Analysis

  • max time kernel
    74s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2024, 15:46

General

  • Target

    JaffaCakes118_25fef2629b1a28be76522da59a85506f.exe

  • Size

    850KB

  • MD5

    25fef2629b1a28be76522da59a85506f

  • SHA1

    e1c6b2ac497f253cb03aa69505111532b4241a38

  • SHA256

    1736d604d6c8a14948ebe5386727ca3de215e1163904eac094b39769b8faea64

  • SHA512

    8656b9393d45dda010013825238b8254404b89316511b66877f78ad5b61008cb4d50e48e749cb646ada5891299b85dd7342336b4024e034865cfa07d47e08617

  • SSDEEP

    12288:j6qvGvd8EgWCKXtWxWT56LbdJ0Ua0c1xHVkPyjRIBTK+jUOq6fgJg0Ges/5rBY6:hvGvd8HK9hwLbdJp6/kIo7f

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

6.tcp.ngrok.io:10371

Mutex

DC_MUTEX-6TC6YTT

Attributes
  • gencode

    6Wpjj0ueCN6h

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Disables Task Manager via registry modification
  • Sets file to hidden 1 TTPs 1 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25fef2629b1a28be76522da59a85506f.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25fef2629b1a28be76522da59a85506f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25fef2629b1a28be76522da59a85506f.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25fef2629b1a28be76522da59a85506f.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3000
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25fef2629b1a28be76522da59a85506f.exe" +s +h
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2144
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_25fef2629b1a28be76522da59a85506f.exe" +s +h
          4⤵
          • Sets file to hidden
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:2180
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2964
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=iexplore.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3040
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3040 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2852

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6B2043001D270792DFFD725518EAFE2C

          Filesize

          579B

          MD5

          f55da450a5fb287e1e0f0dcc965756ca

          SHA1

          7e04de896a3e666d00e687d33ffad93be83d349e

          SHA256

          31ad6648f8104138c738f39ea4320133393e3a18cc02296ef97c2ac9ef6731d0

          SHA512

          19bd9a319dfdaad7c13a6b085e51c67c0f9cb1eb4babc4c2b5cdf921c13002ca324e62dfa05f344e340d0d100aa4d6fac0683552162ccc7c0321a8d146da0630

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6B2043001D270792DFFD725518EAFE2C

          Filesize

          252B

          MD5

          caa0530633fe6f0a1bbdcc6685f79f97

          SHA1

          cda7058de501e49253877e1a573ce4980fa05c3a

          SHA256

          aec53475af091ed692613a33643f2b2d7db5b153398778f738c38a3b856eae20

          SHA512

          6ca62c9778d3861b3b8c1178ca57639c194241be9ab8b8fd4bbe5f0ea86dcd842fb90b1712fb04643aa61f4eb668b663e4edce84572d9dad3cd093b98cb04f61

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          f59ed99253771143dece54638c2908a1

          SHA1

          6e21168a3fc05b140d6fe5987455e59d46e544f1

          SHA256

          92f44adfcc138865a589c2356749ec3cfccf5f03284f9aa4172e1ffaf469e540

          SHA512

          8e86620ead6ec980b609399a57374da928af533d870ada98a1f3804c7115c29997c26665026d00faecb34e3bbdc9347ab4ed6c8f39dc254b131d8090d4ad01ad

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          07d5d2b8e0b20285a3492d01e0b293b4

          SHA1

          65df6326652265add8a96d4e518a4f09617a2405

          SHA256

          76eb9403de38d6cd2a5bcad2a98a9c9844689f11e952b31410955eef5967130e

          SHA512

          1c371178db25fde4fe4e6aed30281d757f82b249a16c90b2536235595b9d7c4d461b4ffadef6d7ec34bb15129760f84c5a39956060205e7382047b0358f35f5a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          e4d1843f15d0c9115eec9fa0a23f0a9a

          SHA1

          5c0ffb0fb5a5bad2a8f669ea73c83178dc0d2263

          SHA256

          a53954e202c85d10efb4f61372c939c13ed135c3fbf459dd540af73a49688181

          SHA512

          158399a26f72b0412bdbfe6546deb855448a5d5ee7dabb4c7ad0a63a93992cf3cdec03798956b744110dc480b30be0f4f7d90f7fb909399d2f04653eb1c488cc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          7af2d8a4d005fa582a87eeb20af45347

