Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2024, 23:30

General

  • Target

    2e3883c6913458524489f5d462646256_JaffaCakes118.exe

  • Size

    194KB

  • MD5

    2e3883c6913458524489f5d462646256

  • SHA1

    ffbec2986e76fbb9ff7fac9f60f55f6da34e125f

  • SHA256

    5ac8eca2ae52ce97e83646f5b3e612dda8d3ba00cc3173f6e9740695ad0b21cc

  • SHA512

    b9b824eb107ceace5111d1a8c14dd4ea71f8853aab3ae2e6153b212785c3c72d480739110faabed865bcc5a79a092f650d646f23761a54d30f14961f923d492a

  • SSDEEP

    6144:e9lA189qNR9701KY76ewvP6bQ7yMP+DE827SH6:il4kmRyp7I6b7MP+Dd2J

Score
10/10

Malware Config

Signatures

  • Modifies security service 2 TTPs 22 IoCs
  • Executes dropped EXE 10 IoCs
  • Drops file in System32 directory 22 IoCs
  • Modifies registry class 33 IoCs
  • Runs .reg file with regedit 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e3883c6913458524489f5d462646256_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2e3883c6913458524489f5d462646256_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\ab3.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3880
      • C:\Windows\SysWOW64\regedit.exe
        REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
        3⤵
        • Modifies security service
        • Runs .reg file with regedit
        PID:1596
    • C:\Windows\SysWOW64\Tilevbq.com
      C:\Windows\system32\Tilevbq.com 1140 "C:\Users\Admin\AppData\Local\Temp\2e3883c6913458524489f5d462646256_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2828
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c c:\ab3.bat
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2008
        • C:\Windows\SysWOW64\regedit.exe
          REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
          4⤵
          • Modifies security service
          • Runs .reg file with regedit
          PID:396
      • C:\Windows\SysWOW64\Tilevbq.com
        C:\Windows\system32\Tilevbq.com 1208 "C:\Windows\SysWOW64\Tilevbq.com"
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1304
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c c:\ab3.bat
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4784
          • C:\Windows\SysWOW64\regedit.exe
            REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
            5⤵
            • Modifies security service
            • Runs .reg file with regedit
            PID:2444
        • C:\Windows\SysWOW64\Tilevbq.com
          C:\Windows\system32\Tilevbq.com 1180 "C:\Windows\SysWOW64\Tilevbq.com"
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3480
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c c:\ab3.bat
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3820
            • C:\Windows\SysWOW64\regedit.exe
              REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
              6⤵
              • Modifies security service
              • Runs .reg file with regedit
              PID:2572
          • C:\Windows\SysWOW64\Tilevbq.com
            C:\Windows\system32\Tilevbq.com 1184 "C:\Windows\SysWOW64\Tilevbq.com"
            5⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:4516
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c c:\ab3.bat
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2848
              • C:\Windows\SysWOW64\regedit.exe
                REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
                7⤵
                • Modifies security service
                • Runs .reg file with regedit
                PID:3640
            • C:\Windows\SysWOW64\Tilevbq.com
              C:\Windows\system32\Tilevbq.com 1192 "C:\Windows\SysWOW64\Tilevbq.com"
              6⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:3636
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c c:\ab3.bat
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1584
                • C:\Windows\SysWOW64\regedit.exe
                  REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
                  8⤵
                  • Modifies security service
                  • Runs .reg file with regedit
                  PID:220
              • C:\Windows\SysWOW64\Tilevbq.com
                C:\Windows\system32\Tilevbq.com 1196 "C:\Windows\SysWOW64\Tilevbq.com"
                7⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2572
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c c:\ab3.bat
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2136
                  • C:\Windows\SysWOW64\regedit.exe
                    REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
                    9⤵
                    • Modifies security service
                    • Runs .reg file with regedit
                    PID:3924
                • C:\Windows\SysWOW64\Tilevbq.com
                  C:\Windows\system32\Tilevbq.com 1200 "C:\Windows\SysWOW64\Tilevbq.com"
                  8⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:4340
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c c:\ab3.bat
                    9⤵
                      PID:4820
                      • C:\Windows\SysWOW64\regedit.exe
                        REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
                        10⤵
                        • Modifies security service
                        • Runs .reg file with regedit
                        PID:3572
                    • C:\Windows\SysWOW64\Tilevbq.com
                      C:\Windows\system32\Tilevbq.com 1188 "C:\Windows\SysWOW64\Tilevbq.com"
                      9⤵
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Modifies registry class
                      PID:1996
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c c:\ab3.bat
                        10⤵
                          PID:432
                          • C:\Windows\SysWOW64\regedit.exe
                            REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
                            11⤵
                            • Modifies security service
                            • Runs .reg file with regedit
                            PID:4444
                        • C:\Windows\SysWOW64\Tilevbq.com
                          C:\Windows\system32\Tilevbq.com 1216 "C:\Windows\SysWOW64\Tilevbq.com"
                          10⤵
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • Modifies registry class
                          PID:4264
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c c:\ab3.bat
                            11⤵
                              PID:3872
                              • C:\Windows\SysWOW64\regedit.exe
                                REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
                                12⤵
                                • Modifies security service
                                • Runs .reg file with regedit
                                PID:3196
                            • C:\Windows\SysWOW64\Tilevbq.com
                              C:\Windows\system32\Tilevbq.com 1212 "C:\Windows\SysWOW64\Tilevbq.com"
                              11⤵
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Modifies registry class
                              PID:4272
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c c:\ab3.bat
                                12⤵
                                  PID:1032
                                  • C:\Windows\SysWOW64\regedit.exe
                                    REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
                                    13⤵
                                    • Modifies security service
                                    • Runs .reg file with regedit
                                    PID:4220

