Analysis
-
max time kernel
145s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 00:56
Static task
static1
Behavioral task
behavioral1
Sample
018da124d03e2fc4054fd877193b3609_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
018da124d03e2fc4054fd877193b3609_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
018da124d03e2fc4054fd877193b3609_JaffaCakes118.exe
-
Size
680KB
-
MD5
018da124d03e2fc4054fd877193b3609
-
SHA1
9cfd5c3bf0cf5ee986542dd277d2e86a3e700873
-
SHA256
bf34af4df4b156e6f0732d8829a299da9927287c66c90f5cf4421bf7c9c05ffe
-
SHA512
83107f4d351e5d97156157408e0afecb950494a00bd5950ced74cd22fa568b9cc52202dbf6d8ef52795a5436bf432b4ad66a1fcf8e36ae96fe587898b6f91888
-
SSDEEP
12288:PZU0m27GTG1pjZBwirrwVtPF3Z4mxxnDqVTVOCm:G0t7EGBqi2PQmX2VTzm
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe modiloader_stage2 behavioral2/memory/2428-63-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral2/memory/3216-67-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral2/memory/3236-74-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral2/memory/3236-88-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral2/memory/3236-96-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
Processes:
4.exerejoice47.exepid process 3216 4.exe 3236 rejoice47.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
018da124d03e2fc4054fd877193b3609_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 018da124d03e2fc4054fd877193b3609_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
Processes:
rejoice47.exedescription ioc process File created C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe -
Suspicious use of SetThreadContext 6 IoCs
Processes:
rejoice47.exedescription pid process target process PID 3236 set thread context of 2428 3236 rejoice47.exe calc.exe PID 3236 set thread context of 3608 3236 rejoice47.exe calc.exe PID 3236 set thread context of 2608 3236 rejoice47.exe calc.exe PID 3236 set thread context of 1020 3236 rejoice47.exe calc.exe PID 3236 set thread context of 1436 3236 rejoice47.exe calc.exe PID 3236 set thread context of 1376 3236 rejoice47.exe calc.exe -
Drops file in Program Files directory 3 IoCs
Processes:
4.exedescription ioc process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe 4.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe 4.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupDel.bat 4.exe -
Program crash 15 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 5116 2428 WerFault.exe calc.exe 4004 3608 WerFault.exe calc.exe 3408 2608 WerFault.exe calc.exe 4504 1020 WerFault.exe calc.exe 972 1436 WerFault.exe calc.exe 4488 860 WerFault.exe calc.exe 1544 1376 WerFault.exe calc.exe 1692 3304 WerFault.exe calc.exe 3980 4544 WerFault.exe calc.exe 1960 2332 WerFault.exe calc.exe 1564 2616 WerFault.exe calc.exe 3528 2832 WerFault.exe calc.exe 1108 4320 WerFault.exe calc.exe 3256 3632 WerFault.exe calc.exe 4092 1252 WerFault.exe calc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
018da124d03e2fc4054fd877193b3609_JaffaCakes118.exe4.exerejoice47.exedescription pid process target process PID 2928 wrote to memory of 3216 2928 018da124d03e2fc4054fd877193b3609_JaffaCakes118.exe 4.exe PID 2928 wrote to memory of 3216 2928 018da124d03e2fc4054fd877193b3609_JaffaCakes118.exe 4.exe PID 2928 wrote to memory of 3216 2928 018da124d03e2fc4054fd877193b3609_JaffaCakes118.exe 4.exe PID 3216 wrote to memory of 3236 3216 4.exe rejoice47.exe PID 3216 wrote to memory of 3236 3216 4.exe rejoice47.exe PID 3216 wrote to memory of 3236 3216 4.exe rejoice47.exe PID 3236 wrote to memory of 2428 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 2428 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 2428 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 2428 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 2428 3236 rejoice47.exe calc.exe PID 3216 wrote to memory of 2540 3216 4.exe cmd.exe PID 3216 wrote to memory of 2540 3216 4.exe cmd.exe PID 3216 wrote to memory of 2540 3216 4.exe cmd.exe PID 3236 wrote to memory of 3608 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 3608 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 3608 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 3608 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 3608 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 2608 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 2608 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 2608 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 2608 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 2608 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 1020 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 1020 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 1020 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 1020 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 1020 