Analysis

  • max time kernel
    124s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2024 23:46

General

  • Target

    bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe

  • Size

    396KB

  • MD5

    bac15e06496f8415d683121eb39361ff

  • SHA1

    88bbf0e8c6ee97f35225a103a60e81d63472c8e1

  • SHA256

    f2da7c18ba3e8ebc4b25bad6bc500aaa7a1afdd3921284d17865771576edca01

  • SHA512

    850d1a4d0b3eef6569eeddc95b4c5cb1a6671427724e7b7ed268e3bc23c0375f87c41d059bd27b67581c9c3452703298243bd3537dedbe146cc10a2bd46a58bb

  • SSDEEP

    12288:kVaauWatLv/kjWaesK3YSYJmlzFZ3IHmMr:k03DkjtLS5hVq

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+dklkh.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/E8DB42D0BC778F40 2. http://kkd47eh4hdjshb5t.angortra.at/E8DB42D0BC778F40 3. http://ytrest84y5i456hghadefdsd.pontogrot.com/E8DB42D0BC778F40 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/E8DB42D0BC778F40 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://tt54rfdjhb34rfbnknaerg.milerteddy.com/E8DB42D0BC778F40 http://kkd47eh4hdjshb5t.angortra.at/E8DB42D0BC778F40 http://ytrest84y5i456hghadefdsd.pontogrot.com/E8DB42D0BC778F40 *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/E8DB42D0BC778F40
URLs

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/E8DB42D0BC778F40

http://kkd47eh4hdjshb5t.angortra.at/E8DB42D0BC778F40

http://ytrest84y5i456hghadefdsd.pontogrot.com/E8DB42D0BC778F40

http://xlowfznrg4wf7dli.ONION/E8DB42D0BC778F40

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Teslacrypt family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (418) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Drops startup file 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Users\Admin\AppData\Local\Temp\bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\bac15e06496f8415d683121eb39361ff_JaffaCakes118.exe"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Windows\bhdepmifygxi.exe
        C:\Windows\bhdepmifygxi.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2056
        • C:\Windows\bhdepmifygxi.exe
          C:\Windows\bhdepmifygxi.exe
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2908
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2716
          • C:\Windows\SysWOW64\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
            5⤵
            • System Location Discovery: System Language Discovery
            • Opens file in notepad (likely ransom note)
            PID:1816
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1916
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1916 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:1224
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:908
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\BHDEPM~1.EXE
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2372
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\BAC15E~1.EXE
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:1220
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+dklkh.html

    Filesize

    9KB

    MD5

    8a4faf06a8b4104c2182537b598cedb8

    SHA1

    1feda78260280d6d010531a806c56843ae8bc559

    SHA256

    1e96f387d475c49c229ec80a48a85f8dc98c85162dd1c219485e04e6fda093b9

    SHA512

    2ddb04edf8ab47a5ea354c1529781f6a8a59b3e2b5fc8ff37cd6c1809f3257150a8199dcb8b0d8b322506e94b33403fd0b16f3b5aff6286fcde3e377fb267ef2

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+dklkh.png

    Filesize

    63KB

    MD5

    a652a38a30b906117ecaabe6694aabcd

    SHA1

    580fb1c7d775f5e460589a24e2affa0274f6cd16

    SHA256

    f31f37aeab98c72cc6e1595bf97c31a80128e30ff0b2aef6370b9a977545ca8e

    SHA512

    0028b8bf9a407568d229093f96c9fe4bba86ffa67994779978f95727f82cde42cfac8a680c9e105edec108e0aa3b73d0e47780c545d0b097bc4f393e8c4ea7c7

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+dklkh.txt

    Filesize

    1KB

    MD5

    aa64b3ef934185196d98f01fee2d6ea3

    SHA1

    f4cdc5ce5de03c3c3df5b23719f04133e7635e47

    SHA256

    fe929bc404d8c3fcd9ccd43d8df747b4f1bdae78eee1610b1ed4b90f71e46764

    SHA512

    891417bdb4a972057c8faf89a8d6a916344d32a7c9dd78220c5bc492f3216b9c9d2b0867836e5875909101f8c0d5c6594948c017f3ad318422f7fffa3da15a7b

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

    Filesize

    11KB

    MD5

    9532e8bfd312d9dc115ec40aedc3a874

    SHA1

    b69fecc3e7f0ae1bed4b4dda166a923bf7e74ccc

    SHA256

    68bf0f4dd4dd9bbd3cee58af0d3e2815a23b35328c65a5afc9c6bd6af6531c6f

    SHA512

    47960baf11f20b9c04735c7b444a9eb13a070d85d0065f8e1be6ec27bde6c1eead98f12f0af5a54aab4886222a16f515a28a75ea5ffe57c03b894cc470196f6e

