Analysis

  • max time kernel
    131s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09-12-2024 11:15

General

  • Target

    d957a4ca07273763ed76ba4eedce60b2_JaffaCakes118.exe

  • Size

    388KB

  • MD5

    d957a4ca07273763ed76ba4eedce60b2

  • SHA1

    357b159b7404225fb9271bc5c6645a79d8706153

  • SHA256

    ba45f2c559c3c2e0f76441928d967c31ad6b10ee3c65ada1bbd74ee8a0052dcb

  • SHA512

    0b1cef4d07a43d504b2ca95c6fbfe18f7e89235db6d6a6551f9be73ab800e2126e47fe23233b77575d34a1b91b0af576f8cb14205fdb2fd2516986b4d5057ce7

  • SSDEEP

    6144:XYMk7V7PQkaYO0iNq/PimTBQNEETJYOo0DldfrvwmjcMVW5OouUI5KtrQ8POyU:XnSdO0iNEPn+TGOoYzwscMSOXUIJ

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+jyxce.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/E251F02C506487A1 2. http://kkd47eh4hdjshb5t.angortra.at/E251F02C506487A1 3. http://ytrest84y5i456hghadefdsd.pontogrot.com/E251F02C506487A1 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/E251F02C506487A1 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://tt54rfdjhb34rfbnknaerg.milerteddy.com/E251F02C506487A1 http://kkd47eh4hdjshb5t.angortra.at/E251F02C506487A1 http://ytrest84y5i456hghadefdsd.pontogrot.com/E251F02C506487A1 *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/E251F02C506487A1
URLs

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/E251F02C506487A1

http://kkd47eh4hdjshb5t.angortra.at/E251F02C506487A1

http://ytrest84y5i456hghadefdsd.pontogrot.com/E251F02C506487A1

http://xlowfznrg4wf7dli.ONION/E251F02C506487A1

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Teslacrypt family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (396) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Drops startup file 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d957a4ca07273763ed76ba4eedce60b2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d957a4ca07273763ed76ba4eedce60b2_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Users\Admin\AppData\Local\Temp\d957a4ca07273763ed76ba4eedce60b2_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\d957a4ca07273763ed76ba4eedce60b2_JaffaCakes118.exe"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Windows\jiodgtqkcvbn.exe
        C:\Windows\jiodgtqkcvbn.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2840
        • C:\Windows\jiodgtqkcvbn.exe
          C:\Windows\jiodgtqkcvbn.exe
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:768
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2444
          • C:\Windows\SysWOW64\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
            5⤵
            • System Location Discovery: System Language Discovery
            • Opens file in notepad (likely ransom note)
            PID:920
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:880
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:880 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2764
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2844
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\JIODGT~1.EXE
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1212
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\D957A4~1.EXE
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:2776
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2416

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+jyxce.html

    Filesize

    9KB

    MD5

    7db800741d2edea9bd5e1616ddd6219b

    SHA1

    0ce68fe2a44f5d6ee48d4aa2da68e173a6f7935a

    SHA256

    9bdee57b37fab4d7003d3ec6ebce083ab5a088c646bc09ba42055d4fd30af51c

    SHA512

    b5719d03023fbcd2e1d2e51aa9bdc9f3b4487e75061083df30841434738cc42e77063fcb076b34edf9e2d62eb7835043390c18ce561edf53036959281256c3bf

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+jyxce.png

    Filesize

    63KB

    MD5

    6b6d2bbfd8043527ad643ba9dc6c2e11

    SHA1

    0bf2d65cdeecea2561dda1a58cb8e24f69ce0f5f

    SHA256

    0364bb76f0b2ca46bfb8ea1454db715749ab40197aa6dbf55ad0ac4019fdcd66

    SHA512

    1d6f5e7b78792a6042f25b28a4ed8f062da581fdf71ed1a7b0725a08c51daea6456435b2ebd05b14205e8c0eb417b225124c18d6881e46b0f592e44ea2de1829

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+jyxce.txt

    Filesize

    1KB

    MD5

    c769d08087573a6ffa978410b1d82150

    SHA1

    2f757083f0184713e38f5345d6cadac5763afb30

    SHA256

    7eb05e30e11d9e3c6bc77c4fb86e97725ecf90807b545e4bd925311a875acaff

    SHA512

    72699e83daaccfeebf8671b2aec800ff698bddcdae359b7da947efc7fba0a28407f0126331a642e6abdf3b6c50933e294fa57e1bed452013d0bde0152009e499