          SHA1

          8650f1f741e3d52e7c089895572e81d23bc8de50

          SHA256

          aeeca70cdb02ebdbbf39be05d02b977bfa0ac5a69981d207943e723c9098802c

          SHA512

          2d8d1b14c686303015e82c606827301861b9401b7ffa7506948f008f8ec5d138940ecc626393a2eae031349eb9fcfb679c91f64975fc85a9c8d466d6e9ec4a2e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          9eacdf577dd45e33a2e484f4248f2570

          SHA1

          250932309a692d565d0aebb1a18ed504592ca3d5

          SHA256

          38f27f667c9eb35e6dca87080f6341ccd4adbdcf2fdefce59284e94609311762

          SHA512

          c384d2cee93eda2264dd20fa90073c7a707344c9dbb5faed920c6ee451bcc5d6fcdad1549220711b6dcdcb35a0dd9ed58d91752ca077106da6084125cba93e76

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          834012171b5f19ac76cb479a03b8b1b7

          SHA1

          333bf331510a9f79c5f03dbf1814d7e06d136f82

          SHA256

          9a825b039cfe14ff16573b2b4ff37e3e1ac9579f20fa023572c6363b66a950ad

          SHA512

          7a70badaf20ea4b7a5d3c97385ee646efb61cc9809c7137e07080b4fdff8a64c20e0961da4f28873fe4e0d313eb2454f9e9756bc26e30e237ee741a2af5bbb1f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          96f6a3b8cd61976db51c80a32f2b9d51

          SHA1

          d5fc3d43e0b81854b85c57871e94ac0ba1c79c10

          SHA256

          a3ffcf8e12e7c5c4e51bd7c0a8cd96290acc91d8029bb649176d757054127a43

          SHA512

          c8fd563de26ed22b3718194f55d9b0aeddcecff19a1044b667b5915acf803cf5c54698d520aeb6c4906f6083c5f983204abc8a6b2d29592eacb7cb8bb7823120

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          286b55c037789d14ad7ca41d0c517a37

          SHA1

          7d5dc03a6be4cedc7f0d858574fc868c34a5c1ea

          SHA256

          2142b3fabab6357692a8ce37fef107205391374ee85afccf12a0130841721008

          SHA512

          703c7babb91bbeadb4577faec3dc7d22b68bda238a54bef8e2c1a6e62fddcebbc1a93d0d289cd257f5aa59ec0482314d41e01e49f52e0cd84aa3b06ea134658a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          95825983cc65fa74fc88a4643f3c927a

          SHA1

          4a21f255589ea78c1e2cc0112cb0016d3b8e3176

          SHA256

          dae600bdbc1b265d918ca5ee887d115a7283af2570a54f372beaf7c78b63bf7e

          SHA512

          368b4d9f409dedc908f0855fc6e1a2a8147f35396052547dccc7449623fbc552f7f503c388330705b537ac72631902fd680ffafaa42f33ab30c287c0c16a8684

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4b1c4a0df96cd33fa70865fd9fd90df6

          SHA1

          e8d760390f521f83e34afd8ac710c1905a24c96d

          SHA256

          84b2a88a6f30dba8ce5597ed09bbd1145233000c42f8f99a47165bc847e0a51e

          SHA512

          d0abfb2ababf96e556e477be36950afe256eeca3d8895a0272ce4f6b4b3cae12cc4a2f46246a96b9e48871ee002169baca646414d440d3ea75788a643fca2a6d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          3f3df81a183ca7a5d13bdb1b84b8b630

          SHA1

          c4e0b0b4f843325223ccef3a6dec8303845f3540

          SHA256

          4a07d4f6d02201e763cbedf4895c28c66f10d401b909e2a70a12718c90e963e4

          SHA512

          592cdb5c7e1f32a209ef24148991a56def50dd226ec49ae1ffb1378b39c4ec382465a3c790eb3c4530a0d53f8fcf71cc0dd840adfa9dd3dce4ea648836463a41

