Analysis

  • max time kernel
    147s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2025 05:15

General

  • Target

    JaffaCakes118_f7f61e2818f060f7bb67313e6add744b.exe

  • Size

    6.0MB

  • MD5

    f7f61e2818f060f7bb67313e6add744b

  • SHA1

    178378f732bad62fabb2b184f688e8a6651a9d9e

  • SHA256

    a8aa4dd903c87f0912c6d4b65d26d7c1d75b1e02bda69b68ad1a57028ec9a0fa

  • SHA512

    3b77f2dc7606a525943ebf1d9447438d248d1a591bf94e43e166c4ae376e45a81c651a27a8628036d6158e31d52816b8227e44c34bab1e1c0e26e880aed2c570

  • SSDEEP

    98304:KxO6OvlIuBy4q7/bYy8yo+x2hbsOYah0ZWXy9YF3W3qywcrUKqXCvYJod1H2O:jvlJro/sRW2mOz9X0Y5arb9oxO

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:1177

Mutex

9e7cec1764a508c362c0d940f4480146

Attributes
  • reg_key

    9e7cec1764a508c362c0d940f4480146

  • splitter

    |'|'|

Signatures

  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks for any installed AV software in registry 1 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f7f61e2818f060f7bb67313e6add744b.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f7f61e2818f060f7bb67313e6add744b.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Users\Admin\AppData\Local\Temp\WindowsApplication1.exe
      "C:\Users\Admin\AppData\Local\Temp\WindowsApplication1.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2280
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\WindowsApplication1.exe" "WindowsApplication1.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:2056
    • C:\Users\Admin\AppData\Local\Temp\CCleaner.exe
      "C:\Users\Admin\AppData\Local\Temp\CCleaner.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Checks for any installed AV software in registry
      • Writes to the Master Boot Record (MBR)
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:2228
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 3476
        3⤵
        • Program crash
        PID:412
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2228 -ip 2228
    1⤵
      PID:4972

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\V01.chk

      Filesize

      8KB

      MD5

      ac61dbace11190b1b2a4627fed7c9f1a

      SHA1

      c5c30cec05244f13dbf8aba46f01f8caf47a08c5

      SHA256

      42e146f5ebdaae851953190441086bd7d056d5b02b45e084a3c3723b194e7b02

      SHA512

      c96798fcef648f44373578168b2cd57add5ac67308e883b49489832a001a23bad9897891bb0b76653ca88b68ed836163d843f6112f7ec8c50015b7d1b76d14e9

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\V01.chk

      Filesize

      8KB

      MD5

      871f04e6cea7c10d8c43abe28822c37b

      SHA1

      7f678e5667ab0099093772bbb746ce4d238c9125

      SHA256

      75271fa6b83693dfa2ad56a56e75da330891e11b74ef4612bde23af740ec66ac

      SHA512

      c92665ca364b2958b988d4d94fb26545d1cc66520d02d9cf70a85b48d3142b604f225711d3e053e122a7a1adf7bff9332de5f8f94f5748cf284c82528d426e8f

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\V01.chk

      Filesize

      8KB

      MD5

      bb66c074c2bb4c05b2b00299e1a318ab

      SHA1

      80a5b3ca242df92fa15f9f539ed1bddead6efd08

      SHA256

      6149ff65077e1b93aaafb3b53263f00f68748f9b0e6e1b0d35a701f16bb4f5c3

      SHA512

      b7f13f74dbdf5735ff0dec04ee5f017cb0319a54d26b1ca7dc98b4e895f8b52bbbf63f00a183654c85918904d080ec68996ad58d76613647846d9f7f08230196

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\V01.chk

      Filesize

      8KB

      MD5

      0f3c3644a6f3bce5ecb12cb4b14018f2

      SHA1

      f4c4d51814abe02a1ef0cb048a3b641df464e0ca

      SHA256

      03c45a59217b358d71bf1db10c69634880da40677a9ada58052e8ec769df0a4f

      SHA512

      7bb04c0d0973b81841737018d6b9f3507feb3c1d91d257208172b2dcf6700b03769d08e0f9e84f11d60b9f1c5a121695817b64fe859ea7971e0e54e14b9431b1