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

    Filesize

    11KB

    MD5

    61d34181044e0326514da2f698720339

    SHA1

    5f49be6ee51d542c2cd24ed7228b932c5ee8d349

    SHA256

    754cea10d147ccadc8bf7e540ada14868f1187d7ab2c77050206639fe709a038

    SHA512

    578250d0709cd79fdcae0594e6f57ab53134a623506538222422634364cab37fc625deb9dd1bb4cc578f112bce3e9f07be8abc727a3a0d4ebf4d6289eead2476

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

    Filesize

    109KB

    MD5

    41726e1c6b725f20dde01f38865945e2

    SHA1

    8dbdd9e3ce068d44325da7c54069b46d36be5251

    SHA256

    865403e4dd6cdf6be35120c7eec7797fc396fc883b3d8523ec8a08464ff6415b

    SHA512

    a499968088d52a1da9609bb99179f6b4888dddd7c891e95dcfbbe74407ff8a2f4ce8bfbc2deedf63a6ea389460c6b2354773e9415cffa7eefdfc221ac8daadc8

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

    Filesize

    173KB

    MD5

    e6155f3cfed0e911552321e292e40e4c

    SHA1

    c9e81cff1744d4dd61f4cfa6d33cf99bfcb04dc6

    SHA256

    5c8e24a4b17a9a6571e0b2a0a3ea9904a61076098e36dd7059337380ddfccf4b

    SHA512

    6cd8eb6e4bbe7bdbbe3c0751dfec6265d69af7d51b0a795f61ba9287af24c9ec9cf31dc6573215b4f2cebc7070081a098ccf85c23effc9326b4a70a374b27b5f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    e8d001378b805d4a49791d580c47d27e

    SHA1

    fbf36a15a28b8fffc3adf73a6097e5dad02ab49c

    SHA256

    719e1112200b2a20be4b075b292af4b5ede8caa2fd072870255d62b187bee67f

    SHA512

    569be2f2acb7153a9f7aa231f7d0cb5308a08a5f2bba6895d3e10027b4f1c75e7a609a72f2de00ae560a80d3dc00cea2603b118b16b2edf22cd28ddd44d5b30f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a2a89483e1a1e62f38d59a057e0d84b9

    SHA1

    085e92024fc9e3903c2cb274ac7ce48eb6721884

    SHA256

    e53210a6d6f884ffbb20e3e1266107f5830d2c08451cac22d1ed7031369d1c70

    SHA512

    3397e3a536001e985e616af514fac90a3bd410df5d3ef4cd810581ebba2bd0d3b8634c5dc2c76ae1cd5796a71617e3b0d710d95c4c8aaa8089d594b73bb55e41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa23d0bfbca0c93c354af919abb59061

    SHA1

    7d827a83e1f969d2456f63e743791704c2f18a57

    SHA256

    7c3bac709f191b02d30452b653e4cd0cd3e7f74ae3eb162c37be7e3663f701c1

    SHA512

    257e9b1a0919e7299e2f080b9b3d332a24551871a773ffe08d0a1e798a2bd6ab8f3a5158512d7ad82f83c83ba0712577c4eb29c1102ab6b0ae46b0527fe64193

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6bc467fceb2d2e64c88ad24604057629

    SHA1

    35d903fdcfa6c8ac02e3a0254c8d08ddabc1f5eb

    SHA256

    674e923cff34f217ea0e10755b574d6d4d7e906376af73c32e52d2b8a73bf093

    SHA512

    01bc4503656a4cd8a7224e42c85d1ee34934a74c96d74d816aa0ad7771dbb57e05409c205fe300d5e806e3157ca9d4d4b907ebf1eb588053a432023add40b1c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5680af0404e956c5b6e8b0f53e64e2bd

    SHA1

    7bb102aa7d6d11b4b392ca7089cff30bb2217002

    SHA256

    f18d54d6906e4da4b920762601c88f3d6ead5c015802c6cdd2ab64ad8d2be6b3

    SHA512

    6e1d4910ca3f490454a9242634331d21611039585e66e66d715c941ffe45bcb7e441bb5af7b9203eb3ed6508b48e8436b67ea122647a5cb1b41f0b4642a96408

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    48b28fe820ea3e59226d6e98ac92a881

    SHA1

    efd06571671dbd2a5b7503ef1d8036496448679c

    SHA256

    d298c3ad5f83c2f85721bcc95af8e65a5d60168bb544ae5b723badebd84e34b1

    SHA512

    9f24ad819fe2eabe2f0756f534eaaeb04268f190596da3d0f7cf869641590c08d32186360f4324b4d18b5a735bb67bded082b8855051219c2860b684122249df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    98aa5a4b000a18c40ce5b204e36acc24

