Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250211-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-02-2025 14:14

General

  • Target

    JaffaCakes118_f0e9b3529943f87927fceb023884d1b1.exe

  • Size

    266KB

  • MD5

    f0e9b3529943f87927fceb023884d1b1

  • SHA1

    51bac0f6a569d3579933214641eb9b9293f06463

  • SHA256

    cd161d0c6063a660be6cf30549df81ead3e6ba156287cd8fa8caddcee445b47c

  • SHA512

    e21f6e4080588cf84644b8cf8615551de8245252bfa806207d84e44be7d72298653de9d23ede87c2652b66572b9eb6ef4b10f5c4bdb8cee3a22e15f4e160be43

  • SSDEEP

    6144:ep/jck02ek7v8VjWHJll+s/EyZ+2Wv52AFovNH/mLkGu:I/jJ02r7qWplOk+OAF8NOLK

Malware Config

Extracted

Family

simda

Attributes
  • dga

    cihunemyror.eu

    digivehusyd.eu

    vofozymufok.eu

    fodakyhijyv.eu

    nopegymozow.eu

    gatedyhavyd.eu

    marytymenok.eu

    jewuqyjywyv.eu

    qeqinuqypoq.eu

    kemocujufys.eu

    rynazuqihoj.eu

    lyvejujolec.eu

    tucyguqaciq.eu

    xuxusujenes.eu

    puzutuqeqij.eu

    ciliqikytec.eu

    dikoniwudim.eu

    vojacikigep.eu

    fogeliwokih.eu

    nofyjikoxex.eu

    gadufiwabim.eu

    masisokemep.eu

    jepororyrih.eu

    qetoqolusex.eu

    keraborigin.eu

    ryqecolijet.eu

    lymylorozig.eu

    tunujolavez.eu

    xubifaremin.eu

    puvopalywet.eu

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Simda family
  • simda

    Simda is an infostealer written in C++.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Downloads MZ/PE file 1 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 10 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • System policy modification 1 TTPs 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f0e9b3529943f87927fceb023884d1b1.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f0e9b3529943f87927fceb023884d1b1.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Modifies WinLogon
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2956
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIwIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODM0MTAiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NTUzNjg2NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MTIxODM4NTU0Ii8-PC9hcHA-PC9yZXF1ZXN0Pg
    1⤵
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    PID:2744
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0709C68-22AB-49B3-8E02-9BB5237B8B7B}\MicrosoftEdge_X64_133.0.3065.59.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0709C68-22AB-49B3-8E02-9BB5237B8B7B}\MicrosoftEdge_X64_133.0.3065.59.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0709C68-22AB-49B3-8E02-9BB5237B8B7B}\EDGEMITMP_FE00D.tmp\setup.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0709C68-22AB-49B3-8E02-9BB5237B8B7B}\EDGEMITMP_FE00D.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0709C68-22AB-49B3-8E02-9BB5237B8B7B}\MicrosoftEdge_X64_133.0.3065.59.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2616
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0709C68-22AB-49B3-8E02-9BB5237B8B7B}\EDGEMITMP_FE00D.tmp\setup.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0709C68-22AB-49B3-8E02-9BB5237B8B7B}\EDGEMITMP_FE00D.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0709C68-22AB-49B3-8E02-9BB5237B8B7B}\EDGEMITMP_FE00D.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff77ea86a68,0x7ff77ea86a74,0x7ff77ea86a80
        3⤵
        • Executes dropped EXE
        PID:1112
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0709C68-22AB-49B3-8E02-9BB5237B8B7B}\EDGEMITMP_FE00D.tmp\setup.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0709C68-22AB-49B3-8E02-9BB5237B8B7B}\EDGEMITMP_FE00D.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=1
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:3488
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0709C68-22AB-49B3-8E02-9BB5237B8B7B}\EDGEMITMP_FE00D.tmp\setup.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0709C68-22AB-49B3-8E02-9BB5237B8B7B}\EDGEMITMP_FE00D.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0709C68-22AB-49B3-8E02-9BB5237B8B7B}\EDGEMITMP_FE00D.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff77ea86a68,0x7ff77ea86a74,0x7ff77ea86a80
          4⤵
          • Executes dropped EXE
          PID:3748
      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --register-package-identity --verbose-logging --system-level
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4620
        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff64d436a68,0x7ff64d436a74,0x7ff64d436a80
          4⤵
          • Executes dropped EXE
          PID:3356
      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1488
        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff64d436a68,0x7ff64d436a74,0x7ff64d436a80
          4⤵
          • Executes dropped EXE
          PID:4220
      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --update-game-assist-package --verbose-logging --system-level
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3332
        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff64d436a68,0x7ff64d436a74,0x7ff64d436a80
          4⤵
          • Executes dropped EXE
          PID:4640
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k AppReadiness -p -s AppReadiness
    1⤵
      PID:3592
    • C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe
      "C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe" /InvokerPRAID: Microsoft.MicrosoftOfficeHub prelaunch
      1⤵
        PID:2780
      • C:\Windows\system32\wwahost.exe
        "C:\Windows\system32\wwahost.exe" -ServerName:Microsoft.MicrosoftOfficeHub.wwa
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:5104

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B0709C68-22AB-49B3-8E02-9BB5237B8B7B}\EDGEMITMP_FE00D.tmp\setup.exe

