Malware Analysis Report

2025-03-14 22:10

Sample ID 240407-225n2shd48
Target e61079bd50eec82addf0a77218497655_JaffaCakes118
SHA256 0c43c680809d5cc9cbf4bf7c78e086879f7820875e4af5374befd082b5424430
Tags
persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0c43c680809d5cc9cbf4bf7c78e086879f7820875e4af5374befd082b5424430

Threat Level: Known bad

The file e61079bd50eec82addf0a77218497655_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

persistence

Modifies WinLogon for persistence

Suspicious use of SetThreadContext

Drops file in System32 directory

Program crash

Unsigned PE

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-07 23:05

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-07 23:05

Reported

2024-04-07 23:08

Platform

win7-20240220-en

Max time kernel

140s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe"

Signatures

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1976 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe
PID 1976 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe
PID 1976 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe
PID 1976 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe
PID 1976 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe
PID 1976 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe
PID 1976 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe
PID 1976 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe
PID 1976 wrote to memory of 2740 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe
PID 2740 wrote to memory of 2620 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\SysWOW64\WerFault.exe
PID 2740 wrote to memory of 2620 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\SysWOW64\WerFault.exe
PID 2740 wrote to memory of 2620 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\SysWOW64\WerFault.exe
PID 2740 wrote to memory of 2620 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\SysWOW64\WerFault.exe

Processes

C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 128

Network

N/A

Files

memory/2740-0-0x0000000000400000-0x0000000000419000-memory.dmp

memory/2740-2-0x0000000000400000-0x0000000000419000-memory.dmp

memory/2740-4-0x0000000000400000-0x0000000000419000-memory.dmp

memory/2740-7-0x0000000000400000-0x0000000000419000-memory.dmp

memory/2740-10-0x0000000000400000-0x0000000000419000-memory.dmp

memory/2740-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2740-15-0x0000000000400000-0x0000000000419000-memory.dmp

memory/1976-14-0x0000000000400000-0x000000000041E000-memory.dmp

memory/2740-18-0x0000000000400000-0x0000000000419000-memory.dmp

memory/2740-17-0x0000000000220000-0x0000000000233000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-07 23:05

Reported

2024-04-07 23:08

Platform

win10v2004-20240226-en

Max time kernel

162s

Max time network

165s

Command Line

winlogon.exe

Signatures

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\sdra64.exe," C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\sdra64.exe C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe N/A
File created C:\Windows\SysWOW64\sdra64.exe C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1272 wrote to memory of 380 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe
PID 1272 wrote to memory of 380 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe
PID 1272 wrote to memory of 380 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe
PID 1272 wrote to memory of 380 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe
PID 1272 wrote to memory of 380 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe
PID 1272 wrote to memory of 380 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe
PID 1272 wrote to memory of 380 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe
PID 1272 wrote to memory of 380 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 380 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe C:\Windows\system32\winlogon.exe

Processes

C:\Windows\system32\winlogon.exe

winlogon.exe

C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 121.118.77.104.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 92.16.208.104.in-addr.arpa udp