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

    Filesize

    109KB

    MD5

    dc94305f97b5fe6d7698ebffd429ed23

    SHA1

    c0f98890285ff3df8b97ecac29469631450474a4

    SHA256

    959942b80874a06d70cb626b44fcdeabcd776812d73271d0e7f63552d2481301

    SHA512

    c840c7f47c0cd51e30ab2628b73817e60b67c8af38bf3dfad2189198961fa3c46e81a856a29a8d324d0fc5d0da26404cfc7f17832ed9b5dc4ec127f3dd158c6c

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

    Filesize

    173KB

    MD5

    2f3c75f0957979b986b929b10294de49

    SHA1

    cc8ea3a32a6cf003bbfd356a0d0048583ba5d3d7

    SHA256

    f8ce350c4336adafee6ea69fca2cd6536cf360e04f32e051424c1308b62f8c0a

    SHA512

    d5ade2e6deaf2632c751364ecdae37eaaf377337cdad472594431d9bb32cfa78073764cb452ddcd4ff84e5c386f81aabf7bd4aaae3fe44ed81e516d220e7c93c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    afb6b230a7d3f2456b9eba2b697dfb31

    SHA1

    02f42e352b789ba1d7add227bb4729e97583180e

    SHA256

    382f8b9becc98f675b83d44454763e95b6b83aafec5d92c5cced6c41dd09dc6f

    SHA512

    fb2c3967705a7ab04b6684f07101c7fc015c82b2b2dd56e59c9e6dea9a16d6187b7c37e1d361d77c46b444ba6bec9296d273a1ccdab0d149afe8fbf12d2bb6f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e5de7dc4f5c10f74df0f3f507c25083d

    SHA1

    cbfe077012fc365e9dcb736d6144b8a59a5bdf96

    SHA256

    196f45a15ad566f0e908be7846c317ab9e934273e5286d85a28c3633994fe4aa

    SHA512

    1e5c736e1adc9074777fb9123affa3a3eb2f54fb1df0dfe7bd16940f894f2be65592d074d1ea8c1f99fb249dbe06e800a7b92d16553012a5cefc7ae9c7287a9d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    696859e38c40bcaed86f5b67ec0881e2

    SHA1

    be92658faa799dfd93952568083a78471518f266

    SHA256

    b8eb4e58e7651a28ae2ea20193e286398b92a14abee04e2f606415351e3adc38

    SHA512

    ee27d1094c361ac115e0ed361f0a485d13061f6ea543b8438b5eda6d4db7597d6d7cfa83a2adf45a626005d0943604e793466eb921aa11f7215a56106d140f14

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f05186a58bec2855cb158d2c5e2475d1

    SHA1

    9fa6b45a7f133d81f1c9ad4aa51297de497c3f77

    SHA256

    c4f9ca46cb875aa0bdd858ec232a0e27773948dc8059f3d1787761011b720c82

    SHA512

    4356569593edfe517e5fa0d7c7f0ffd010b26ff2c830f9e81b82cda56c833dec4f3c65f69940b0eac5138fef2f30122531ba5ced63a83b795819e0c4ba51b945

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    909360d3f09748050f67922c8db39383

    SHA1

    4aeeb2c968cd6c4f8c973b903c2eefd124b677a4

    SHA256

    d5590ba9bbf46b08a03e28a38025d556740fab8ebce9265c588f849ba7d5d4c0

    SHA512

    910331e2b0ecc4b25ac06eb4faf12c54df971529012186cd5d6349a78eabfffea450dfe15aebbd7001cfbf31677aecc4b0a42b4fe1813bccb87f0bc6ff4d5175

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b1161a931503b883bffccf4a91580b2e

    SHA1

    3810288a815edd8c0643a90d40554789f93d5f81

    SHA256

    a4bfc06fa6128ed6ec18f4a5ef71f78348419bc11fcd1fd4476cba206078ba4d

    SHA512

    2625dc0b54c6a7ed4450ef9facb4e6b21cd8d84968b05d72a14996e64a95599953f4920cb43707a82159e11c6a68ca96168ca54e1f3eb164054babccf3a468b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ccde6beaf0ebcbc212dfa8bdec4edf9b

