Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250207-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-02-2025 16:49

General

  • Target

    JaffaCakes118_e85b3594ce638ff4a027cc7baecf1bfa.exe

  • Size

    259KB

  • MD5

    e85b3594ce638ff4a027cc7baecf1bfa

  • SHA1

    cb8ff1b8722a819aed670d2a4edb97ea03a97c65

  • SHA256

    a36d6ebaf2797f68e6e8bbde6b4acc7ba6d8780ed4519057ffafcf149b4f4bcb

  • SHA512

    c2ca5f8fb9862fa1ab3b86d63a03f3ceff9d9b10c6d44eb6b8bc7bc2d0d08e2a9d16632498979c87f5e4d5561e17d8fcbded6ef141e252ec14b936604e03839f

  • SSDEEP

    6144:iyK4+vW9EnkxPWu9oYUkZYeLoerbZP4sdA9hmEPpW5rpH:FK99kPWqBU0LDrNgsdA9hFPW9

Malware Config

Extracted

Family

simda

Attributes
  • dga

    cihunemyror.eu

    digivehusyd.eu

    vofozymufok.eu

    fodakyhijyv.eu

    nopegymozow.eu

    gatedyhavyd.eu

    marytymenok.eu

    jewuqyjywyv.eu

    qeqinuqypoq.eu

    kemocujufys.eu

    rynazuqihoj.eu

    lyvejujolec.eu

    tucyguqaciq.eu

    xuxusujenes.eu

    puzutuqeqij.eu

    ciliqikytec.eu

    dikoniwudim.eu

    vojacikigep.eu

    fogeliwokih.eu

    nofyjikoxex.eu

    gadufiwabim.eu

    masisokemep.eu

    jepororyrih.eu

    qetoqolusex.eu

    keraborigin.eu

    ryqecolijet.eu

    lymylorozig.eu

    tunujolavez.eu

    xubifaremin.eu

    puvopalywet.eu

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Downloads MZ/PE file 1 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 10 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • System policy modification 1 TTPs 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e85b3594ce638ff4a027cc7baecf1bfa.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e85b3594ce638ff4a027cc7baecf1bfa.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Modifies WinLogon
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2176
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI0IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY0MzMiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODc1OTU2NTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MjEzNTAxNjExIi8-PC9hcHA-PC9yZXF1ZXN0Pg
    1⤵
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    PID:2124
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{EECCB076-10E1-4F6F-AC85-79AE84AEE3B1}\MicrosoftEdge_X64_132.0.2957.140.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{EECCB076-10E1-4F6F-AC85-79AE84AEE3B1}\MicrosoftEdge_X64_132.0.2957.140.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:900
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{EECCB076-10E1-4F6F-AC85-79AE84AEE3B1}\EDGEMITMP_A9977.tmp\setup.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{EECCB076-10E1-4F6F-AC85-79AE84AEE3B1}\EDGEMITMP_A9977.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{EECCB076-10E1-4F6F-AC85-79AE84AEE3B1}\MicrosoftEdge_X64_132.0.2957.140.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3584
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{EECCB076-10E1-4F6F-AC85-79AE84AEE3B1}\EDGEMITMP_A9977.tmp\setup.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{EECCB076-10E1-4F6F-AC85-79AE84AEE3B1}\EDGEMITMP_A9977.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{EECCB076-10E1-4F6F-AC85-79AE84AEE3B1}\EDGEMITMP_A9977.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.140 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff6037ea818,0x7ff6037ea824,0x7ff6037ea830
        3⤵
        • Executes dropped EXE
        PID:4928
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{EECCB076-10E1-4F6F-AC85-79AE84AEE3B1}\EDGEMITMP_A9977.tmp\setup.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{EECCB076-10E1-4F6F-AC85-79AE84AEE3B1}\EDGEMITMP_A9977.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=1
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:1824
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{EECCB076-10E1-4F6F-AC85-79AE84AEE3B1}\EDGEMITMP_A9977.tmp\setup.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{EECCB076-10E1-4F6F-AC85-79AE84AEE3B1}\EDGEMITMP_A9977.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{EECCB076-10E1-4F6F-AC85-79AE84AEE3B1}\EDGEMITMP_A9977.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.140 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff6037ea818,0x7ff6037ea824,0x7ff6037ea830
          4⤵
          • Executes dropped EXE
          PID:3300
      • C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --msedge --channel=stable --register-package-identity --verbose-logging --system-level
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4032
        • C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.140 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff79bc6a818,0x7ff79bc6a824,0x7ff79bc6a830
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          PID:4640
      • C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:348
        • C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.140 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff79bc6a818,0x7ff79bc6a824,0x7ff79bc6a830
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          PID:1440
      • C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --msedge --channel=stable --update-game-assist-package --verbose-logging --system-level
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:4728
        • C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.140 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff79bc6a818,0x7ff79bc6a824,0x7ff79bc6a830
          4⤵
          • Executes dropped EXE
          PID:4560
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k AppReadiness -p -s AppReadiness
    1⤵
      PID:2688
    • C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe
      "C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe" /InvokerPRAID: Microsoft.MicrosoftOfficeHub prelaunch
      1⤵
        PID:3116
      • C:\Windows\system32\wwahost.exe
        "C:\Windows\system32\wwahost.exe" -ServerName:Microsoft.MicrosoftOfficeHub.wwa
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:380

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{EECCB076-10E1-4F6F-AC85-79AE84AEE3B1}\EDGEMITMP_A9977.tmp\setup.exe

        Filesize

        6.6MB

        MD5

        b4c8ad75087b8634d4f04dc6f92da9aa

        SHA1

        7efaa2472521c79d58c4ef18a258cc573704fb5d

        SHA256

        522a25568bb503cf8b44807661f31f0921dee91d37691bf399868733205690bf

        SHA512

        5094505b33a848badcffd6b3b93aad9ad73f391e201dee052376c4f8573ba351f0b8c102131216088ffb38d0ed7b5fe70ba95c3ac2c33a50c993584fe7c435e3

      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

        Filesize

        3.7MB

        MD5

        3646786aea064c0845f5bb1b8e976985

        SHA1

        a31ba2d2192898d4c0a01511395bdf87b0e53873

        SHA256

        a129a6de7b90500483226192b260eaca1ee116a007771d421aa3eee38af48d6f

        SHA512

        145f8abf2ecffd8ecc3745dbd9ab2e360826fa46d6f21dbebece7802b9b5980f4ab19e2dfd180ce0cfb84366f3ac5c87cd1b74a085e1a0dd620b6c097900e0f4

      • C:\Program Files\msedge_installer.log

        Filesize

        70KB

        MD5

        7f21c78925c91bf717f0f05930de7385

        SHA1

        dff1353dff160633d1c87fcd4c81f39b26e52492

        SHA256

        ded40dfda5d7f99f55b9f02a1049e538251698b34fef19a38161f31715ee647c

        SHA512

        fe4fc673cd5dcaea4a5fc973c5279836b855ae8eab232a01fc5f966db60daeb99e82c2051158147914fc04a7cc74a0dd2fcb8919c7ca3dd7864a7c74636a2e8a

      • C:\Program Files\msedge_installer.log

        Filesize

        96KB

        MD5

        bb5a95e3b220d44fa2692d662d1a2f10

        SHA1

        3cbf4599f9e05670e2823abfbc6c03c6238b9c64

        SHA256

        611118822e0e8090809165f97e2429c2d5b023a8dfcbb878ea10cba3ad3a13b9

        SHA512

        9e711fcf4ec3c1b17e214aff7c6e92648689bec38b7cb6aa37ec74fc228ac362b0a56e73770ec5815149b71edf1608bb464bc350aaaf08b7ce2eada864ac1959

      • C:\Program Files\msedge_installer.log

        Filesize

        101KB

        MD5

        e983624e4b87a8979cabc4a87bf38da6

        SHA1

        eecc6600cbcd4d081d499d89eda4f69a8d4eec84

        SHA256

        1d946e7ef35cfc67f1f07f411ca80f39c01e17b2dbc8d5c6f922a9685e6938e2

        SHA512

        db254da96b5f414895ad40d203d63a542eecc01c0e1bdeb68b354e80802a6579eae05e5deb160314a5dbb2ea518f92d9cdad751bc971006c30d6531a1753308f

      • C:\Program Files\msedge_installer.log

        Filesize

        102KB

        MD5

        07576d0500ac9b6eec02b7fbda25c2e0

        SHA1

        532da26dae0c4ec1d09f597b28c7fedf9df99ac6

        SHA256

        0cb7001f97da50d608407abbc2966626cb5e15604e84437c6b55c9940cf5f5cc

        SHA512

        dd4ad554b5e6982ca208ecf906568f0289e1e6a86dcff9f1b76ebaedcf96898d944cfa3b02f0723915b6f61ee9e696c5dd0e9d33051781635c3f1f227eb1a248

      • memory/2176-92-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-62-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-5-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-7-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-9-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-88-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-118-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-117-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-116-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-115-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-87-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-113-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-112-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-111-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-110-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-109-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-108-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-107-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-106-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-105-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-104-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-103-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-102-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-101-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-99-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-98-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-97-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-96-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-95-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-89-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-93-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-3-0x0000000002080000-0x0000000002132000-memory.dmp

        Filesize

        712KB

      • memory/2176-91-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-90-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-94-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-4-0x0000000000400000-0x000000000045A000-memory.dmp

        Filesize

        360KB

      • memory/2176-114-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-86-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-85-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-83-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-82-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-81-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-80-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-79-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-78-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-77-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-76-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-75-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-74-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-73-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-72-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-71-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-70-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-68-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-66-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-67-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-65-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-63-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-100-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-1-0x0000000000400000-0x0000000000439000-memory.dmp

        Filesize

        228KB

      • memory/2176-0-0x000000007FDE0000-0x000000007FE49000-memory.dmp

        Filesize

        420KB

      • memory/2176-84-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-69-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-64-0x00000000026B0000-0x0000000002768000-memory.dmp

        Filesize

        736KB

      • memory/2176-127-0x000000007FDE0000-0x000000007FE49000-memory.dmp

        Filesize

        420KB

      • memory/2176-129-0x0000000000400000-0x0000000000439000-memory.dmp

        Filesize

        228KB

      • memory/3116-261-0x000002B1260E0000-0x000002B1260EE000-memory.dmp

        Filesize

        56KB

      • memory/3116-262-0x000002B126590000-0x000002B12659A000-memory.dmp

        Filesize

        40KB

      • memory/3116-263-0x000002B1265C0000-0x000002B1265C8000-memory.dmp

        Filesize

        32KB

      • memory/3116-264-0x000002B140A00000-0x000002B140C49000-memory.dmp

        Filesize

        2.3MB