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\V01.chk

      Filesize

      8KB

      MD5

      0999a5a6509b7cb45c0c00594015c33b

      SHA1

      24c1998220d4766592462a11cebfaf3852b9f077

      SHA256

      5e1b33391572d4f31ecf2f9f6ef06387f0a0969e75b9ea3272f8edc12ee0017c

      SHA512

      a952c6304662b2490e01d2e2b5249af869580449517f6e89eeb22bddb38fe2f3ca55ac7f44431ccfa539f2a82a6eab8c8edd0be7543c6c8fb3d6bfcbd14503a6

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\V01.chk

      Filesize

      8KB

      MD5

      13a0ec4cd9b04772063c4361e168ae8e

      SHA1

      7774ef20e863240dfad274c7b3fa3ab2fade81d2

      SHA256

      6c7bfbe285dce4986e243a28eb3e75daa01fc1bbebd12eb4c58530f09df1df65

      SHA512

      20d74479dbbc81612947236be0cce0850556f3b4a949a0cc51740a17b5cd1ae858e566a935fd388cda385744cae30f5a1d3c8b595853700f9b2927d3d66ef949

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\V01.log

      Filesize

      512KB

      MD5

      129c0b62e053484cc51c991b45b25e14

      SHA1

      b4de9866da28cc8bffccb32c91b2313651a1cf1e

      SHA256

      864a6b5010acacb450d955224fe7fa23ffe666c4c25399f6fb474bea63fa519c

      SHA512

      9c9690718ec8c3ff36bba90cf592854403876d525e99f89b73f9bc89fe448ca9efdc209da0cbed37d1fe28dd1dcbce4ae3aa1105b977ae21ddf825782144d735

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\V01.log

      Filesize

      512KB

      MD5

      d8c0ca934c58b251ab456cd95343e8ed

      SHA1

      ee687c234c463dc9ea2cffa78c8cd8655044daf3

      SHA256

      0a130353bbeb2358eb0020218b0b8f0dc184c850787a133fec99e7ebd8c24812

      SHA512

      ef37e45583fac4bc845628dceed9f3c5bd7363f0cb2fc5f97536b5b16138f85dea08fede62f255c15bef6dcde58b49bbbc29c04d89194cac0d2eb054eb12cbf3

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat

      Filesize

      14.0MB

      MD5

      49e89173d9f99d47790b5969b4d7b9c8

      SHA1

      499d2601e2b9ec41fff46970e48342897e9317b5

      SHA256

      2d8af265f8ff902460ca0b4850e302decc47190c71d6eb9dceb75a09b5b7e466

      SHA512

      9ac3fe31d5f8e1b5e815f4afcbb282938c6da74c0f4df80be2715ef6d3499be9ddf9361ad9f18acec49ee8a2791c4c8b72e8e848994f0fdd98d4f53647602271

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat

      Filesize

      14.0MB

      MD5

      3d8f114a8462ac403e79e40e64641e4e

      SHA1

      6ec8fc42c298bf477830b67c18bdde4089ea42b4

      SHA256

      01b04a7e94a5616d201e080b66be8a3657b3d5e7dcd1b8efcb95696723797dd4

      SHA512

      55c2fc6682252fe8864d9949f044a3d998471d0fa0ece5130e6c253981c80090b7a7f0a94c645cb4cdf7630a3fe7e132a09a159391c3defa15a979f48f906261

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat

      Filesize

      14.0MB

      MD5

      e2cdc97134c665fb53b71eeed0998507

      SHA1

      48fb176c07faf9c02b3884aedb628114cb674ebe

      SHA256

      1cb5a9b52a72073aa60ab0eb9c669191725a8368b4cdf800e2413cdf6521ad94

      SHA512

      dda64ed0c4f2ced943a8ab9ab0f849f609a0f8a957d1b432a4327badba693db0f799c8d13f86ebeb03a108c501ab5bb66dce768401ed097daddb908dfc82deb5

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat

      Filesize

      14.0MB

      MD5

      6e4e1f2a7ea8b207b84f8cf11952b5fa

      SHA1

      0a01725ff195f6964cc21a2959b9a213127b2f38

      SHA256

      1f3e62467962e0f0c43d4779f726503abcdab66c31873dc0d6f76a653845fcdd

      SHA512

      7877669a357ffa7752f74f68e6bb7e7273689fe520de665160ec109e1c6246182074bcf05085839e3fd62bcf89331699cb4e8febaaa96e2ccd5a6748c25143f6