    SHA1

    4be9469002537c354c65d23a402d52dea2c057c6

    SHA256

    2644fab2c117e76f38c6d00d1b970a372b2f12e5c6dba0037e5ffc09af940b66

    SHA512

    668bbcf3d3821abf53c3532a383f2dc120f14ea282687a1296c86063289089bfc5f044ed93df01eedda81d5bbb2a339df23eb4c01a0e93fc5ece9bb9e9f05039

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    83883511d43c0f59ca959976e818dcb2

    SHA1

    684f808f3c788a21abdd29fbda935556e4b4a864

    SHA256

    b216c0822c1e93f744b051e3c5e32885a78a717b156edab5864574c6717b43a6

    SHA512

    026f758855bb8b35fe88034f0cf8aa8ec9f6c4cedbf63031d7d7941b3cc9e7ade86bd1a6f487ef5a48c2fcf5105dc0a9a7922fe106e99c7e0f87c6bcead195a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    452cfbfc2265dc3c916d4ac4627daacb

    SHA1

    4bb4239b4490ab584a0952439733f869e12f8903

    SHA256

    34b2af6b2367b1bdf4449a8731e6b68ecb4518905b5e475e73a7445718b06163

    SHA512

    5f0a664744226c50b648c6f78e4f4490067a842d5e586c675f3a95a1937b5d811f3611ca8e4731b0cddc3470b1d6a248148bdebb7b159849be39ced30ed7eafc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fef3c2375720a3df0a439e8c9ceb2879

    SHA1

    8c1381ef9e0e72bb4e0e2ab9a91deed4304816f9

    SHA256

    c5f81ee2abad63436a0e0da8a38a6cf3052e3788121dbc41c2602f21a8650ad6

    SHA512

    edb3903319199853b74a4067e40be4c963cb9d642f9fe349aa0461e6f07a276e2b28393a1dc5274caa6b2c6f32686660161b419fedceca1b6a944db2d29f37e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    040af68f79453d8b0fd7420cb53f1b1f

    SHA1

    e018e2f043ac9e1af1fb1d6082aefd35bf28ac60

    SHA256

    38c3c61ed7911200381fdf3d9ff3c570c125bc32d341230f574eb1864c619962

    SHA512

    dbb5af81cb5aee8c58693f888ffbc7d37314836abf54d6b2947dc15aab9577e10bba08662a4c79ad835c2b1d1bfbc280c03f79aaa70af0da218158d3c2f33b7d

  • C:\Users\Admin\AppData\Local\Temp\Cab510E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar5140.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\jiodgtqkcvbn.exe

    Filesize

    388KB

    MD5

    d957a4ca07273763ed76ba4eedce60b2

    SHA1

    357b159b7404225fb9271bc5c6645a79d8706153

    SHA256

    ba45f2c559c3c2e0f76441928d967c31ad6b10ee3c65ada1bbd74ee8a0052dcb

    SHA512

    0b1cef4d07a43d504b2ca95c6fbfe18f7e89235db6d6a6551f9be73ab800e2126e47fe23233b77575d34a1b91b0af576f8cb14205fdb2fd2516986b4d5057ce7

  • memory/768-863-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/768-6042-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/768-861-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/768-50-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/768-884-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/768-57-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/768-52-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/768-51-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/768-2918-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/768-5061-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/768-6006-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/768-6012-0x0000000002EE0000-0x0000000002EE2000-memory.dmp

    Filesize

    8KB

  • memory/768-6039-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/768-6015-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/768-6016-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/768-55-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2016-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2016-18-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2016-6-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2016-30-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2016-2-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2016-4-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2016-20-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2016-10-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2016-8-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2016-16-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2016-12-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2368-0-0x00000000001F0000-0x00000000001F3000-memory.dmp

    Filesize

    12KB

  • memory/2368-19-0x00000000001F0000-0x00000000001F3000-memory.dmp

    Filesize

    12KB

  • memory/2368-1-0x00000000001F0000-0x00000000001F3000-memory.dmp

    Filesize

    12KB

  • memory/2416-6013-0x00000000001A0000-0x00000000001A2000-memory.dmp

    Filesize

    8KB

  • memory/2840-31-0x0000000000400000-0x000000000085C000-memory.dmp

    Filesize

    4.4MB