Analysis
-
max time kernel
128s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2024 10:18
Static task
static1
Behavioral task
behavioral1
Sample
19c3974a646ad7ea6852c711dc23f6b9_JaffaCakes118.dll
Resource
win7-20240611-en
General
-
Target
19c3974a646ad7ea6852c711dc23f6b9_JaffaCakes118.dll
-
Size
161KB
-
MD5
19c3974a646ad7ea6852c711dc23f6b9
-
SHA1
4b7b510bc717b05204d6fef0cd480f2e3ca77f8b
-
SHA256
6bbd3937f7b0c3c57ddc663176a4245745a920f71a5f699924d7e26315759c5d
-
SHA512
5e4dc4e11d05b88148f6699f926f16d324901989748c5ae58593f9d914ed11702da5accfc87e4be1d780d6dcb2d9da26a23a368189d232704a0e483a7f4c0828
-
SSDEEP
3072:UTU56gVxj27Neum+uemO5WjmmmmmmmmmmmmmmmmmmmrCQmmmmmmmmmmmmmmmmmmK:n4Hm+uemO5Wjmmmmmmmmmmmmmmmmmmmc
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
regsvr32mgr.exeWaterMark.exepid process 2632 regsvr32mgr.exe 540 WaterMark.exe -
Processes:
resource yara_rule behavioral2/memory/2632-8-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2632-12-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2632-10-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2632-13-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/540-24-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/540-28-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/540-30-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2632-16-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2632-7-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2632-6-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/540-38-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/540-39-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
Processes:
regsvr32.exedescription ioc process File created C:\Windows\SysWOW64\regsvr32mgr.exe regsvr32.exe -
Drops file in Program Files directory 3 IoCs
Processes:
regsvr32mgr.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\px2EC1.tmp regsvr32mgr.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe regsvr32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe regsvr32mgr.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3148 1616 WerFault.exe svchost.exe -
Processes:
iexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{D7FD420B-3537-11EF-9D11-429904AF4EC5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31115588" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2894449741" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426334918" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31115588" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2891949710" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2894293644" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2891949710" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31115588" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{D7FFA4BE-3537-11EF-9D11-429904AF4EC5} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31115588" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2891949710" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31115588" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31115588" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2891949710" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
WaterMark.exepid process 540 WaterMark.exe 540 WaterMark.exe 540 WaterMark.exe 540 WaterMark.exe 540 WaterMark.exe 540 WaterMark.exe 540 WaterMark.exe 540 WaterMark.exe 540 WaterMark.exe 540 WaterMark.exe 540 WaterMark.exe 540 WaterMark.exe 540 WaterMark.exe 540 WaterMark.exe 540 WaterMark.exe 540 WaterMark.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WaterMark.exedescription pid process Token: SeDebugPrivilege 540 WaterMark.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exeiexplore.exepid process 3376 iexplore.exe 704 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
iexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 704 iexplore.exe 704 iexplore.exe 3376 iexplore.exe 3376 iexplore.exe 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE 4560 IEXPLORE.EXE 4560 IEXPLORE.EXE 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
regsvr32mgr.exeWaterMark.exepid process 2632 regsvr32mgr.exe 540 WaterMark.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
regsvr32.exeregsvr32.exeregsvr32mgr.exeWaterMark.exeiexplore.exeiexplore.exedescription pid process target process PID 4860 wrote to memory of 4624 4860 regsvr32.exe regsvr32.exe PID 4860 wrote to memory of 4624 4860 regsvr32.exe regsvr32.exe PID 4860 wrote to memory of 4624 4860 regsvr32.exe regsvr32.exe PID 4624 wrote to memory of 2632 4624 regsvr32.exe regsvr32mgr.exe PID 4624 wrote to memory of 2632 4624 regsvr32.exe regsvr32mgr.exe PID 4624 wrote to memory of 2632 4624 regsvr32.exe regsvr32mgr.exe PID 2632 wrote to memory of 540 2632 regsvr32mgr.exe WaterMark.exe PID 2632 wrote to memory of 540 2632 regsvr32mgr.exe WaterMark.exe PID 2632 wrote to memory of 540 2632 regsvr32mgr.exe WaterMark.exe PID 540 wrote to memory of 1616 540 WaterMark.exe svchost.exe PID 540 wrote to memory of 1616 540 WaterMark.exe svchost.exe PID 540 wrote to memory of 1616 540 WaterMark.exe svchost.exe PID 540 wrote to memory of 1616 540 WaterMark.exe svchost.exe PID 540 wrote to memory of 1616 540 WaterMark.exe svchost.exe PID 540 wrote to memory of 1616 540 WaterMark.exe svchost.exe PID 540 wrote to memory of 1616 540 WaterMark.exe svchost.exe PID 540 wrote to memory of 1616 540 WaterMark.exe svchost.exe PID 540 wrote to memory of 1616 540 WaterMark.exe svchost.exe PID 540 wrote to memory of 704 540 WaterMark.exe iexplore.exe PID 540 wrote to memory of 704 540 WaterMark.exe iexplore.exe PID 540 wrote to memory of 3376 540 WaterMark.exe iexplore.exe PID 540 wrote to memory of 3376 540 WaterMark.exe iexplore.exe PID 704 wrote to memory of 4560 704 iexplore.exe IEXPLORE.EXE PID 704 wrote to memory of 4560 704 iexplore.exe IEXPLORE.EXE PID 704 wrote to memory of 4560 704 iexplore.exe IEXPLORE.EXE PID 3376 wrote to memory of 1796 3376 iexplore.exe IEXPLORE.EXE PID 3376 wrote to memory of 1796 3376 iexplore.exe IEXPLORE.EXE PID 3376 wrote to memory of 1796 3376 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\19c3974a646ad7ea6852c711dc23f6b9_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\19c3974a646ad7ea6852c711dc23f6b9_JaffaCakes118.dll2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32mgr.exeC:\Windows\SysWOW64\regsvr32mgr.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe5⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 2046⤵
- Program crash
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:704 CREDAT:17410 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3376 CREDAT:17410 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1616 -ip 16161⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{D7FD420B-3537-11EF-9D11-429904AF4EC5}.datFilesize
3KB
MD5cf1d620528eff0da992e2081d6650085
SHA12e318d33261b0e149e18d21e11b2cb91aa753b3c
SHA256d2b792cc506e2849d92f60f92ab5d19917f1175b3a08640a1cc1504ddff27dca
SHA51244fceece6a602e028d65262239373428497cff58e6e183fd91a5dbc68a6a96a9f4f0673999721cc5a03334a056b9e6ca73f53746f3c40a19809549cf0f563190
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{D7FFA4BE-3537-11EF-9D11-429904AF4EC5}.datFilesize
5KB
MD5cee6b1a5bc59981015c554a62eefc18f
SHA19ad63ced7dad40fd9bc3e95ea4cdcf129e19f78d
SHA256e5d60b35c1f4f75d4d69c011a0754c3a29c2897d405984b212e0e8dc54e4a4a7
SHA512908070081997fe6b18ecb3ec33999b7d592aa312d4ddbb300be7b4c796020324f22162930a9256a5c7ab65251f1c403d19cd2a7f5c5d284ef46c5edda15b9bed
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verB111.tmpFilesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QQACG5HD\suggestions[1].en-USFilesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Windows\SysWOW64\regsvr32mgr.exeFilesize
92KB
MD59efa35f79704a13f682a13efc6770276
SHA1e75cb9eac6f47407baaeac4b6f342e9b34385d02
SHA25698b86f0605c851a7ba65f27c98831ef55195370e20b181d8faa1131e4aee6387
SHA51283a48096a9898482f7069f8ec0372b1dec3145c4c13edd91aa7ea76328544b6bb0c7bb56aebd091f26faaf078e8dc8d560047073911e0a11db62acfc74058874
-
memory/540-34-0x0000000077132000-0x0000000077133000-memory.dmpFilesize
4KB
-
memory/540-35-0x0000000000070000-0x0000000000071000-memory.dmpFilesize
4KB
-
memory/540-39-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/540-24-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/540-28-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/540-31-0x0000000077132000-0x0000000077133000-memory.dmpFilesize
4KB
-
memory/540-30-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/540-27-0x00000000001D0000-0x00000000001D1000-memory.dmpFilesize
4KB
-
memory/540-38-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/1616-33-0x0000000000BD0000-0x0000000000BD1000-memory.dmpFilesize
4KB
-
memory/1616-32-0x0000000000BF0000-0x0000000000BF1000-memory.dmpFilesize
4KB
-
memory/2632-7-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2632-6-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2632-10-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2632-11-0x00000000008A0000-0x00000000008A1000-memory.dmpFilesize
4KB
-
memory/2632-12-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2632-16-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2632-13-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2632-8-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2632-5-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/4624-2-0x0000000074AE0000-0x0000000074B0B000-memory.dmpFilesize
172KB