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat

      Filesize

      14.0MB

      MD5

      9de623aa3c794964b8e7138d671aef84

      SHA1

      cf84f09732358aef8d78278533e2932dff3e4ae0

      SHA256

      937c73db573f5de33c9a40d43858d5d1a10f38195da1034ce429739041b2d594

      SHA512

      54615bf1174dad1ff0cbb71b4d0a35d3aa26b01a4d3e315399040a6213f873af11541c5cbbff63c646998d84cd83a3553926feeacaa2ce04d8f787c1756f569f

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat

      Filesize

      14.0MB

      MD5

      3eac066d1777c8d271104dec5bb46694

      SHA1

      11ec8784597f9825c4c5a30b3b36edea3e531bbe

      SHA256

      00b34a14a207bf572aa630067027682d227dfa8b244923d800175440dea68b27

      SHA512

      7b303a6d673e7f8c07e24667e36d70c6bfeb05ecb539e7ec1213a6726e03a427aea0fe9744beb42a9b4c90fece0879ffbb3ccdb7ab7ab526d26239b47a22b76f

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat

      Filesize

      14.0MB

      MD5

      30b4e7bded4ef56eac1fa560369e9eb7

      SHA1

      f0b2cfcb3462e13f0bc19d0ea6190aae0299853d

      SHA256

      974f7d53cf53fb033b604ae63d826ee1e1a439297a000b2c402ca397b98777f5

      SHA512

      3384bba75d74239cfd6ef73dd01fba77ace53ce2bd7b09f66e4a76db8c26d79106fc97b5ac2e26233d63785c2facdec944db847e4a2956258c740ca8456ffa7c

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat

      Filesize

      14.0MB

      MD5

      544f8ee4b685d705d1f8980200887a2f

      SHA1

      9142aee81a47cfd4b7512494085bf63eee468c87

      SHA256

      a14306ed1a74140a5156221e9c137dfabddeaf0130a67ac55368d74b79f0f966

      SHA512

      b5422d567c0daedd61b57f466b044533dc5a38c289b651b21892f08364c55206e054101fef279445ddada8704da3ce7f155a80f440d897d8e714770a8e845884

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat

      Filesize

      14.0MB

      MD5

      7c8bfd6de8800f4b5e7dea1df2642189

      SHA1

      98774dce7c68e929d4c518b7ad4943be040356c4

      SHA256

      cb19983199bbe76fbfab2ce32e849fa788ede96bb65bfdb3db1ed06ce1c6df9f

      SHA512

      51872df65767f1f7b1deab8643ef54b073b48c8cd0abded55944441127d20bddf71345b93591b4473d2057f62c1debfe741a3f1014bf5ae0fc223702510694d9

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat

      Filesize

      14.0MB

      MD5

      16cbde0224d29f933ee979523401f1dd

      SHA1

      e89fd4bff4dce90e089779bea6aa4db874d21b41

      SHA256

      5555a3d48290b115b22865117081cde2f0fb38c5035875c711cea334d09e8358

      SHA512

      b28755d0831c5e4ed997bb407db2a48a2478143559be5507b3e2be96980e805d446dfd7391639e015bba2c98e90d8bb924c4782a0127157fa5d6f7a78c877cbe

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat

      Filesize

      14.0MB

      MD5

      3eafb4d29b4dc69525f4ea66887daf0a

      SHA1

      9484c785e3847ff67aed92427c82b0aadef9f94c

      SHA256

      4c97e2e5dbecac7242f5737021bd823734216f11aac471d718d6fb2cc00d7c93

      SHA512

      f45fcf4e0cf996b3361af12aecddc64118e5528883fba870537308c94c68c8187fef34a13b1a2e0722f2f6444cb89d44166e8999256c9f97ed95b7fbed707422

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat

      Filesize

      14.0MB

      MD5

      8f05a26f4d17c47e5deca99775b430ff

      SHA1

      11688c22677e25dfd098fb16a485282142841679

      SHA256

      4a840f35d39ba7f0fcf62ce04f68008daf3600a73a60fe4d7f639c51c6bf5617

      SHA512

      2b019d380364fe6f83443e7ff9b448addf26232ebdb7af950fa54c600ca9b05ab510736e2bbf26773ffad9374ec42e9a3c1a375e3683f88a12433af4c1fa6f0b