    SHA1

    66701e1a5864b38bee04fe62f5b3e4219fb7558b

    SHA256

    1a6f1c181702fec385c0c826c9a2da97ec6763ed8edde5171cfc6e418342e099

    SHA512

    dfe7142a176e4985aa61404704a98e1d7a322ce162766fb56b9fd8c92af39cc5ac1891cb70a97fea9975f60175408ebb9d86709c4697ab7e7b1422c37d05cb1a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b76fac3842dc4f5bcae252cb118febf8

    SHA1

    60c014904c0991c9c08a4a8afe8e5d6717f1e98c

    SHA256

    8d6856a6c0dc81a14c153a1dca8d9ad89cd7d937d5fb076779add2963a76e613

    SHA512

    d8bf36f69a414008d3499ccc0652805f886b073fd70732e2cc757d2844389ff00a9a99a406ddde0eca2b9b2b0bb9d0eea25db3dbc390249fea45512ca71a08dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    735ed6c22239f3f55b2986a5e3207f79

    SHA1

    029b81c871bdcd4fe5145ce70ca4123e9df5d1d6

    SHA256

    bdd9d91b1c5b61bc4e6866a55126a1d02ad0a04a1a3b52179351ef5f5245a92e

    SHA512

    98e7be9a30d9386ffb96064e076b86325605f2ccea06c09712e5246d0886e1f264d3cdd3e9dae1d58b4afe07a6bcb7b47a0753abaf71ee4b2bf781594b25d8d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    046ca39ab4ba894373fc11a30e348ff6

    SHA1

    de007ad27210b2cac635ccd5c09338392b8135d8

    SHA256

    4201e74cf82a7c666b90cb897089f84228b270d8e2c6c9a684a9e7e4c0221bdb

    SHA512

    6aeb49be34a4408cdcfae7021c14d2e49aa9bd88071d9643cb2a4e9b929b0ca32f4d5a23b56d096a9afa280a21d47d875b717828212f7cd68f0da97f88126c5f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc47334e35841ea399a28260d7a6fb8b

    SHA1

    6aeea9ac4e3e0c92def41f7c0b03aed8657edeec

    SHA256

    8ad035d76ed85f825d4953dba0c9cd2270931599b02be5549d43bb4fd5b789ea

    SHA512

    008fc4fd57a7054159e93e79b680a3af87db42c1a7c84cc24de64d49e8c5cc651aa1b35e73cb6464b0e068357431904078c26e943102764bad7156d11eb8f1fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    081fa497a791c896b5428d45ebe9a32b

    SHA1

    93152ac2ba0030f9382be6403d85ceb429b4c7f5

    SHA256

    808c06953330eaf0b4c026c560c78b60fe0f3798c0a154bf0f09af0edfcabde3

    SHA512

    50ad2f65bcf17090f92717df06a3153885904118453b2bef55a1977e1aac7a0ebc0ad4e9ab48ba8a8568ebe6dfde76a9474beeeefa31dfad846977f77f9c051a

  • C:\Users\Admin\AppData\Local\Temp\CabEED3.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarEEE5.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\bhdepmifygxi.exe

    Filesize

    396KB

    MD5

    bac15e06496f8415d683121eb39361ff

    SHA1

    88bbf0e8c6ee97f35225a103a60e81d63472c8e1

    SHA256

    f2da7c18ba3e8ebc4b25bad6bc500aaa7a1afdd3921284d17865771576edca01

    SHA512

    850d1a4d0b3eef6569eeddc95b4c5cb1a6671427724e7b7ed268e3bc23c0375f87c41d059bd27b67581c9c3452703298243bd3537dedbe146cc10a2bd46a58bb

  • memory/1984-6106-0x0000000000160000-0x0000000000162000-memory.dmp

    Filesize

    8KB

  • memory/2056-30-0x0000000000400000-0x00000000006F4000-memory.dmp

    Filesize

    3.0MB

  • memory/2684-4-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2684-16-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2684-6-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2684-2-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2684-20-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2684-8-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2684-18-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2684-28-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2684-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2684-12-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2684-10-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2848-19-0x0000000000340000-0x0000000000343000-memory.dmp

    Filesize

    12KB

  • memory/2848-1-0x0000000000340000-0x0000000000343000-memory.dmp

    Filesize

    12KB

  • memory/2848-0-0x0000000000340000-0x0000000000343000-memory.dmp

    Filesize

    12KB

  • memory/2908-6105-0x0000000002C60000-0x0000000002C62000-memory.dmp

    Filesize

    8KB

  • memory/2908-6108-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2908-49-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2908-51-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2908-6134-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2908-6131-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2908-6110-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2908-50-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2908-1259-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2908-54-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2908-6099-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2908-6098-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2908-3997-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2908-773-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2908-1262-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB