Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/07/2024, 06:29

General

  • Target

    5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe

  • Size

    10.6MB

  • MD5

    5f614b3d2a686b4995c38b91324d8fdb

  • SHA1

    72c298fb258d9e318aba64e900e91f3174cb2dbe

  • SHA256

    531313033fdb71c44c0791f56679e55c36f06fa6250f90f68ebaf42e7a2a044b

  • SHA512

    778c0d3ac4a7091cd09a5a9de4b3e41ea7c94c334af6219c85cf2f275feb3345adb42221193f6aac14e84fd1110ff52afb14cf24a7e7333bcbdf60fedb41681c

  • SSDEEP

    196608:NBHC8KwHrU6Ery5NXJZzkl3fP0puCSe3xb1WujMYJroJiPEgI2fPZdms:DC8K6rery5ZDzklPMpuCl50uXozCPZb

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 64 IoCs
  • Unexpected DNS network traffic destination 64 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 5 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3464
    • C:\Users\Admin\AppData\Local\Temp\5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe"
      2⤵
      • Drops file in Drivers directory
      • Loads dropped DLL
      • Adds Run key to start application
      • Writes to the Master Boot Record (MBR)
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4780
      • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe
        "C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" -p 1 --inst-task 12#0
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:968
      • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe
        "C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" -p 1 --inst-task 12#1
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2960
      • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe
        "C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" -p 1 --inst-task 11
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2516
      • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe
        "C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" --inst-task 5 -p 1
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:4836
      • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe
        "C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" --inst-task 2#"C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873" -p 1
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2176
      • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe
        "C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" -p 5 -t 0
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Writes to the Master Boot Record (MBR)
        PID:5112
    • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe
      "C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" --main-frame 0 --search-bar 2 --tray 1
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1144
      • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\wrs\BaiduRenderClient.exe
        "C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\wrs\BaiduRenderClient.exe" --breakpad="\\.\pipe\crashservice.1144.0.7162" --humming-dir="C:\Users\Admin\AppData\Roaming\Baidu\Baidu\plugin" --main-frame="" --search-bar="" --service-exe="BaiduRenderClient.exe" --tray="" --xchannel="\\.\pipe\ipc.1144.0.7162" --xtype="service" /prefetch:1
        3⤵
        • Executes dropped EXE
        • Writes to the Master Boot Record (MBR)
        • Suspicious behavior: EnumeratesProcesses
        PID:3364
      • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\BDDockerX64.exe
        "C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\BDDockerX64.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3888
      • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe
        "C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" -p 3 -r 1144 -c 3 -m 4913442588168 --magic-number 4913442588168
        3⤵
        • Executes dropped EXE
        PID:1884
      • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe
        "C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" -p 2 -r 1144 -c 4 -m 4913442588168 --magic-number 4913442588168
        3⤵
        • Executes dropped EXE
        • Writes to the Master Boot Record (MBR)
        PID:1160
  • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\BaiduService.exe
    C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\BaiduService.exe
    1⤵
    • Executes dropped EXE
    • Enumerates connected drives
    PID:1580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\BDZebraSDK.dll

    Filesize

    5.2MB

    MD5

    886bba974f16c61dd0334c57f29f3115

    SHA1

    d88e5adc88a25308f70f6dc9419b011406041301

    SHA256

    5a8d383f4978a0f2f42666cb9dc5f156373200ff0ea54e650af07e2c5a5f2646

    SHA512

    fc90ca9a37dddfa07683f7d2e25740a1d3b9324df8313ca0009703555ae144ce2f31324aadc7976c95b7633ff5d18ef58da7db84461e95ba84c4eeb81a925826

  • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe

    Filesize

    691KB

    MD5

    ba4c5f1d1bcfcb2ffd973415b7975399

    SHA1

    84859acf0e413a4feb037b2e51ba8aa42d6ceb7f

    SHA256

    8c31b32dfdb39274475ca2a061ad2280e91cd47425edeeb9a136909aa26c8df4

    SHA512

    e05549af52276b3c3bf1eee871c723d74da3d91350ce9c01da231101b61d8815cb4956e0f9a90c04dd08fc96a66eeb885ddf5819010f6f289e7df478c37ce11c

  • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\BaiduReport.dll

    Filesize

    64KB

    MD5

    1ff6574d1406cddb05c20b41984c76f2

    SHA1

    d94c1991719a7e8745459ef2ee59baf3c2d80b72

    SHA256

    54271a03e8feca3ade1ebc75207fe29636115210247e895aad371ebb6cc1b5ef

    SHA512

    1bbe6ada115d5d1e508f2babab68afda96db31477e43f969bc8f60f91b336ae1bbb19e232cc0a7b50aea8577cbc7f8931bda6f7e792bc20fb308296414c68383

  • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\CommonWorker.dll

    Filesize

    54KB

    MD5

    d03ed968e344179761906e692764a23d

    SHA1

    9b060eb5db716eb91fb0a419a1179691c0c44593

    SHA256

    c9c6e7e2fb2197ab9fc47d4a6a7b88656aa22257ba8caf7fa0f5145434e1a3db

    SHA512

    6aa313d2d6c7200ef84686d48740df43348463566c5a39cffba77a545c000963e7d975617186ca079f68f3eb90079329b733efb46266dde4d9a7a2f9eead95c4

  • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Utils.dll

    Filesize

    256KB

    MD5

    379a2975c9e06ac8b533bc9efc1cfc0a

    SHA1

    a171f4c707bd3870d6e4bef184cb66903ab2e8f8

    SHA256

    8c0adb58a7bf819ecef2fd5bca9447255790603567425e590f77275a0b2216a0

    SHA512

    626a86e8db4258e97dfafcbb13acdf891355ee58dd82333127e304532ad73ee5fd1ec6132b49306c5a1522c298d15afbe3d633cdac489b503c02debd4ac58a23

  • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\bdlog.dll

    Filesize

    37KB

    MD5

    56d1d9be11aec8560139c779f353155c

    SHA1

    b28a2b5b348fb49cd3222e6a804ab934d293bcf2

    SHA256

    cba98b57e8c9b5d9f34b68b2b9433187705c3ef65b11b0f20373ce5e05859c96

    SHA512

    33f65c8af6937cc680e95d3f638d6fd861ce4aedb3595c9cc16afdd072e63a36b9b6ee28aed033e5779679d2c73c943b81759abb96a6a31e5d823c9dbd27f247

  • C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\brp.exe

    Filesize

    905KB

    MD5

    f3482cb7643db3dfe3e78dd32514277c

    SHA1

    93c4f50c18128bc4a77b5d85826f3f29ce56f68a

    SHA256

    c8c300ab2b4bdebd6fdfe4e92b46be4977f851261677b5bd2500a10ce00771c7

    SHA512

    45c7a13b9781d87dd93b537d2589b53f13879ef7b78cb0c1a82622f256232cddb10cc93f43dfae96101d929b19676d538711c91731da37b0a122120acc8df16d

  • C:\Users\Admin\AppData\Local\Temp\mb_setup.log

    Filesize

    1KB

    MD5

    c4a6d1a86c9021a1758aa506469dc939

    SHA1

    ac89f6fa915a7ab230d2101571b51f8d4d3beb44

    SHA256

    ea9bcb5931196b2cff7fa4c555ba28401557d00a0fb9f84a7033d71659a86fb7

    SHA512

    5c0ba14da69eca03e72c02ad9d03e824d80168a1eaa1df8d3061d1d7ffbefa96bec225876adbe948f7e42c62a2f31570b12cf2a213ec2cb3cf8e85c0659c8618

