000000000260000-0x0000000000263000-memory.dmp

    Filesize

    12KB

  • memory/2316-18-0x0000000000260000-0x0000000000263000-memory.dmp

    Filesize

    12KB

  • memory/2316-1-0x0000000000260000-0x0000000000263000-memory.dmp

    Filesize

    12KB

  • memory/2672-6103-0x0000000000220000-0x0000000000222000-memory.dmp

    Filesize

    8KB

  • memory/2820-29-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2820-6-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2820-8-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2820-10-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2820-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2820-16-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2820-5-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2820-20-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2820-19-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2820-12-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2820-2-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2844-28-0x0000000000400000-0x0000000000633000-memory.dmp

    Filesize

    2.2MB