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          79d9250fe09e03964d8477b84ee931f5

          SHA1

          1832558bb3ef28044c1a41ec755a865e0d689181

          SHA256

          0debf500c72c29f5eddd89bce092b0f0591718a1f7f28cc0294ce8b4011fa72c

          SHA512

          c3c3a7c86d8ec95f98bdc3430907360fcecdff03a3f202e687bd7b2f17e5c16fdbe6711c6bb7a0923498137dc3c42bafd1eaaadca27df827be0b1910c3cb44b2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          6871c468c25644d6fd3d8bbb0fec660e

          SHA1

          9a6341618e2a7130cd140beb50f7e635dd8e9645

          SHA256

          958349052a5a063db9d35488f879b43d1aef3794fb2b5908b5964b1f5f8aac88

          SHA512

          5f3172ef2d9698bc894a059d3a8bfd8c9107749aa9752f736006527f4f8a59dc6c8963aa118626e4c29790150572e13c594a4150000cead9d5f77c4598f29f10

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b07d71bc3a0289f9b6677f318e579a91

          SHA1

          4c5fd75141614780a24dffcc3304c008c51df14d

          SHA256

          e00d2083b9faa3075751509bad5eb85edefe624405034800954509bd8006200e

          SHA512

          d7801f91a38751395fc7a83b6f7e31d3e3e01431d72f372ed535b6c89063bf341b2e848890e741f1fed0a0cc4365ac86ebdc958422d68773f96fc7b07ff07c69

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          db7efda24edd75b92ca8cf839623aea8

          SHA1

          562d82ca90e213919cccb119e211ac9d59f6b585

          SHA256

          459e94ffe95d9bf74c754abbe7cbb16c698bb79288bf741c14c17063e6068ea8

          SHA512

          06bdb7bafaf711b9b5553fbce69d39e9b370695361164ce77c866e4d2e0551400c0509199c45857901f14629e234e5d2461c827f941883b47e53693588017125

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2e2fc5924e1c9f0734bc2069b71fca16

          SHA1

          600722ced97091d43174cc2f45b5876606b31ba5

          SHA256

          87c480f263174a1524e755b95662e59639ff828caf67847ebae00a6dbd041d17

          SHA512

          4aa7569c64e45651262e6a0e39adc8bd50a0789a58159a10d86af0d677bf7339ad9c6da4b9776ca1e1aee5cb778a4cf1690f0411a9df7f8150c00dd2356ac1be

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          5e40a7a751e8a49eaad625c058186768

          SHA1

          c136c5470127a8478f909ba0dd5f76b51723d3a6

          SHA256

          4a8e9bc6f49b8fb7db56452322e17122421b2c1f3f649808f9c6c50db93b8f4e

          SHA512

          35fd16a7c73eb0e20e52ef3d2cc2c14ea39b5c4be0790d977c308e627730fae732c40c9878fdd8f36c9f9de7cd7fa725f795759d1f6e4bd28ebc6c67642442cd

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          5bec6b56107bf8a670bf0670b12c6a85

          SHA1

          457f33088c800c28e7963c4d658b9297baf6a532

          SHA256

          96da46bcf88b99f723526ce201b0fed8e75bb7b26720a855a1c08dc4ae22f389

          SHA512

          05569dd8dcda0c328de073cd61d67a47b4fc357eb86375a26ad232f9586130230e978794f4188b58d3f73b21f7c94d35848c70004a41f06070f060e1a8293fdf

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          7128311889fc6674236682d8563e3d40

          SHA1

          577fb701346c4365ad4e0d9aeb798d08c937a4cb

          SHA256

          d2fd173d53ab9ba9512b67c78a380c95be4a02c84b5ba277e757f0db354f5d80

          SHA512

          17edb62d83c30cb3714b74b284d4ca4f9ab76292d6e97365515498ba9e64d5db8cee99a659ba5df7d85be48dd49c30c775996ef3ffa38bbc3596fbe7f66a5993

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d49803cec83be1cc9f5559730bedeae3