  • C:\Users\Admin\AppData\Local\Temp\mb_setup.log

    Filesize

    479B

    MD5

    35c7f94b3987af7e54b61609d0836da9

    SHA1

    202b622d365f4c160a99d6c96431d9a7bae19f06

    SHA256

    a9a63ed52d89eea36adfefece316a97381ef5c542653708affb11bf5de07dc6b

    SHA512

    bd9ca76902e5d40a004b236d03364e56cad515dba8df50c3dc3c95ea0db69361d9662d993d7585593bd376f718317d18b4a4078dc3f9f4e27c103746b4e23359

  • C:\Users\Admin\AppData\Local\Temp\nseC3EE.tmp\BDMSkin.dll

    Filesize

    1.8MB

    MD5

    3f6dc271f034861cb4be850a816105e3

    SHA1

    d83f7a11d47d4668737ff64139870bad8a8722a0

    SHA256

    4f5d4dc959ccb0f201b2f2c761c74f6284ec90fe4d05e11813c63f584356205a

    SHA512

    2149b342a8bb8486faf3e7ffe43b6fe66bad4b93512ed668caccdf63399a48411b92b31c99a018c92e4590584d8c0111a483f8161ec179d5f92aba2e398fa76a

  • C:\Users\Admin\AppData\Local\Temp\nseC3EE.tmp\BaiduReport.dll

    Filesize

    355KB

    MD5

    33ac85604ff109e2a297c03fc1037bf1

    SHA1

    02be88a95fc04ec73c4ed33601f832e86d5f0bb3

    SHA256

    47c64647fe2ef3215e919295fd3627b25e85877a690d2ba940f4177cfef2678c

    SHA512

    80c3428e0bd0585f2c4076fc814b638aeab637b2a56b37febef08f75fad426b268fcc2409cc8d09738c23ffc7d56250683b157a5e452b4b43a2bf88d4f489826

  • C:\Users\Admin\AppData\Local\Temp\nseC3EE.tmp\Base.dll

    Filesize

    777KB

    MD5

    6fdcd6d9faf849ecd71d4fa329969780

    SHA1

    3480193f5e7a37bf8a01f728566b48d56850749b

    SHA256

    a31fbc3014712fca12637400897816c41f65627434bdde1f4c8c0c025f08bad2

    SHA512

    5a3ddbd1abda841bc06c210f612cfde3a48016991ea6a8dc5ee00574aee1904c70695226490986465c950bf09564bf56715d2c25fcee9931f33b82dcefc2c111

  • C:\Users\Admin\AppData\Local\Temp\nseC3EE.tmp\InstallHelper.dll

    Filesize

    242KB

    MD5

    f497a1c6f5f1faca1a05fbee72abc07a

    SHA1

    3af6939afd2cdfc3eb7e9f6ff4cf26d254f97923

    SHA256

    ec6a6f16902d84802d0a744a6537d7bebe40b4ad9c8bce4de012c3224c98030c

    SHA512

    3a523e91cf7e4bd3c83f4eb9a861f410fb2be7367514cb7cf9c47f9f6aa3bcf200640c53bd96acf11f2177938b27cad033f361d67eb6098cb40eb3538292d8ba

  • C:\Users\Admin\AppData\Local\Temp\nseC3EE.tmp\Protocol.dll

    Filesize

    355KB

    MD5

    a0ec723d41810478bb659a85e4e92f3d

    SHA1

    24cc9fc77abcafe0dd1c5a4e547a8b4efd63c85f

    SHA256

    dd57149bfa1348e482afddbbe79187527cbd358cdb3036fdf4e8b9f446d020cf

    SHA512

    ed98dff026eff8501a526dc36c5f68b63adc5a1704881015d6a9f7af53e5a3a47da6aad8d054b7f7cf0821f479a016f45ad20a1b201c263a09cf8265cd772c4d

  • C:\Users\Admin\AppData\Local\Temp\nseC3EE.tmp\Report.dll

    Filesize

    108KB

    MD5

    4ed3f52e01ac04d6b1fa05ff8a41c2fe

    SHA1

    9c363a2658db7deffe5358634320671ef6fc7664

    SHA256

    542440c178b553d4a1b01d83f05df6a1ba842571f4a9f90b06fdceab06336fe1

    SHA512

    8fcc515adc959c5b07b4c94400f6e39d75d9ba8a9556d7f4df8891a642b967f13b9f8302ff56bebac505a8a73a3bd4980e29406ccc918fb1dd3d7acc69f776ff

