Analysis

  • max time kernel
    135s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    30/03/2025, 20:14

General

  • Target

    JaffaCakes118_99153e48e3fd16aa0c4228b79ad13ee4.exe

  • Size

    299KB

  • MD5

    99153e48e3fd16aa0c4228b79ad13ee4

  • SHA1

    f752ba94694f5fbddc7e1ca4e4751ec9be9b4136

  • SHA256

    bfd45eb54e16a0f2123d702a3462eadb80b1234b7302bdaa2033573f5443e8c2

  • SHA512

    06a0cc1cc6290a05b348a2366bfc648e639caff3a2ecf16d0b32c96642e29c373536b45bef8485300957091000e0f9fcb6ce44dd385fe199aa2204cf79bcf8fd

  • SSDEEP

    6144:H8P4VXIg+h80vAVuhuF982YfBXAY9PzLA7pRUMBU54f6fyfiO0R+E:cQmg+v4VuhuF+BfKY9MRihqqbR+E

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 7 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 43 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_99153e48e3fd16aa0c4228b79ad13ee4.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_99153e48e3fd16aa0c4228b79ad13ee4.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Program Files\Common Files\Microsoft Shared\MSINFO\ShellHWSrv.exe
      "C:\Program Files\Common Files\Microsoft Shared\MSINFO\ShellHWSrv.exe"
      2⤵
      • Executes dropped EXE
      PID:1888
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\DaverDel.bat""
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2952
  • C:\Program Files\Common Files\Microsoft Shared\MSINFO\ShellHWSrv.exe
    "C:\Program Files\Common Files\Microsoft Shared\MSINFO\ShellHWSrv.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\program files\internet explorer\IEXPLORE.EXE
      "C:\program files\internet explorer\IEXPLORE.EXE"
      2⤵
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Windows\System32\ie4uinit.exe
        "C:\Windows\System32\ie4uinit.exe" -ShowQLIcon
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        PID:2812
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:2
        3⤵
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies data under HKEY_USERS
        • Suspicious use of SetWindowsHookEx
        PID:2216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Common Files\Microsoft Shared\MSInfo\DaverDel.bat

    Filesize

    212B

    MD5

    2c02e373bd517a904e1fcb5203e4e6b3

    SHA1

    973c29836bcdd9dab4f9095107d764a8e3af7e1b

    SHA256

    b1b4d3635fcd78636569eb901f26a173062beac77a78e7d722eb848d3a262ab1

    SHA512

    5018024e22a4c7f2f24db7925ebe9cb0ffa1f6083ce9c6801b7c0b36b3cc6412ca6cb926b995b1d7bd127285f8113ed1be5e7590220869c4660de566991a1305

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    71KB

    MD5

    83142242e97b8953c386f988aa694e4a

    SHA1

    833ed12fc15b356136dcdd27c61a50f59c5c7d50

    SHA256

    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

    SHA512

    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    83d213d7d7589a3c3f283ec4d601fbe6

    SHA1

    adb7e65b6e02b52b9455a774a9bca1646cbed335

    SHA256

    c6b0ba0999f1f697faa457c24fb5453a303cd6f40ee788604a30ad3518141ffd

    SHA512

    7c478b677a726f889606ee7bdc09d065d8231bc4d78f45cd53ba009d7018a360f37d6ea20b8416865355740bb929a1a94f05de9d45f69867faed9d7cb3868cc9

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ab98c2ef7caaea20e8e2820b09d94ce0

    SHA1

    7c8a7dee0444bb74d47d684b0ec1a76d88e01c4d

    SHA256

    24803226afd3f5aa0d99fc5b1ef25a5b23263222841a1dd0d7db69a47bd9b5a2

    SHA512

    261b6700a789b865627264a02881bec59d3d65035799ed9f6425d150e1e585a406730b7d5f638fb96b74f891a798a7a558c102e9806b7073365dc8c6dff993f7

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6ef5468387841f0118a89c65b2ebb41e