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\1.reg

            Filesize

            449B

            MD5

            c6b0028a6f5508ef564d624eda0e72bc

            SHA1

            18901c9856a9af672c2e27383c15d2da41f27b6b

            SHA256

            b41f477ecd348b1c3e12ef410d67b712627ed0696769c2c8cc2f087d02121d06

            SHA512

            5d5f6fb437767096562f2ab9aac2cb75611afcc090b0a65ea63dfbadb3c4a73a3d45bbe139e43a7beea889370c76ac2eb2aa0fdffa92b69cfe47dd1ffbf10a71

          • C:\Users\Admin\AppData\Local\Temp\1.reg

            Filesize

            1KB

            MD5

            bf7ee07851e04b2a0dbe554db62dc3aa

            SHA1

            cad155b66053cd7ce2b969a0eb20a8f4812b1f46

            SHA256

            13dc8dc70b7bb240f6f4cf6be5ff0ec55c606267a328bb9c9e34e5fa70cce0d9

            SHA512

            9ed79305c81287cf01d0138d87c6ec981b5bdd9195c56f8def4c74fdbc9b4816661d084fc1314f99b40102945b61d05121f4eaadec6403d4295a80847b797bc4

          • C:\Users\Admin\AppData\Local\Temp\1.reg

            Filesize

            3KB

            MD5

            9e5db93bd3302c217b15561d8f1e299d

            SHA1

            95a5579b336d16213909beda75589fd0a2091f30

            SHA256

            f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e

            SHA512

            b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a

          • C:\Users\Admin\AppData\Local\Temp\1.reg

            Filesize

            3KB

            MD5

            752fd85212d47da8f0adc29004a573b2

            SHA1

            fa8fe3ff766601db46412879dc13dbec8d055965

            SHA256

            9faa69e9dabfb4beb40790bf12d0ae2ac0a879fb045e38c03b9e4d0ab569636e

            SHA512

            d7bbadb2ed764717dc01b012832e5c1debd6615bbdc121b5954e61d6364a03b2dd03718bdea26c5c2a6dbb6e33c5a7657c76862f6d8c0a916f7a0f9f8dd3b209

          • C:\Users\Admin\AppData\Local\Temp\1.reg

            Filesize

            1KB

            MD5

            3637baf389a0d79b412adb2a7f1b7d09

            SHA1

            f4b011a72f59cf98a325f12b7e40ddd0548ccc16

            SHA256

            835336f5d468ac1d8361f9afbc8e69ff1538c51b0b619d641b4b41dcfaa39cba

            SHA512

            ea71a49c3673e9ce4f92d0f38441b3bc5b3b9ef6649caa21972648e34b6cec8694fa8fb7fc0ddad1e58f0464e0ba917c4500090a3db3fc07e1d258079c1c2506

          • C:\Users\Admin\AppData\Local\Temp\1.reg

            Filesize

            1KB

            MD5

            c2d6056624c1d37b1baf4445d8705378

            SHA1

            90c0b48eca9016a7d07248ecdb7b93bf3e2f1a83

            SHA256

            3c20257f9e5c689af57f1dbfb8106351bf4cdfbbb922cf0beff34a2ca14f5a96

            SHA512

            d199ce15627b85d75c9c3ec5c91fa15b2f799975034e0bd0526c096f41afea4ff6d191a106f626044fbfae264e2b0f3776fde326fc0c2d0dc8d83de66adc7c29

          • C:\Users\Admin\AppData\Local\Temp\1.reg

            Filesize

            3KB

            MD5

            831afd728dd974045c0654510071d405

            SHA1

            9484f4ee8e9eef0956553a59cfbcbe99a8822026

            SHA256

            03223eaae4ac389215cb8a9cb4e4d5a70b67f791f90e57b8efd3f975f5cf6af2

            SHA512

            ab7ac4d6d45b8aac5f82432468d40bd2b5bfae6d93006732ce27a6513fd3e7ddc94c029051092bf8b6f5649688c0f6600dbd88968732fc7b779e916e6bcda5c9

          • C:\Users\Admin\AppData\Local\Temp\1.reg

            Filesize

            1KB

            MD5

            a437192517c26d96c8cee8d5a27dd560

            SHA1

            f665a3e5e5c141e4527509dffd30b0320aa8df6f

            SHA256

            d0ec3ddd0503ee6ddae52c33b6c0b8780c73b8f27ca3aadc073f7fa512702e23

            SHA512

            f9538163b6c41ff5419cb12a9c103c0da5afbfe6237317985d45ff243c4f15ee89a86eab2b4d02cbda1a14596d2f24d3d1cdf05bb3e5fd931fbe9be4b869aa41

          • C:\Users\Admin\AppData\Local\Temp\1.reg

            Filesize

            1KB

            MD5

            b99b0dc7cab4e69d365783a5c4273a83

            SHA1

            5fcc44aa2631c923e9961266a2e0dbeaaabe84da

            SHA256

            1fc967a5c8f7859ba0c410978d165085f241195fe4a31d61a127e38c30d435e4

            SHA512

            495474416f5eccd40829d42f050464903273d564cb862b1bd0657262485e634b5d466363cac085406c6d830f42a2f7b5648818b2efe6db1a90833a4b90a6a14d

          • C:\Users\Admin\AppData\Local\Temp\1.reg

            Filesize

            2KB

            MD5

            6dd7ad95427e77ae09861afd77104775

            SHA1

            81c2ffe8c63e71f013a07e5794473b60f50c0716

            SHA256

            8eb7ba2c4ca558bb764f1db1ea0da16c08791a79e995704e5c1b9f3e855008c2

            SHA512

            171d8a96006ea9ff2655af49bd3bfc4702ba8573b3e6f93237ee52e0be68dd09e123495f9fbda9ff69d03fe843d9306798cae6c156202d48b8d021722eedc7cb