  • C:\Users\Admin\AppData\Local\Temp\nseC3EE.tmp\System.dll

    Filesize

    17KB

    MD5

    bdb492684b7a99ee0aa1d10c1f8bf702

    SHA1

    c7b8a53cf1481df2a4a7eb11aeb824ff8b3a4698

    SHA256

    4919ffc0acdada4f18469d7fc76abaec4584b99709bbd276c6e9a8043be76481

    SHA512

    479f996f7dfbad9fff8f4bf3493dcaaa680390919233fb875d08efc0e6b71a94db9eae510091496a4c99e09ed793aae87ef64bd80e55cbf94823848d2edc0d20

  • C:\Users\Admin\AppData\Local\Temp\nseC3EE.tmp\Utils.dll

    Filesize

    928KB

    MD5

    9ac5812dbee6e04f5d818dc5afb46480

    SHA1

    5232fb8d2ecb4cbbd52054741282cfb86fdd6e9d

    SHA256

    77ec589230c246ff136b9abe22691e978c30aff7c3e222be34195a671c8b3d8d

    SHA512

    970dd347a9d1a22dc02fba0ad1d8f7ac16c00dfca97045de5453ef8c7f64fac019d89aa2e1c69fb10ea3a29388a52c163da904d7b5abec95c18f0981a054c0e0

  • C:\Users\Admin\AppData\Local\Temp\nseC3EE.tmp\msvcp100.dll

    Filesize

    411KB

    MD5

    bc83108b18756547013ed443b8cdb31b

    SHA1

    79bcaad3714433e01c7f153b05b781f8d7cb318d

    SHA256

    b2ad109c15eaa92079582787b7772ba0a2f034f7d075907ff87028df0eaea671

    SHA512

    6e72b2d40e47567b3e506be474dafa7cacd0b53cd2c2d160c3b5384f2f461fc91bb5fdb614a351f628d4e516b3bbdabc2cc6d4cb4710970146d2938a687dd011

  • C:\Users\Admin\AppData\Local\Temp\nseC3EE.tmp\msvcr100.dll

    Filesize

    755KB

    MD5

    0e37fbfa79d349d672456923ec5fbbe3

    SHA1

    4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

    SHA256

    8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

    SHA512

    2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

  • C:\Users\Admin\AppData\Roaming\Baidu\Baidu\pb\100.pb

    Filesize

    115B

    MD5

    0a046fc4ac62ca3278450db3c4d14330

    SHA1

    8d4cec6518773caab72c4ff79d138b62ea6c1337

    SHA256

    02fe395561c74e117eedd1ac5f9c5d9d2be407affde144421199623ac83da6b7

    SHA512

    0dd7829970f5406b5466017359eff58e70dd33f36092e9073ae68f2d4543cf2494dad39012705841286cbab6dcd9f84c603582e97dfaaea416e756741d419ba0

  • C:\Users\Admin\AppData\Roaming\Baidu\Baidu\plugin\extends\LocalPluginInfo.xml

    Filesize

    2KB

    MD5

    6490060dad9933a77452e9485f773f3b

    SHA1

    b64330f4bf670385b2dcd03493ec8e34071b1815

    SHA256

    f4a28b882e04982c6de7eca8f63cf6329261b22cd2f5a136bc25097d5063dc64

    SHA512

    1e0d844db7bde7ab27af64b050fb6a4c31ac6732c349c5b9fa5f92241ba3fe2cadce5bff7f294fd4843c7e2bb368038dc3c47f29466413811830f4a045c7f9e1