    SHA1

    c961de9daaa93fd780207018018de5b04f1f2015

    SHA256

    99903fa6c6c82019f43baf232bba9915a683b77c52f1fd12fc20f080dbac092b

    SHA512

    9bbbcf1ded286b94680632c35e1d5fdb6ab51191e7c714d05c58794fb43b21fe0b97337a821312a52103e1f05cc6658e177f89a1b800055f134683bf735616b6

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2d548d6c5966bd411a890af1b813caf0

    SHA1

    107a2c3a088ba4df024478969997d9bcfdffd6f6

    SHA256

    9f2f4539e7cd9d2c704f94c960717b573e33f8849e93d3417050eea316dd8443

    SHA512

    51d3f1aaf59e6161b0d42cfb27336bfd38bfdb76fafa95f21e5ffbc029c95fe1bead7ec4caf5b2225ad823dfe04fa8fb48e3b551802be8d02aabd0e571812952

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7471b4a08e5a9d817427dce336219f80

    SHA1

    a7dfec8e38d66179c99b79f71ca0dbfe45f06bf8

    SHA256

    84927095ef8d53e1c9a49cd56b83ef4cc9705dda21db9609b4e00777f2e9cc4d

    SHA512

    246afbbc907257ec2796a7aadd16db31a5976a3d327931f82f93a6824cdc8110326917a077a885b8d0d7d5ca47ac466b0b2fe6b3aec52231a7314479a541fac3

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1c2e90c580b66ee0a04d10596639072e

    SHA1

    12384aa88b234cff73c2b635faa5829a8522c2d7

    SHA256

    57b8b399451cf0c7814a75d2839cab5507272f8a1ebebc2aac617775c4d37d99

    SHA512

    a5f1b9590b43b4e23ba08b6df904ce598d0210419547476e3b44af04e8a4eeb138196d2b7fabed4de1d31973369b7d14abe54593d003b8af670a813c433122e8

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7e2537b1818de1c6b9712523184b9172

    SHA1

    238170bd22e7fff28894c150d1bb6a8da58123ac

    SHA256

    504cba0ad64887caa880518764ea336e7c64c5a506433c7be38576fd70070e71

    SHA512

    e3f727682f8f412dba1499ce85996251880ab83c41a44cdd42ae1914c180d3a1153aa7a06ba5ef5a946ed669281beafa51d5adccf3650c715fb9431b12b3d566

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8b235a9672591cbca1762fd50122ba79

    SHA1

    1669786fefd66406d8645f2443c63c9d35cfc065

    SHA256

    7055fa1e833950e9b2d8eb7e0323e7a57b209dd8bb61696e791cbaf305ee877a

    SHA512

    773efecce9b3d99b9d49d10077cca950695c202d3301be58460c647bf785f0a50cc0521d4af09623800f6a2bd078cb84a4821a25ade099fedf72253c4d4d759a

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6633b289a789010348c5525bd8a8af38

    SHA1

    82427bdca41b1dfdc22d847bc624bfec263c6463

    SHA256

    3ced05f0714a253e3b367db8084c038107e2e2b51b3538accc6bce30a63d4f1c

    SHA512

    901f7f92c291f4968c957c73098bd6405ce11cf4fbd61ba1f8ee6223ce2de805cdbfd596b24cd250af788aa0d49b319a7a4c272110cd78d0417773c7c4ce1019

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    77313d751d7787d0f1ff187b3c8c70cf

    SHA1

    14e6462677699da1bb3f4fc0393374eec1987fc2

    SHA256

    ff15828752f08e6ff96123cc5f5c07f0c37cb40c8be7aae626fe1225e6ff7ff4

    SHA512

    6e8fa99cd1906afb4f4b0145773c25c0d239f3ce6146e0a7e7ac99cbf5e3e2cf54832d5df8f16d385e189340b09c9c5495f00e1de26b78537f538ff9f4120708

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2b33b1fcafea28c153f45bf014002da3

    SHA1

    16ef11e71c8712d45269c63d64eb091f5d34d0d1

    SHA256

    d1f72af9faea0d544a11c5295965188d6068015f716432e314ca8d34a9da76c4

    SHA512

    40789463463c75a1d837accbc27376e6d1b2ba036b09a63f8638bcbe1df63186957043e4ee54fe590b25ba2fb173e213b1c49326e000865af7d0fcbcd92537a1