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 1436 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 1436 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 1436 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 1436 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 1436 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 860 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 860 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 860 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 860 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 860 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 1376 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 1376 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 1376 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 1376 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 1376 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 3304 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 3304 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 3304 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 3304 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 3304 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 4544 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 4544 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 4544 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 4544 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 4544 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 2332 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 2332 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 2332 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 2332 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 2332 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 2616 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 2616 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 2616 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 2616 3236 rejoice47.exe calc.exe PID 3236 wrote to memory of 2616 3236 rejoice47.exe calc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\018da124d03e2fc4054fd877193b3609_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\018da124d03e2fc4054fd877193b3609_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 125⤵
- Program crash
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3608 -s 125⤵
- Program crash
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 125⤵
- Program crash
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 125⤵
- Program crash
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 125⤵
- Program crash
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 860 -s 125⤵
- Program crash
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 125⤵
- Program crash
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3304 -s 125⤵
- Program crash
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4544 -s 125⤵
- Program crash
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 125⤵
- Program crash
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 125⤵
- Program crash
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 125⤵
- Program crash
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4320 -s 125⤵
- Program crash
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 125⤵
- Program crash
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 125⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupDel.bat""3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2428 -ip 24281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3608 -ip 36081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2608 -ip 26081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1020 -ip 10201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1436 -ip 14361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 860 -ip 8601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1376 -ip 13761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3304 -ip 33041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4544 -ip 45441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2332 -ip 23321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2616 -ip 26161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2832 -ip 28321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4320 -ip 43201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 3632 -ip 36321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 1252 -ip 12521⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupDel.batFilesize
144B
MD58ae64039d826b5cd7b18f19cd02448fc
SHA19fbbc25be9a768acc0f028a24aa8733f6ab4c80b
SHA256ff89096af7bf23fbabfdf635f6f5707fae6ce937326ba951bdc44abd89b0d175
SHA512f01616a7efb2a2a93430eb72bda046064150f9f8416d421c4f78fa947a2ac75a00ff01097336b53e605d7747a84f1b024381717ccfa5acdfd5bb47b7aaf1bb09