  • memory/968-488-0x000000006FFF0000-0x0000000070000000-memory.dmp

    Filesize

    64KB

  • memory/968-531-0x0000000075C00000-0x0000000075C63000-memory.dmp

    Filesize

    396KB

  • memory/968-530-0x00000000769A0000-0x0000000076BB5000-memory.dmp

    Filesize

    2.1MB

  • memory/968-489-0x000000006FFF0000-0x0000000070000000-memory.dmp

    Filesize

    64KB

  • memory/1144-541-0x0000000006B10000-0x0000000006B24000-memory.dmp

    Filesize

    80KB

  • memory/1144-622-0x0000000005050000-0x0000000005063000-memory.dmp

    Filesize

    76KB

  • memory/1144-628-0x0000000075C00000-0x0000000075C63000-memory.dmp

    Filesize

    396KB

  • memory/1144-539-0x00000000061F0000-0x0000000006239000-memory.dmp

    Filesize

    292KB

  • memory/1144-627-0x00000000769A0000-0x0000000076BB5000-memory.dmp

    Filesize

    2.1MB

  • memory/1160-636-0x00000000769A0000-0x0000000076BB5000-memory.dmp

    Filesize

    2.1MB

  • memory/1160-637-0x0000000075C00000-0x0000000075C63000-memory.dmp

    Filesize

    396KB

  • memory/1580-630-0x00000000769A0000-0x0000000076BB5000-memory.dmp

    Filesize

    2.1MB

  • memory/1884-634-0x0000000075C00000-0x0000000075C63000-memory.dmp

    Filesize

    396KB

  • memory/1884-633-0x00000000769A0000-0x0000000076BB5000-memory.dmp

    Filesize

    2.1MB

  • memory/2176-586-0x00000000769A0000-0x0000000076BB5000-memory.dmp

    Filesize

    2.1MB

  • memory/2176-587-0x0000000075C00000-0x0000000075C63000-memory.dmp

    Filesize

    396KB

  • memory/2516-590-0x0000000075C00000-0x0000000075C63000-memory.dmp

    Filesize

    396KB

  • memory/2516-589-0x00000000769A0000-0x0000000076BB5000-memory.dmp

    Filesize

    2.1MB

  • memory/2960-593-0x0000000075C00000-0x0000000075C63000-memory.dmp

    Filesize

    396KB

  • memory/2960-592-0x00000000769A0000-0x0000000076BB5000-memory.dmp

    Filesize

    2.1MB

  • memory/3364-544-0x000000006FFF0000-0x0000000070000000-memory.dmp

    Filesize

    64KB

  • memory/3364-576-0x00000000038E0000-0x0000000003911000-memory.dmp

    Filesize

    196KB

  • memory/3364-543-0x000000006FFF0000-0x0000000070000000-memory.dmp

    Filesize

    64KB

  • memory/3364-547-0x00000000028B0000-0x0000000002943000-memory.dmp

    Filesize

    588KB

  • memory/3364-565-0x0000000000E80000-0x0000000000E94000-memory.dmp

    Filesize

    80KB

  • memory/3364-578-0x0000000003930000-0x00000000039DB000-memory.dmp

    Filesize

    684KB

  • memory/3364-549-0x0000000002950000-0x00000000029F6000-memory.dmp

    Filesize

    664KB

  • memory/3364-551-0x0000000002A00000-0x0000000002A64000-memory.dmp

    Filesize

    400KB

  • memory/3364-574-0x00000000031B0000-0x0000000003301000-memory.dmp

    Filesize

    1.3MB

  • memory/4780-64-0x0000000005900000-0x0000000005901000-memory.dmp

    Filesize

    4KB

  • memory/4836-605-0x0000000075C00000-0x0000000075C63000-memory.dmp

    Filesize

    396KB

  • memory/4836-604-0x00000000769A0000-0x0000000076BB5000-memory.dmp

    Filesize

    2.1MB

  • memory/5112-624-0x00000000769A0000-0x0000000076BB5000-memory.dmp

    Filesize

    2.1MB

  • memory/5112-625-0x0000000075C00000-0x0000000075C63000-memory.dmp

    Filesize

    396KB