          • C:\Users\Admin\AppData\Local\Temp\1.reg

            Filesize

            1KB

            MD5

            989c5352030fafd44b92adf4d4164738

            SHA1

            e02985c15eb20682115e3fc343f829e28770ed6c

            SHA256

            248c7793d113ca762bbe56b974f4c5902339dacb0b47ddd7c412340a623dfe38

            SHA512

            9ebcfc38952d968d608d68b2e8fbb56f5d02ed03e0e2d02661caeb50f804404d95fc45f22a8376ca88b69548c89c22b6c6a9acbb7fdcb5f6f906bd871b3465f1

          • C:\Users\Admin\AppData\Local\Temp\1.reg

            Filesize

            2KB

            MD5

            0a839c0e3eb1ed25e6211159e43f4df1

            SHA1

            a227a9322f58b8f40b2f6f326dca58145f599587

            SHA256

            717a2b81d076586548a0387c97d2dc31337a03763c6e7acb642c3e46ec94d6f0

            SHA512

            bd2b99fb43ccd1676f69752c1a295d1da0db2cb0310c8b097b4b5b91d76cff12b433f47af02b5f7d0dd5f8f16624b0c20294eebf5c6a7959b2b5d6fe2b34e508

          • C:\Users\Admin\AppData\Local\Temp\1.reg

            Filesize

            849B

            MD5

            558ce6da965ba1758d112b22e15aa5a2

            SHA1

            a365542609e4d1dc46be62928b08612fcabe2ede

            SHA256

            c11beaac10a5e00391ef4b41be8c240f59c5a2dc930aead6d7db237fcd2641fb

            SHA512

            37f7f10c3d201b11cc5224ae69c5990eb33b4430c601d3c21f6bec9323621120442e0cfa49e1f4eda459ea4ac750277e446dca78b9e44c1445bd891e4e460b5c

          • C:\Users\Admin\AppData\Local\Temp\1.reg

            Filesize

            3KB

            MD5

            7fe70731de9e888ca911baeb99ee503d

            SHA1

            0073da5273512f66dbf570580dc55957535c2478

            SHA256

            ec8ce13a4cab475695329eddc61ff2eee378e79f0d2f9ca3a9bc7b18bd52b89a

            SHA512

            4421df7085fd2aac218d5544152d77080b99c1eaa24076975a6b1bb01149a19a1c0d6cc2c042cd507b37af9a220e7ce1f026103cdabfaec5994b1533c2f3eeac

          • C:\Users\Admin\AppData\Local\Temp\1.reg

            Filesize

            3KB

            MD5

            ad9e5e67282bb74482c05e3bf2eb188b

            SHA1

            10b02442ea4b1151a2334645c3e290a82ecfad1f

            SHA256

            7af82efceff1e9221d76472e6ffd6aa78ca00ccbb5fa32cb2238ed08812b931f

            SHA512

            b0ca37f35618547b4e5ab94eb367940a9d5a500b5c91cf2bbdddba8d1725bcc619c5acd2365711a970c307bbe0aa539b50803d119963b9f0c6da198e3157ded7

          • C:\Windows\SysWOW64\Tilevbq.com

            Filesize

            194KB

            MD5

            2e3883c6913458524489f5d462646256

            SHA1

            ffbec2986e76fbb9ff7fac9f60f55f6da34e125f

            SHA256

            5ac8eca2ae52ce97e83646f5b3e612dda8d3ba00cc3173f6e9740695ad0b21cc

            SHA512

            b9b824eb107ceace5111d1a8c14dd4ea71f8853aab3ae2e6153b212785c3c72d480739110faabed865bcc5a79a092f650d646f23761a54d30f14961f923d492a