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exeFilesize
743KB
MD5c720dbe605467d3826e771fc9ee13ff0
SHA13bef9ad69b26fdaac46badd9093e4bd74b86ebd0
SHA256dfc0b72646ea07ba0d600b08d52acd4d277ed04e3c35355a7689e4b99cc61d00
SHA512ec9accfffcea3031081f5b7758b4f62d0ce1794dcff8aa3bbd71f02c35ba86a8b1801a065a482eaec204d52fe9ed5a24a9abbb2cac557f53df4e6a48c709ac4e
-
memory/2428-63-0x0000000000400000-0x00000000004C3000-memory.dmpFilesize
780KB
-
memory/2928-1-0x00000000004E0000-0x0000000000534000-memory.dmpFilesize
336KB
-
memory/2928-0-0x0000000001000000-0x000000000110C000-memory.dmpFilesize
1.0MB
-
memory/2928-12-0x0000000003110000-0x0000000003111000-memory.dmpFilesize
4KB
-
memory/2928-49-0x0000000003100000-0x0000000003101000-memory.dmpFilesize
4KB
-
memory/2928-48-0x0000000003100000-0x0000000003101000-memory.dmpFilesize
4KB
-
memory/2928-47-0x0000000003110000-0x0000000003111000-memory.dmpFilesize
4KB
-
memory/2928-46-0x0000000003110000-0x0000000003111000-memory.dmpFilesize
4KB
-
memory/2928-45-0x0000000003110000-0x0000000003111000-memory.dmpFilesize
4KB
-
memory/2928-52-0x0000000003100000-0x0000000003101000-memory.dmpFilesize
4KB
-
memory/2928-44-0x0000000003110000-0x0000000003111000-memory.dmpFilesize
4KB
-
memory/2928-43-0x0000000003110000-0x0000000003111000-memory.dmpFilesize
4KB
-
memory/2928-42-0x0000000000D10000-0x0000000000D11000-memory.dmpFilesize
4KB
-
memory/2928-41-0x0000000000CB0000-0x0000000000CB1000-memory.dmpFilesize
4KB
-
memory/2928-40-0x0000000000CC0000-0x0000000000CC1000-memory.dmpFilesize
4KB
-
memory/2928-39-0x0000000000CE0000-0x0000000000CE1000-memory.dmpFilesize
4KB
-
memory/2928-38-0x0000000000D00000-0x0000000000D01000-memory.dmpFilesize
4KB
-
memory/2928-37-0x0000000003100000-0x0000000003101000-memory.dmpFilesize
4KB
-
memory/2928-36-0x0000000000C20000-0x0000000000C21000-memory.dmpFilesize
4KB
-
memory/2928-35-0x0000000000C90000-0x0000000000C91000-memory.dmpFilesize
4KB
-
memory/2928-34-0x0000000000C60000-0x0000000000C61000-memory.dmpFilesize
4KB
-
memory/2928-33-0x0000000000C70000-0x0000000000C71000-memory.dmpFilesize
4KB
-
memory/2928-32-0x0000000000C00000-0x0000000000C01000-memory.dmpFilesize
4KB
-
memory/2928-31-0x0000000000C10000-0x0000000000C11000-memory.dmpFilesize
4KB
-
memory/2928-30-0x0000000000C80000-0x0000000000C81000-memory.dmpFilesize
4KB
-
memory/2928-29-0x0000000000C30000-0x0000000000C31000-memory.dmpFilesize
4KB
-
memory/2928-28-0x0000000000C50000-0x0000000000C51000-memory.dmpFilesize
4KB
-
memory/2928-27-0x0000000003100000-0x0000000003101000-memory.dmpFilesize
4KB
-
memory/2928-26-0x0000000003100000-0x0000000003101000-memory.dmpFilesize
4KB
-
memory/2928-25-0x0000000003100000-0x0000000003101000-memory.dmpFilesize
4KB
-
memory/2928-24-0x0000000003100000-0x0000000003101000-memory.dmpFilesize
4KB
-
memory/2928-23-0x0000000003110000-0x0000000003111000-memory.dmpFilesize
4KB
-
memory/2928-22-0x0000000003110000-0x0000000003111000-memory.dmpFilesize
4KB
-
memory/2928-21-0x0000000003110000-0x0000000003111000-memory.dmpFilesize
4KB
-
memory/2928-20-0x0000000003110000-0x0000000003111000-memory.dmpFilesize
4KB
-
memory/2928-19-0x0000000003110000-0x0000000003111000-memory.dmpFilesize
4KB
-
memory/2928-18-0x0000000003110000-0x0000000003111000-memory.dmpFilesize
4KB
-
memory/2928-17-0x0000000003110000-0x0000000003111000-memory.dmpFilesize
4KB
-
memory/2928-16-0x0000000003110000-0x0000000003111000-memory.dmpFilesize
4KB
-
memory/2928-15-0x0000000000BE0000-0x0000000000BE1000-memory.dmpFilesize
4KB
-
memory/2928-14-0x0000000003110000-0x0000000003111000-memory.dmpFilesize
4KB
-
memory/2928-13-0x0000000003110000-0x0000000003111000-memory.dmpFilesize
4KB
-
memory/2928-11-0x0000000003110000-0x0000000003111000-memory.dmpFilesize
4KB
-
memory/2928-10-0x0000000003110000-0x0000000003111000-memory.dmpFilesize
4KB
-
memory/2928-9-0x0000000003110000-0x0000000003111000-memory.dmpFilesize
4KB
-
memory/2928-8-0x00000000005D0000-0x00000000005D1000-memory.dmpFilesize
4KB
-
memory/2928-7-0x0000000000BC0000-0x0000000000BC1000-memory.dmpFilesize
4KB
-
memory/2928-6-0x00000000004D0000-0x00000000004D1000-memory.dmpFilesize
4KB
-
memory/2928-5-0x0000000000540000-0x0000000000541000-memory.dmpFilesize
4KB
-
memory/2928-4-0x0000000000BD0000-0x0000000000BD1000-memory.dmpFilesize
4KB
-
memory/2928-3-0x0000000000560000-0x0000000000561000-memory.dmpFilesize
4KB
-
memory/2928-2-0x00000000005C0000-0x00000000005C1000-memory.dmpFilesize
4KB
-
memory/2928-70-0x00000000004E0000-0x0000000000534000-memory.dmpFilesize
336KB
-
memory/2928-69-0x0000000001000000-0x000000000110C000-memory.dmpFilesize
1.0MB
-
memory/3216-67-0x0000000000400000-0x00000000004C3000-memory.dmpFilesize
780KB
-
memory/3236-74-0x0000000000400000-0x00000000004C3000-memory.dmpFilesize
780KB
-
memory/3236-88-0x0000000000400000-0x00000000004C3000-memory.dmpFilesize
780KB
-
memory/3236-96-0x0000000000400000-0x00000000004C3000-memory.dmpFilesize
780KB