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    be4bc9fae2349a38bf3b16be3717714a

    SHA1

    76778fb1204cb05b5018558e419d799741422d8e

    SHA256

    1ab669e284dee62c931d13944d98c8ddeffa3ac72b12537e2bed72f9469854d1

    SHA512

    e234150a5a60b91bfab76aba73b2fcae3257569559f322ca4eea0457533808e2543e044393b9f15dfc501bd478ec7f2cec32a8f0081c3572e8c1d0cb562f6d65

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e0782661023a511624440079c5edbd42

    SHA1

    9e087aa0b8740738a0c688d729fd630d3727c699

    SHA256

    a348db5e25f4af14a23fa6e93358878681308092e3330313418f1a3f720192d4

    SHA512

    91de02771cd4f95e73663f765443efefda99a5dacbba93a3d6a9bde986289ac8a682f6e9be097894f07e5e09e3b24f7e166afe51283f8b2720bdd5f862284091

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    b52dd1cc2a0e73e1c9580aff3b9b3ebc

    SHA1

    3a07e3541c10f58bb4b407255412b11d309be884

    SHA256

    0e6b147e82d7edb326ac091b2bdf0cf77e9cdebb9c00d6465b8888402c926335

    SHA512

    da2c63573b5ed09fd606e4fa9aaa4fe8ede51091829655b214526608973b01c694eed4d5447df1ea980cb20a036a306ddd40b9ad1901dc4525b961fbe12bd17b

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    446144c2dd83adcc8bfb46999ee04411

    SHA1

    f4242ec838fca810b8e155409d46fb18290cab33

    SHA256

    d8589f84ac780784bde4f04daca1837e6502715d3e36ebdc587bc378686075cd

    SHA512

    bf18a0336c1f96f11189d614cfe289a6b10a50775d7d02ccb0f0cce2957d4ebe7d12cdefdda3aaffcfa10121565acdf893e75c26c39d215e44e3440850f52a0e

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • C:\Windows\System32\config\systemprofile\Favorites\Links\Suggested Sites.url

    Filesize

    129B

    MD5

    2578ef0db08f1e1e7578068186a1be0f

    SHA1

    87dca2f554fa51a98726f0a7a9ac0120be0c4572

    SHA256

    bdc63d9fd191114227a6e0ac32aaf4de85b91fc602fcb8555c0f3816ac8620b3

    SHA512

    b42be0e6f438362d107f0f3a7e4809753cf3491ab15145f9ffa4def413606243f4dfffc0449687bd1bb01c653e9339e26b97c286382743d14a2f0ed52e72f7ee

  • C:\Windows\System32\config\systemprofile\Favorites\Links\Suggested Sites.url

    Filesize

    236B

    MD5

    11cede0563d1d61930e433cd638d6419

    SHA1

    366b26547292482b871404b33930cefca8810dbd

    SHA256

    e3ab045d746a0821cfb0c34aee9f98ce658caab2c99841464c68d49ab2cd85d9

    SHA512

    d9a4cdd3d3970d1f3812f7b5d21bb9ae1f1347d0ddfe079a1b5ef15ec1367778056b64b865b21dd52692134771655461760db75309c78dc6f372cc4d0ab7c752

  • C:\Windows\System32\config\systemprofile\Favorites\Links\desktop.ini

    Filesize

    80B

    MD5

    3c106f431417240da12fd827323b7724

    SHA1

    2345cc77576f666b812b55ea7420b8d2c4d2a0b5

    SHA256

    e469ed17b4b54595b335dc51817a52b81fcf13aad7b7b994626f84ec097c5d57

    SHA512

    c7391b6b9c4e00494910303e8a6c4dca5a5fc0c461047ef95e3be1c8764928af344a29e2e7c92819174894b51ae0e69b5e11a9dc7cb093f984553d34d5e737bb