        Filesize

        6.8MB

        MD5

        1b3e9c59f9c7a134ec630ada1eb76a39

        SHA1

        a7e831d392e99f3d37847dcc561dd2e017065439

        SHA256

        ce78ccfb0c9cdb06ea61116bc57e50690650b6b5cf37c1aebfb30c19458ee4ae

        SHA512

        c0e50410dc92d80ff7bc854907774fc551564e078a8d38ca6421f15cea50282c25efac4f357b52b066c4371f9b8d4900fa8122dd80ab06ecbd851c6e049f7a3e

      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

        Filesize

        3.9MB

        MD5

        ad5f7dc7ca3e67dce70c0a89c04519e0

        SHA1

        a10b03234627ca8f3f8034cd5637cda1b8246d83

        SHA256

        663fe0f4e090583e6aa5204b9a80b7a76f677259066e56a7345aebc6bc3e7d31

        SHA512

        ad5490e9865caa454c47ec2e96364b9c566b553e64801da60c295acd570017747be1aff6f22ca6c20c6eee6f6d05a058af72569fd6e656f66e48010978c7fd51

      • C:\Program Files\msedge_installer.log

        Filesize

        73KB

        MD5

        33e6e640f588c86dd83f8553f526a7b1

        SHA1

        8be56bbdb86237703ed99517c0ccf1242c85d9e7

        SHA256

        fcc8ea1a96f07ba7a4ad2c5b7f947662df612f406539825f01bf9bafaeb46ab2

        SHA512

        15500762e27dd2328b55f56899244529390a1483f35a3a7009ac600c06940b6b105ba8050c2ff8ebf2d44ea74455b0626ff3fb06d3707ecb792a125c2c0064d2

      • C:\Program Files\msedge_installer.log

        Filesize

        98KB

        MD5

        cfd1f4ce49528e7eb5d77525e7d4d92b

        SHA1

        acddbc10189332dc090c1ac3d6d156687673e369

        SHA256

        5bc1c90579e699df1df264a9ef0010615bbeca3b0d35b530d7119b5aca32f55c

        SHA512

        5d5f909571187810422733cffc64678773d4995fe04a1414539593c73524ab8d19a559a2b0423a0cd843475f6c557c52f71cf885b8177ab8c1c9d6aba39e19ed

      • C:\Program Files\msedge_installer.log

        Filesize

        102KB

        MD5

        50db94417515ac1521ff183c2df539a2

        SHA1

        2d61fb6660d090d4d699e324f898a50737403385

        SHA256

        93ef0a9b595151d1c16fcee82c99d6debefe702d2027c16ff2d5676af5069a0b

        SHA512

        f9caab249f8a0d99e582110b1c2a95ecca909cbd68436ebba2147bc5ab98b136054df4f8997ff45615d07a5261deed35e98b8e50aa00bacbbb3ec6d125282bb8

      • C:\Program Files\msedge_installer.log

        Filesize

        104KB

        MD5

        ccd5d78c3880093b38fd885d46c4331f

        SHA1

        10afbdc5fa1f3af88a29130c1a7e0b2c54d46ebe

        SHA256

        4e32d52740ac5e26c55f432d2add4737b773e00d7185ae42b273575eecc17487

        SHA512

        236f7e7309fe298c1088cbfb1bd3263d762b99904afb3f5ecedc3316a24db54f910ab19b15010c249fa5100b75fdd12474766925476608259b7890d022765a05

      • memory/2780-282-0x0000028756000000-0x0000028756249000-memory.dmp

        Filesize

        2.3MB

      • memory/2780-280-0x0000028754B00000-0x0000028754B0A000-memory.dmp

        Filesize

        40KB

      • memory/2780-281-0x0000028754B30000-0x0000028754B38000-memory.dmp

        Filesize

        32KB

      • memory/2780-279-0x000002873A5F0000-0x000002873A5FE000-memory.dmp

        Filesize

        56KB

      • memory/2956-85-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-78-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-8-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-63-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-73-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-112-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-111-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-110-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-109-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-108-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-107-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-106-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-105-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-103-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-102-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-100-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-99-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-97-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-95-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-94-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-92-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-91-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-90-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-89-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-88-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-87-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-86-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-6-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-84-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-83-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-81-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-80-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-79-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-10-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-77-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-76-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-75-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-72-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-71-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-70-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-69-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-68-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-67-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-66-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-65-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-64-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-62-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-61-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-104-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-101-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-60-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-98-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-96-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-93-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-59-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-3-0x0000000000A90000-0x0000000000A91000-memory.dmp

        Filesize

        4KB

      • memory/2956-4-0x00000000022B0000-0x0000000002362000-memory.dmp

        Filesize

        712KB

      • memory/2956-5-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2956-2-0x0000000000400000-0x0000000000439000-memory.dmp

        Filesize

        228KB

      • memory/2956-1-0x000000007FDE0000-0x000000007FE49000-memory.dmp

        Filesize

        420KB

      • memory/2956-0-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2956-82-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-58-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-74-0x0000000002940000-0x00000000029F8000-memory.dmp

        Filesize

        736KB

      • memory/2956-127-0x000000007FDE0000-0x000000007FE49000-memory.dmp

        Filesize

        420KB

      • memory/2956-129-0x0000000000400000-0x0000000000439000-memory.dmp

        Filesize

        228KB