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat

      Filesize

      14.0MB

      MD5

      f234e9ceeb5eac77ff4d601d8f5f3a33

      SHA1

      cd57f39de192ff34d962b60e34d90e15dbab28dc

      SHA256

      9acb0036acb89f26ab9ec5d56086c47ce1e80f81383d84419faf7995fd35e9c7

      SHA512

      0e233ef00bc2a7dcaa1bdd57068098ab066f2c4b9465b7d6cd3ad24164048f9f95249df3f7492fe9e2251c31d779b0ce17dae126dffb071ee596203b46795f29

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.jfm

      Filesize

      16KB

      MD5

      c75eb149604b05a4075045ce50ab11f2

      SHA1

      f326d2afc7d9f55d644a8b4294647bdd063c8a52

      SHA256

      425007fe3907482e31fe34cf2513c22f1bf8a6148a020df51e0605f6ad731c67

      SHA512

      eb87608ddec214dccb937e02e91aaa5ee8468574f8f240af76cb18f957ef62768b24eabb74db6a0258b6530f488efc0f37896e7fe33c70089c755d8bf2350285

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.jfm

      Filesize

      16KB

      MD5

      47889ac0be0b9b6b74e65392f260a61b

      SHA1

      048039468793b5e34e036eb197aa92464b84b4c3

      SHA256

      a65e01af20dde16b513ef0b30be63ef0685d761d762c0e64f44778cbe992f047

      SHA512

      6bc30dafc6160a0ceba93499607dbacc02da70a9bdb605e7d48cd9e443fc7bbca8ad95e562a795beaa1aa8c2412e5292e751edd5a9c172a762b3608c3f07d543

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.jfm

      Filesize

      16KB

      MD5

      c11c0353174ebc0390245da05482cfed

      SHA1

      86b87f656e7a982e625c06a2a0ca9eced45ad44b

      SHA256

      2e5c4084492b22f40b13ca478b49b68e9f85526ba013f2a28ae6b71d58f8dbba

      SHA512

      b7179561e074058e505d13bd6c343b097fe3523d16b306d15f5bb85c0a20a94aa6813eb5235ae3dfa263f0056c28ce0d4fb3ed2ad14550ced65f771bb21390fc

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.jfm

      Filesize

      16KB

      MD5

      22dc74471f2dab9ba9932e13e80e2798

      SHA1

      912714cc0c17781befdfbb31ec8af5f40a985aac

      SHA256

      22809a93e6f17310d53ca1f5099975ec3feccc80744716d2fd9b43a480b55d3d

      SHA512

      32efc274a6494938c93d51f6db55ad24f26ce71e1304c22fdc8a2e5c9e377f64c8d8f0dcdae37d8ca2f0cde8cfdc8d031ac1bee4c6a85ce5b7535cf1e4cf4313

    • C:\Users\Admin\AppData\Local\Temp\CCleaner.exe

      Filesize

      14.0MB

      MD5

      f0f196fd71b9c7d65929861dd1bcfdcf

      SHA1

      c31e7a531f0cf1406de79966a821e9d349a14d2b

      SHA256

      00564fbe89d79ba9aa80a8c2a11c0f721e5ffda0ca0549273a22cf270e52664f

      SHA512

      54e40791562ff3574bc7806e390559aca0b9801a5e404e1fe5ade36d03a99ab8caabd253b3f40c18844c6e359f5f94adae666fc8094cf94b330ab8395f789800

    • C:\Users\Admin\AppData\Local\Temp\WindowsApplication1.exe

      Filesize

      220KB

      MD5

      4c279eeb9afdbe1e3d8a211786230b4b

      SHA1

      55e48b4180c10d79ea8eb6c87da57721feb20ec7

      SHA256

      d25ca6aeaf439fc3ffdea41fe589c898337da384ac85f223fe8d5526055df5f7

      SHA512

      38de68c5b96b7bdef1c7da4677b6ad86f13f683191e76bbe13adaaeaa0311a2a62779e3e949c8d0fa2214523e9d7a75b418eea84c532c38912b7280b911335b0

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1573807221713e71.customDestinations-ms

      Filesize

      8KB

      MD5

      29d89655426b861648b78659f9aeb760

      SHA1

      afa1d1dea11821b33374a5468869b666ed02984a

      SHA256

      9d48795017d8f4437b6ecc3d1858d5ba3ea0ba65947df3730c460b9d89e7b5e0

      SHA512

      d2dbab4ce07fdec0a477673cdda5fdc4600d6c536ed178dabb5c9ddd52b81dd7053afea628cb713a3961d60c3ca43f657c10d076b7e8c47d5c4b9a985a112304