          SHA1

          9c0088e11962a46a9b71d77473fc519d28707f0e

          SHA256

          7f886ba92a04523773cff15c7ee558fe82214f0da1d2a70116e7dc8301c7c8c7

          SHA512

          3f10600e253aceda81b93068792be893acc15a3ae0dbc805a9941e087e44f60d8c7b664e5a4579d0349203496fb7b069814a42c0221f5681705c25bd60363940

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          0708f2f14f13bb9d9abcc07f3239a9be

          SHA1

          4c7881cfc79c1fcd4b90de889bc14552a14bb8bd

          SHA256

          d19bd830ff7a8f536a0d798af9896d0f8290521afee6088243dfbbf6d40f05c9

          SHA512

          97bfb5ccde509f49463afd1ddf5da274013d38d750c58cd8683e2e5caf4be3aa80188a9abc3d8a7fcf6bf4443d47949e6f01b3ed4c040d87c88b98a605dc0982

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          52d6a3b796637d75aea90b29dae49b19

          SHA1

          6fb5389176592ad33e981a0a9331eba43fa43677

          SHA256

          565929693661cc7d8a33ad78bb270d9227e15dbd2c8da2f096c35c7f783bbe97

          SHA512

          4eb98788b7f6c0c777c996908734881700aaf243d0c9e7d0e614a4aa30eba053176bc66b95b11e08a9c2dc2ebccff71177d7b4969e7f1e80c8b6a658ae4e0980

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b6c05b59cb435ab2cf45786cf8ca0a84

          SHA1

          6d95783132196237ebc1ae751b16bd4ed61903bc

          SHA256

          1d3bb3ce95ef13a8b05747c8a16ea3d496ab873938641b1344a2a56fc2a167fe

          SHA512

          96e97ee551c346f8020a6a11dac7643a5985bc84137e0b41ce917a49f79e5c3ddfa067d31897aea2127ca800605bebb2dff18de1fb9b79dc4dd5b2782d305b5e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          077375de31e77252d09f343f08247158

          SHA1

          1658ed8d3e72ac9eca9af8d0d7c8641bece1b7d5

          SHA256

          3d63274dceece7424b56c295720744a7ba1cf8a85be50b59368e9adbe45d6f66

          SHA512

          bb9810986056c0c0049838fd4ad6de27fcb99929c43bf009339272c9fd229b49f4bc6f7c145853e4fd39a25875df09fe5ea09d034305fb9c13cdbf37b3522371

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ef53a33982743977608d1189cac7773f

          SHA1

          b79f6bbdfe4920024bd04efbaedc4f8bddb027c2

          SHA256

          9704940cf1a99869af51b130b2b357b55157cc936e7e4a6870a3ed420c7a6cdb

          SHA512

          c0bfb30b101a007f1be30669529abeecdcc7156f8d155c35c2fa28ef56e505267e8ed552524db422194153963f2ef6d1cc64c6e43db65541f08b52d2b9958d39

        • C:\Users\Admin\AppData\Local\Temp\CabCEE5.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarCFC2.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • memory/1736-18-0x0000000074DC0000-0x00000000754AE000-memory.dmp

          Filesize

          6.9MB

        • memory/1736-1-0x0000000001080000-0x000000000115C000-memory.dmp

          Filesize

          880KB

        • memory/1736-2-0x00000000001B0000-0x00000000001B6000-memory.dmp

          Filesize

          24KB

        • memory/1736-3-0x0000000074DC0000-0x00000000754AE000-memory.dmp

          Filesize

          6.9MB

        • memory/1736-4-0x00000000001D0000-0x00000000001DA000-memory.dmp

          Filesize

          40KB

        • memory/1736-0-0x0000000074DCE000-0x0000000074DCF000-memory.dmp

          Filesize

          4KB

        • memory/2964-21-0x0000000000400000-0x00000000004DC000-memory.dmp

          Filesize

          880KB

        • memory/3000-19-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/3000-9-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/3000-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/3000-20-0x0000000000120000-0x0000000000121000-memory.dmp

          Filesize

          4KB

        • memory/3000-17-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/3000-10-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/3000-22-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/3000-11-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/3000-16-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/3000-12-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/3000-5-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/3000-8-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/3000-7-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/3000-15-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/3000-6-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB