Analysis

  • max time kernel
    110s
  • max time network
    112s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2024 17:01

General

  • Target

    24da2b7c562c96e5774cb08b6b9017e08d0e5c7032dedb32046153efccba46ea.exe

  • Size

    376KB

  • MD5

    058acf9829eff85a0f5ede3d9e12add0

  • SHA1

    58a3463d7059b578a54c90f7919e27d9caaba9b1

  • SHA256

    24da2b7c562c96e5774cb08b6b9017e08d0e5c7032dedb32046153efccba46ea

  • SHA512

    1a8f25d02333debc3ec85b11ed089642581fb519d8cf73931a78f392e30b67c678492e1606b33d9e28aafad14c2e12a4ed3c8f16329ad21de0f6fedf946636d7

  • SSDEEP

    6144:J+lMnaN9yLmfyoZjcbxstF8cIxnTYI4LVmKJ7t2AQeRiX:8TN9xyomFstF8conTCLVzTZRiX

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+vtuqc.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/78149810A7136BE5 2. http://tes543berda73i48fsdfsd.keratadze.at/78149810A7136BE5 3. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/78149810A7136BE5 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/78149810A7136BE5 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/78149810A7136BE5 http://tes543berda73i48fsdfsd.keratadze.at/78149810A7136BE5 http://tt54rfdjhb34rfbnknaerg.milerteddy.com/78149810A7136BE5 *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/78149810A7136BE5
URLs

http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/78149810A7136BE5

http://tes543berda73i48fsdfsd.keratadze.at/78149810A7136BE5

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/78149810A7136BE5

http://xlowfznrg4wf7dli.ONION/78149810A7136BE5

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Teslacrypt family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (419) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Drops startup file 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\24da2b7c562c96e5774cb08b6b9017e08d0e5c7032dedb32046153efccba46ea.exe
    "C:\Users\Admin\AppData\Local\Temp\24da2b7c562c96e5774cb08b6b9017e08d0e5c7032dedb32046153efccba46ea.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Users\Admin\AppData\Local\Temp\24da2b7c562c96e5774cb08b6b9017e08d0e5c7032dedb32046153efccba46ea.exe
      "C:\Users\Admin\AppData\Local\Temp\24da2b7c562c96e5774cb08b6b9017e08d0e5c7032dedb32046153efccba46ea.exe"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Windows\cgelbnrbqnht.exe
        C:\Windows\cgelbnrbqnht.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3008
        • C:\Windows\cgelbnrbqnht.exe
          C:\Windows\cgelbnrbqnht.exe
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2856
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2936
          • C:\Windows\SysWOW64\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
            5⤵
            • System Location Discovery: System Language Discovery
            • Opens file in notepad (likely ransom note)
            PID:2712
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2332
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2332 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2072
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1848
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\CGELBN~1.EXE
            5⤵
            • System Location Discovery: System Language Discovery
            PID:764
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\24DA2B~1.EXE
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:2640
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:536
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+vtuqc.html

    Filesize

    11KB

    MD5

    0637cac5ecd5cb7736c5684b2414fcd5

    SHA1

    58e88d9e7d2ff07f2c1c1071516e2abf19f6fdf6

    SHA256

    0deb0e6a1649be57d961c57233739a5d4bd60d68d3ace7ac9e8979a5c1247dc2

    SHA512

    241243c1f3e20f09c272f6f55ed388ef96f00f4f94592a70392ed24d9f8f9a41e407e27f851de941434c4d4a1013e54b77b4e7323c920a12f5c16ecfc37ee1d0

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+vtuqc.png

    Filesize

    64KB

    MD5

    e2ab8c199ab82042f5b221ad61070b26

    SHA1

    0005401328bca488c11e527a72d5c8cb3f529219

    SHA256

    61639505a6faea48be102968ce04946404142f96f57fd65d5dc4f5a94af97ba0

    SHA512

    973ddc26a9f81a926bca9756d5fb9fd922cd3727d0a621b6a311ab9bd9a41e40fbb745ce7fa8b784ab075af26cbf3668b53dc8b79fd5edc1542a17ae19116ca4

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+vtuqc.txt

    Filesize

    1KB

    MD5

    b888496a82170738307e728551d8b2d9

    SHA1

    2fd2353c24f5702d78ca25dbb89db1d6d8e9d505

    SHA256

    981d4fa50b9c99d1e21a2f0a37831cfeb5dcd8cbb9661bc1da6c97ec35a4ba7d

    SHA512

    ea04ab9cb57f2846ea658d25335da0ea6d4717956332d1304113dad982bbb50cc0f009c4e65e7f287e8fa2060d301b4a73ee37cffcda6f80fa37debf587060e4

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

    Filesize

    11KB

    MD5

    6a03e956d4ffdf24f8f56e37757d71ec

    SHA1

    8f58f28277ea300e55f7214d75fcf78fdf7ebe7b

    SHA256

    fbe20fb31646edc8ce66d72fb3031adaf18cbc69afd3686d1b89290c6dc17806

    SHA512

    89ac902b28ce95b810573d9ba991be109912c647409eb10e8484754d358e991ceb6e0b535c2660028ae68137c1ba48ef0ad45804ad8043471faaa6a68cdbf3a8

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

    Filesize

    109KB

    MD5

    fdf3069713c0b7a855ecfdfaec17e566

    SHA1

    9982211f75886ec3589784944d59cd9ea36f3b84

    SHA256

    0b8db091f1de61b8213966c2c3ca18c1b19842ac1971b0f4882f79640034e1d1

    SHA512

    2d4534f3e66b79fa5d53701347e15592d26b8760df26f26e76064520616abd69e6a13ffbf278af88445c8c0326bc00807cc18a08bb3d0b770d7aaed4e97869e0

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

    Filesize

    173KB

    MD5

    a7097767238de44e2ebba9c2884091b4

    SHA1

    80254e29a26a7774c1f4671dc521931c871dd52a

    SHA256

    e47c157a8ba257c5185be3d9a01bd41840c41fdb54807160b8bf3487ab87b9b7

    SHA512

    88e3e97848a10156ad9aeaffa795552a15dbe89ce968d92cf1ab62dedb08b07262120bb6c0fb8b6e5b1e209fcac183b99bbf7489fcb551e2304a8b169e2e2a6e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    e10a92c2d4ae1a5ff2554994d7501dbd

    SHA1

    166cd3a584dd2beb2bb4e747b38608dea0558c05

    SHA256

    e1e0d11752ee8346a9c602732eb879b34e2bed70bf76d3e4b58fc6e95c81735b

    SHA512

    0980d28e7e2fa8f63bca3dbf6f95abb89ce0fa37ee3181982fb4e11a32eb9bb7ac53f08b6d19a4ca0031a5a1b9feaf9bf497d0282abcfa8900eaa22c1482ec01

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    08351edcec76ec3d0c801b3957a993c6

    SHA1

    e2da4a8b9b1e6b80cfc460ea09df4ecfc8d50522

    SHA256

    72df4067e8ddb92a0fb84bf4e859c9fdd010308cbfeed820bc01a3d0741d16dd

    SHA512

    ceaca8203c77e25a7739eba97057fed9ac8a459e4fad0603ed1ea97d2453912b48ac5533c80a674c0a84411205a5e52c61911b5b83dd1f511e93f043e9096fbe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc6425143ac9895d50ed7af460396ee8

    SHA1

    752af680e1a3b64a72e0308a05507ccf9ddcab30

    SHA256

    d44947b3d3483a8a4806312eced3f58e89f9380c414ac72fe3f74c22bf37cd9b

    SHA512

    20008758bdc2583a2996ba504b8db55426a78aaa2d0e0e2d79fa62f965775cd067fc8e2562a4fae6654f052729c1ee3d03afc5532722b7b87f96cc35ff491e4d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce66eaa5e86efe3d8cae4729261e7d82

    SHA1

    01e98273a3c099e9439e319c7b7ef27f7c6a02bf

    SHA256

    5afd1945694c5763843fa4b5798fd6251991078321cd20fd0c36b257cd9390a0

    SHA512

    2f5a98ff23bda5b3308951238315bc35077e38d59b0865ccd0d3e955f601106bfc9e79db5e58dfbc14b2c8148810a9f8fdc91681214371c6fa66375d70e911bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4dc36e9b2855395b785732a5ad25bef2

    SHA1

    591cac16b60742ce20f777eb793a128a026fea36

    SHA256

    b4e38c6d1f3b867d86a978ac59f0ec75713c70dfb45138425d77442dfba0048a

    SHA512

    a16892ca5f1e1298ad19a3c250cec60b2d8a5e8da47efd6470c2f17dbbd7f96feb44de57d3a144f11fa72f2e70804b56e75ff3d7ec25e31644f73f48c5d880cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    527615a65b0910436507834efa9ec7fe

    SHA1

    2bccd0013539c8c0c3cbf89300bdef04d9a71ffa

    SHA256

    705051789ca4296038fb3170084958355d7fe5c0ceab58a55a9aaef75802da5f

    SHA512

    1d505d2cd3e447f3ec81632e4f6ef4caa55abac62a964a4bdaa465b7015aa1e0599e73cf735d270dc7de10235df4876b51df5e671ced5c48c0c9c80f5166c92f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6df21218190eb8dfd187b6c3824522de

    SHA1

    9023be920b145570c3229f530e6ff8a0f369ca68

    SHA256

    d97d398ad8880d59eda8ae635a8c1928d581efe6c7972919de35a69b03d442d9

    SHA512

    ca7257ca3287f3f17983a699b43031a29d3961747b17f99e7845a368b969f2bdb93ae9470fc7c8fa12bfaeb5bc5e20785188529e6cc90cc3f985d630ce0879e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6a5e057baf5671ec5ca00d1c1ab4bdb6

    SHA1

    1d2d41513d7f79b0b24ee4d49f25eccc03c345dc

    SHA256

    14cda0603432d7cfed8f856044423f95b05cb1893509bda8502740b6ddcda097

    SHA512

    55e0490906b1bd80201b4b86eea7109bd25cb5ad9519b5bbd537baa294a647fd20f6ad0c46e8a9097e56f0f9684298c1145c76515035b503a570856e2aebd8b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    81824646d3e8406ce6a009b343abbf3a

    SHA1

    b1d2d5806945b07857a03d329aa542a313413f0f

    SHA256

    788574dbe5d02b4a90495e7a640de15b2e8ca36d3c3d6a27d3ca2dd6f57817f1

    SHA512

    48bd881f26f15919e4bc37768398c0d86a886a914ca117bb27a8bf7b1f6680528924cfc9cccd0f6c9be3ca4f5b4a8dc8d87eb1acd4a0a347954095fcbfe4b81e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c13673fb5c804f4e76f2191309bf1d9

    SHA1

    19b8d1ce66d1204864a9aced7e7d1d5e264450ed

    SHA256

    1d66891a29e31a7d421533f03526ad49867a44b0d48f4bc7b323226916cb55c4

    SHA512

    59039340d98074265971d2f5b0c7aae45d399e8c372f4c6545cb00ae80163c30f83f2226323f404776abb6102f2f3543c9789c064e6376c6feb76691ead658fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    950ff06e72482b00f96a0b0e43b9585b

    SHA1

    44de46d3c8942b1276d654618b97d370d3bb0bb5

    SHA256

    6ed933205ff583a2346bae202ff02c03ff17502a67be77875bafc868e3ababf6

    SHA512

    156b6c42d8a4cc4a03494bada54cdadd3d6d559254fa7e3d76ead91361272410abc2d8c8160a81ac59c0f2b66340deafe2e31b6a21fef94b61371c55086ae0f9

  • C:\Users\Admin\AppData\Local\Temp\Cab317F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar3180.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\cgelbnrbqnht.exe

    Filesize

    376KB

    MD5

    058acf9829eff85a0f5ede3d9e12add0

    SHA1

    58a3463d7059b578a54c90f7919e27d9caaba9b1

    SHA256

    24da2b7c562c96e5774cb08b6b9017e08d0e5c7032dedb32046153efccba46ea

    SHA512

    1a8f25d02333debc3ec85b11ed089642581fb519d8cf73931a78f392e30b67c678492e1606b33d9e28aafad14c2e12a4ed3c8f16329ad21de0f6fedf946636d7

  • memory/920-6118-0x00000000001A0000-0x00000000001A2000-memory.dmp

    Filesize

    8KB

  • memory/2516-0-0x0000000000270000-0x0000000000273000-memory.dmp

    Filesize

    12KB

  • memory/2516-19-0x0000000000270000-0x0000000000273000-memory.dmp

    Filesize

    12KB

  • memory/2516-1-0x0000000000270000-0x0000000000273000-memory.dmp

    Filesize

    12KB

  • memory/2760-18-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2760-28-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2760-2-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2760-6-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2760-20-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2760-16-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2760-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2760-12-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2760-10-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2760-8-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2760-5-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2856-6117-0x0000000004010000-0x0000000004012000-memory.dmp

    Filesize

    8KB

  • memory/2856-6121-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2856-51-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2856-49-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2856-50-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2856-806-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2856-6147-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2856-54-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2856-6120-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2856-56-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2856-845-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2856-6111-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2856-4889-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2856-2555-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2856-803-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/3008-30-0x0000000000400000-0x00000000008A8000-memory.dmp

    Filesize

    4.7MB