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

      Filesize

      3KB

      MD5

      c25356668522154ab4beff41a1d4f55b

      SHA1

      2ea9dc4b1d377ba9e3bc8312586830adbedc11c0

      SHA256

      891ae76fa130b323962a61f1df9f299081c78c62a77653a640f6a624e28d8fb3

      SHA512

      d46392429114ad4fb8f1ba23dc3bbae09355c51bd7b2a055207cabb27778c48b98238fb0e6038f0825ed4c9c3af4d5a248bbc61adb97c36d527e359a547a6ecf

    • memory/2228-87-0x0000000007730000-0x0000000007738000-memory.dmp

      Filesize

      32KB

    • memory/2228-65-0x0000000007640000-0x0000000007641000-memory.dmp

      Filesize

      4KB

    • memory/2228-38-0x0000000006690000-0x00000000066A0000-memory.dmp

      Filesize

      64KB

    • memory/2228-44-0x0000000006830000-0x0000000006840000-memory.dmp

      Filesize

      64KB

    • memory/2228-32-0x0000000000080000-0x0000000000081000-memory.dmp

      Filesize

      4KB

    • memory/2228-62-0x00000000078B0000-0x00000000078B8000-memory.dmp

      Filesize

      32KB

    • memory/2228-64-0x0000000007650000-0x0000000007658000-memory.dmp

      Filesize

      32KB

    • memory/2228-31-0x0000000000070000-0x0000000000071000-memory.dmp

      Filesize

      4KB

    • memory/2228-29-0x0000000000050000-0x0000000000051000-memory.dmp

      Filesize

      4KB

    • memory/2228-85-0x00000000076F0000-0x00000000076F8000-memory.dmp

      Filesize

      32KB

    • memory/2228-28-0x0000000000040000-0x0000000000041000-memory.dmp

      Filesize

      4KB

    • memory/2228-26-0x0000000000030000-0x0000000000031000-memory.dmp

      Filesize

      4KB

    • memory/2228-25-0x0000000000020000-0x0000000000021000-memory.dmp

      Filesize

      4KB

    • memory/2228-24-0x0000000000010000-0x0000000000011000-memory.dmp

      Filesize

      4KB

    • memory/2228-67-0x0000000007650000-0x0000000007658000-memory.dmp

      Filesize

      32KB

    • memory/2228-30-0x0000000000060000-0x0000000000061000-memory.dmp

      Filesize

      4KB

    • memory/2228-70-0x0000000007640000-0x0000000007648000-memory.dmp

      Filesize

      32KB

    • memory/2228-94-0x0000000007600000-0x0000000007601000-memory.dmp

      Filesize

      4KB

    • memory/2228-73-0x0000000007600000-0x0000000007601000-memory.dmp

      Filesize

      4KB

    • memory/2228-90-0x0000000007640000-0x0000000007641000-memory.dmp

      Filesize

      4KB

    • memory/2280-22-0x00000000007F0000-0x000000000082E000-memory.dmp

      Filesize

      248KB

    • memory/2280-34-0x0000000005200000-0x000000000529C000-memory.dmp

      Filesize

      624KB

    • memory/2280-751-0x0000000005F60000-0x0000000005F7E000-memory.dmp

      Filesize

      120KB

    • memory/2280-752-0x0000000007E00000-0x0000000007E0C000-memory.dmp

      Filesize

      48KB

    • memory/2280-21-0x00000000734EE000-0x00000000734EF000-memory.dmp

      Filesize

      4KB

    • memory/2280-33-0x0000000005160000-0x00000000051F2000-memory.dmp

      Filesize

      584KB

    • memory/2280-23-0x0000000005640000-0x0000000005BE4000-memory.dmp

      Filesize

      5.6MB

    • memory/2280-27-0x00000000734E0000-0x0000000073C90000-memory.dmp

      Filesize

      7.7MB

    • memory/2280-204-0x0000000005590000-0x00000000055E6000-memory.dmp

      Filesize

      344KB

    • memory/2280-192-0x0000000005130000-0x000000000513A000-memory.dmp

      Filesize

      40KB

    • memory/2280-159-0x00000000734E0000-0x0000000073C90000-memory.dmp

      Filesize

      7.7MB

    • memory/2280-157-0x00000000734EE000-0x00000000734EF000-memory.dmp

      Filesize

      4KB