          • \??\c:\ab3.bat

            Filesize

            5KB

            MD5

            0019a0451cc6b9659762c3e274bc04fb

            SHA1

            5259e256cc0908f2846e532161b989f1295f479b

            SHA256

            ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876

            SHA512

            314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904

          • memory/1304-420-0x0000000000400000-0x0000000000484000-memory.dmp

            Filesize

            528KB

          • memory/1304-534-0x0000000000400000-0x0000000000484000-memory.dmp

            Filesize

            528KB

          • memory/1304-306-0x0000000000400000-0x0000000000484000-memory.dmp

            Filesize

            528KB

          • memory/1348-168-0x00000000032B0000-0x00000000032B1000-memory.dmp

            Filesize

            4KB

          • memory/1348-34-0x0000000002500000-0x0000000002501000-memory.dmp

            Filesize

            4KB

          • memory/1348-20-0x0000000002300000-0x0000000002301000-memory.dmp

            Filesize

            4KB

          • memory/1348-19-0x00000000022D0000-0x00000000022D1000-memory.dmp

            Filesize

            4KB

          • memory/1348-18-0x00000000022E0000-0x00000000022E1000-memory.dmp

            Filesize

            4KB

          • memory/1348-17-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/1348-16-0x00000000022C0000-0x00000000022C1000-memory.dmp

            Filesize

            4KB

          • memory/1348-15-0x0000000002290000-0x0000000002291000-memory.dmp

            Filesize

            4KB

          • memory/1348-14-0x00000000022A0000-0x00000000022A1000-memory.dmp

            Filesize

            4KB

          • memory/1348-22-0x0000000002430000-0x0000000002431000-memory.dmp

            Filesize

            4KB

          • memory/1348-12-0x0000000002280000-0x0000000002281000-memory.dmp

            Filesize

            4KB

          • memory/1348-11-0x00000000005D0000-0x00000000005D1000-memory.dmp

            Filesize

            4KB

          • memory/1348-10-0x00000000005F0000-0x00000000005F1000-memory.dmp

            Filesize

            4KB

          • memory/1348-9-0x00000000005A0000-0x00000000005A1000-memory.dmp

            Filesize

            4KB

          • memory/1348-8-0x0000000000520000-0x0000000000521000-memory.dmp

            Filesize

            4KB

          • memory/1348-7-0x0000000000510000-0x0000000000511000-memory.dmp

            Filesize

            4KB

          • memory/1348-6-0x0000000000590000-0x0000000000591000-memory.dmp

            Filesize

            4KB

          • memory/1348-23-0x0000000002420000-0x0000000002421000-memory.dmp

            Filesize

            4KB

          • memory/1348-24-0x0000000002450000-0x0000000002451000-memory.dmp

            Filesize

            4KB

          • memory/1348-172-0x00000000032F0000-0x00000000032F1000-memory.dmp

            Filesize

            4KB

          • memory/1348-171-0x0000000003300000-0x0000000003301000-memory.dmp

            Filesize

            4KB

          • memory/1348-170-0x00000000032D0000-0x00000000032D1000-memory.dmp

            Filesize

            4KB

          • memory/1348-25-0x0000000002440000-0x0000000002441000-memory.dmp

            Filesize

            4KB

          • memory/1348-167-0x00000000032C0000-0x00000000032C1000-memory.dmp

            Filesize

            4KB

          • memory/1348-166-0x0000000003290000-0x0000000003291000-memory.dmp

            Filesize

            4KB

          • memory/1348-165-0x00000000032A0000-0x00000000032A1000-memory.dmp

            Filesize

            4KB

          • memory/1348-164-0x0000000003270000-0x0000000003271000-memory.dmp

            Filesize

            4KB

          • memory/1348-163-0x0000000003280000-0x0000000003281000-memory.dmp

            Filesize

            4KB

          • memory/1348-162-0x0000000003250000-0x0000000003251000-memory.dmp

            Filesize

            4KB

          • memory/1348-161-0x0000000003260000-0x0000000003261000-memory.dmp

            Filesize

            4KB

          • memory/1348-160-0x0000000003230000-0x0000000003231000-memory.dmp

            Filesize

            4KB

          • memory/1348-159-0x0000000003240000-0x0000000003241000-memory.dmp

            Filesize

            4KB

          • memory/1348-158-0x0000000003210000-0x0000000003211000-memory.dmp

            Filesize

            4KB

          • memory/1348-157-0x0000000003220000-0x0000000003221000-memory.dmp

            Filesize

            4KB

          • memory/1348-156-0x00000000031F0000-0x00000000031F1000-memory.dmp

            Filesize

            4KB

          • memory/1348-155-0x0000000003200000-0x0000000003201000-memory.dmp

            Filesize

            4KB

          • memory/1348-154-0x00000000031D0000-0x00000000031D1000-memory.dmp

            Filesize

            4KB

          • memory/1348-152-0x00000000031E0000-0x00000000031E1000-memory.dmp

            Filesize

            4KB

          • memory/1348-0-0x0000000000400000-0x0000000000484000-memory.dmp

            Filesize

            528KB

          • memory/1348-169-0x00000000032E0000-0x00000000032E1000-memory.dmp

            Filesize

            4KB

          • memory/1348-151-0x00000000030B0000-0x00000000030B1000-memory.dmp

            Filesize

            4KB

          • memory/1348-150-0x00000000031C0000-0x00000000031C1000-memory.dmp

            Filesize

            4KB

          • memory/1348-1-0x0000000000560000-0x0000000000590000-memory.dmp

            Filesize

            192KB

          • memory/1348-2-0x0000000000540000-0x0000000000543000-memory.dmp

            Filesize

            12KB

          • memory/1348-5-0x0000000000530000-0x0000000000531000-memory.dmp

            Filesize

            4KB

          • memory/1348-13-0x0000000002270000-0x0000000002271000-memory.dmp

            Filesize

            4KB

          • memory/1348-37-0x0000000002510000-0x0000000002511000-memory.dmp

            Filesize

            4KB

          • memory/1348-36-0x0000000002520000-0x0000000002521000-memory.dmp

            Filesize

            4KB

          • memory/1348-35-0x00000000024F0000-0x00000000024F1000-memory.dmp

            Filesize

            4KB

          • memory/1348-21-0x00000000022F0000-0x00000000022F1000-memory.dmp

            Filesize

            4KB

          • memory/1348-33-0x00000000024D0000-0x00000000024D1000-memory.dmp

            Filesize

            4KB

          • memory/1348-32-0x00000000024E0000-0x00000000024E1000-memory.dmp

            Filesize

            4KB

          • memory/1348-31-0x00000000024B0000-0x00000000024B1000-memory.dmp

            Filesize

            4KB

          • memory/1348-30-0x00000000024C0000-0x00000000024C1000-memory.dmp

            Filesize

            4KB

          • memory/1348-29-0x0000000002480000-0x0000000002481000-memory.dmp

            Filesize

            4KB

          • memory/1348-28-0x00000000024A0000-0x00000000024A1000-memory.dmp

            Filesize

            4KB

          • memory/1348-27-0x0000000002460000-0x0000000002461000-memory.dmp

            Filesize

            4KB

          • memory/1348-302-0x0000000000400000-0x0000000000484000-memory.dmp

            Filesize

            528KB

          • memory/1348-303-0x0000000000560000-0x0000000000590000-memory.dmp

            Filesize

            192KB

          • memory/1348-26-0x0000000002470000-0x0000000002471000-memory.dmp

            Filesize

            4KB

          • memory/1996-1219-0x0000000000400000-0x0000000000484000-memory.dmp

            Filesize

            528KB

          • memory/1996-1106-0x0000000000400000-0x0000000000484000-memory.dmp

            Filesize

            528KB

          • memory/2572-878-0x0000000000400000-0x0000000000484000-memory.dmp

            Filesize

            528KB

          • memory/2572-992-0x0000000000400000-0x0000000000484000-memory.dmp

            Filesize

            528KB

          • memory/2828-190-0x0000000002520000-0x0000000002521000-memory.dmp

            Filesize

            4KB

          • memory/2828-183-0x0000000002330000-0x0000000002331000-memory.dmp

            Filesize

            4KB

          • memory/2828-189-0x0000000002500000-0x0000000002501000-memory.dmp

            Filesize

            4KB

          • memory/2828-419-0x0000000000910000-0x0000000000940000-memory.dmp

            Filesize

            192KB

          • memory/2828-418-0x0000000000400000-0x0000000000484000-memory.dmp

            Filesize

            528KB

          • memory/2828-186-0x00000000024A0000-0x00000000024A1000-memory.dmp

            Filesize

            4KB

          • memory/2828-180-0x00000000022F0000-0x00000000022F1000-memory.dmp

            Filesize

            4KB

          • memory/2828-191-0x0000000002540000-0x0000000002541000-memory.dmp

            Filesize

            4KB

          • memory/2828-192-0x0000000002560000-0x0000000002561000-memory.dmp

            Filesize

            4KB

          • memory/2828-188-0x00000000024E0000-0x00000000024E1000-memory.dmp

            Filesize

            4KB

          • memory/2828-181-0x0000000002310000-0x0000000002311000-memory.dmp

            Filesize

            4KB

          • memory/2828-174-0x0000000000910000-0x0000000000940000-memory.dmp

            Filesize

            192KB

          • memory/2828-177-0x0000000002260000-0x0000000002261000-memory.dmp

            Filesize

            4KB

          • memory/2828-179-0x00000000022D0000-0x00000000022D1000-memory.dmp

            Filesize

            4KB

          • memory/2828-304-0x0000000000400000-0x0000000000484000-memory.dmp

            Filesize

            528KB

          • memory/2828-176-0x0000000002240000-0x0000000002241000-memory.dmp

            Filesize

            4KB

          • memory/2828-184-0x0000000002350000-0x0000000002351000-memory.dmp

            Filesize

            4KB

          • memory/2828-187-0x00000000024C0000-0x00000000024C1000-memory.dmp

            Filesize

            4KB

          • memory/2828-178-0x00000000022B0000-0x00000000022B1000-memory.dmp

            Filesize

            4KB

          • memory/2828-185-0x0000000002480000-0x0000000002481000-memory.dmp

            Filesize

            4KB

          • memory/3480-649-0x0000000000400000-0x0000000000484000-memory.dmp

            Filesize

            528KB

          • memory/3480-535-0x0000000000400000-0x0000000000484000-memory.dmp

            Filesize

            528KB

          • memory/3480-422-0x0000000000400000-0x0000000000484000-memory.dmp

            Filesize

            528KB

          • memory/3636-764-0x0000000000400000-0x0000000000484000-memory.dmp

            Filesize

            528KB

          • memory/3636-877-0x0000000000400000-0x0000000000484000-memory.dmp

            Filesize

            528KB

          • memory/4264-1220-0x0000000000400000-0x0000000000484000-memory.dmp

            Filesize

            528KB

          • memory/4264-1332-0x0000000000400000-0x0000000000484000-memory.dmp

            Filesize

            528KB

          • memory/4272-1333-0x0000000000400000-0x0000000000484000-memory.dmp

            Filesize

            528KB

          • memory/4340-993-0x0000000000400000-0x0000000000484000-memory.dmp

            Filesize

            528KB

          • memory/4340-1105-0x0000000000400000-0x0000000000484000-memory.dmp

            Filesize

            528KB

          • memory/4340-880-0x0000000000400000-0x0000000000484000-memory.dmp

            Filesize

            528KB

          • memory/4516-763-0x0000000000400000-0x0000000000484000-memory.dmp

            Filesize

            528KB

          • memory/4516-650-0x0000000000400000-0x0000000000484000-memory.dmp

            Filesize

            528KB

          • memory/4516-537-0x0000000000400000-0x0000000000484000-memory.dmp

            Filesize

            528KB