  • C:\Windows\System32\config\systemprofile\Favorites\desktop.ini

    Filesize

    402B

    MD5

    881dfac93652edb0a8228029ba92d0f5

    SHA1

    5b317253a63fecb167bf07befa05c5ed09c4ccea

    SHA256

    a45e345556901cd98b9bf8700b2a263f1da2b2e53dbdf69b9e6cfab6e0bd3464

    SHA512

    592b24deb837d6b82c692da781b8a69d9fa20bbaa3041d6c651839e72f45ac075a86cb967ea2df08fa0635ae28d6064a900f5d15180b9037bb8ba02f9e8e1810

  • C:\Windows\Temp\CabC70C.tmp

    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\TarC70F.tmp

    Filesize

    81KB

    MD5

    b13f51572f55a2d31ed9f266d581e9ea

    SHA1

    7eef3111b878e159e520f34410ad87adecf0ca92

    SHA256

    725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

    SHA512

    f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

  • C:\Windows\Temp\TarC908.tmp

    Filesize

    183KB

    MD5

    109cab5505f5e065b63d01361467a83b

    SHA1

    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

    SHA256

    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

    SHA512

    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

  • C:\Windows\Temp\wwwB6E1.tmp

    Filesize

    195B

    MD5

    a1fd5255ed62e10721ac426cd139aa83

    SHA1

    98a11bdd942bb66e9c829ae0685239212e966b9e

    SHA256

    d3b6eea852bacee54fbf4f3d77c6ec6d198bd59258968528a0231589f01b32f4

    SHA512

    51399b4eac1883f0e52279f6b9943d5a626de378105cadff2b3c17473edf0835d67437ae8e8d0e25e5d4b88f924fa3ac74d808123ec2b7f98eff1b248a1ab370

  • C:\Windows\Temp\wwwB6F1.tmp

    Filesize

    216B

    MD5

    2ce792bc1394673282b741a25d6148a2

    SHA1

    5835c389ea0f0c1423fa26f98b84a875a11d19b1

    SHA256

    992031e95ad1e0f4305479e8d132c1ff14ed0eb913da33f23c576cd89f14fa48

    SHA512

    cdcc4d9967570018ec7dc3d825ff96b4817fecfbd424d30b74ba9ab6cc16cb035434f680b3d035f7959ceb0cc9e3c56f8dc78b06adb1dd2289930cc9acc87749

  • \Program Files\Common Files\Microsoft Shared\MSInfo\ShellHWSrv.exe

    Filesize

    299KB

    MD5

    99153e48e3fd16aa0c4228b79ad13ee4

    SHA1

    f752ba94694f5fbddc7e1ca4e4751ec9be9b4136

    SHA256

    bfd45eb54e16a0f2123d702a3462eadb80b1234b7302bdaa2033573f5443e8c2

    SHA512

    06a0cc1cc6290a05b348a2366bfc648e639caff3a2ecf16d0b32c96642e29c373536b45bef8485300957091000e0f9fcb6ce44dd385fe199aa2204cf79bcf8fd

  • memory/1688-18-0x0000000000400000-0x0000000000502000-memory.dmp

    Filesize

    1.0MB

  • memory/1688-17-0x0000000000400000-0x0000000000502000-memory.dmp

    Filesize

    1.0MB

  • memory/1688-19-0x0000000000220000-0x0000000000260000-memory.dmp

    Filesize

    256KB

  • memory/1688-30-0x0000000000400000-0x0000000000502000-memory.dmp

    Filesize

    1.0MB

  • memory/1888-14-0x0000000000400000-0x0000000000502000-memory.dmp

    Filesize

    1.0MB

  • memory/1888-15-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/1888-47-0x0000000000400000-0x0000000000502000-memory.dmp

    Filesize

    1.0MB

  • memory/2340-27-0x0000000000400000-0x0000000000502000-memory.dmp

    Filesize

    1.0MB

  • memory/2340-2-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2340-13-0x0000000001E90000-0x0000000001F92000-memory.dmp

    Filesize

    1.0MB

  • memory/2340-0-0x0000000000400000-0x0000000000502000-memory.dmp

    Filesize

    1.0MB

  • memory/2340-1-0x0000000000400000-0x0000000000502000-memory.dmp

    Filesize

    1.0MB

  • memory/2756-29-0x0000000000160000-0x000000000020A000-memory.dmp

    Filesize

    680KB