Files

memory/380-0-0x0000000000400000-0x0000000000419000-memory.dmp

memory/380-1-0x0000000000400000-0x0000000000419000-memory.dmp

memory/380-2-0x0000000000400000-0x0000000000419000-memory.dmp

memory/1272-4-0x0000000000400000-0x000000000041E000-memory.dmp

memory/380-5-0x0000000000400000-0x0000000000419000-memory.dmp

memory/380-7-0x00000000009C0000-0x00000000009D3000-memory.dmp

memory/380-8-0x0000000000400000-0x0000000000419000-memory.dmp

memory/624-17-0x0000000000400000-0x0000000000419000-memory.dmp

memory/624-22-0x0000000031710000-0x0000000031729000-memory.dmp

memory/624-27-0x0000000031730000-0x0000000031749000-memory.dmp

memory/624-32-0x0000000031750000-0x0000000031769000-memory.dmp

memory/624-37-0x0000000031770000-0x0000000031789000-memory.dmp

memory/624-42-0x0000000031790000-0x00000000317A9000-memory.dmp

memory/624-47-0x00000000317B0000-0x00000000317C9000-memory.dmp

memory/624-52-0x00000000317D0000-0x00000000317E9000-memory.dmp

memory/624-57-0x00000000317F0000-0x0000000031809000-memory.dmp

memory/624-62-0x0000000031810000-0x0000000031829000-memory.dmp

memory/624-67-0x0000000031830000-0x0000000031849000-memory.dmp

memory/624-72-0x0000000031850000-0x0000000031869000-memory.dmp

memory/624-77-0x0000000031870000-0x0000000031889000-memory.dmp

memory/624-82-0x0000000031890000-0x00000000318A9000-memory.dmp

memory/624-87-0x00000000318B0000-0x00000000318C9000-memory.dmp

memory/624-92-0x00000000318D0000-0x00000000318E9000-memory.dmp

memory/624-97-0x00000000318F0000-0x0000000031909000-memory.dmp

memory/624-102-0x0000000031910000-0x0000000031929000-memory.dmp

memory/624-107-0x0000000031930000-0x0000000031949000-memory.dmp

memory/624-112-0x0000000031950000-0x0000000031969000-memory.dmp

memory/624-117-0x0000000031970000-0x0000000031989000-memory.dmp

memory/624-122-0x0000000031990000-0x00000000319A9000-memory.dmp

memory/624-127-0x00000000319B0000-0x00000000319C9000-memory.dmp

memory/624-132-0x00000000319D0000-0x00000000319E9000-memory.dmp

memory/624-137-0x00000000319F0000-0x0000000031A09000-memory.dmp

memory/624-142-0x0000000031A10000-0x0000000031A29000-memory.dmp

memory/624-147-0x0000000031A30000-0x0000000031A49000-memory.dmp

memory/624-152-0x0000000031A50000-0x0000000031A69000-memory.dmp

memory/624-157-0x0000000031A70000-0x0000000031A89000-memory.dmp

memory/624-162-0x0000000031A90000-0x0000000031AA9000-memory.dmp

memory/624-167-0x0000000031AB0000-0x0000000031AC9000-memory.dmp

memory/624-172-0x0000000031AD0000-0x0000000031AE9000-memory.dmp

memory/624-177-0x0000000031AF0000-0x0000000031B09000-memory.dmp

memory/624-182-0x0000000031B10000-0x0000000031B29000-memory.dmp

memory/624-187-0x0000000031B30000-0x0000000031B49000-memory.dmp

memory/624-192-0x0000000031B50000-0x0000000031B69000-memory.dmp

memory/624-197-0x0000000031B70000-0x0000000031B89000-memory.dmp

memory/624-202-0x0000000031B90000-0x0000000031BA9000-memory.dmp

memory/624-207-0x0000000031BB0000-0x0000000031BC9000-memory.dmp

memory/624-212-0x0000000031BD0000-0x0000000031BE9000-memory.dmp

memory/624-217-0x0000000031BF0000-0x0000000031C09000-memory.dmp

memory/624-222-0x0000000031C10000-0x0000000031C29000-memory.dmp

memory/624-227-0x0000000031C30000-0x0000000031C49000-memory.dmp

memory/624-232-0x0000000031C50000-0x0000000031C69000-memory.dmp

memory/624-237-0x0000000031C70000-0x0000000031C89000-memory.dmp

memory/624-242-0x0000000031C90000-0x0000000031CA9000-memory.dmp

memory/624-247-0x0000000031CB0000-0x0000000031CC9000-memory.dmp

memory/624-252-0x0000000031CD0000-0x0000000031CE9000-memory.dmp

memory/624-257-0x0000000031CF0000-0x0000000031D09000-memory.dmp

memory/624-262-0x0000000031D10000-0x0000000031D29000-memory.dmp

memory/624-267-0x0000000031D30000-0x0000000031D49000-memory.dmp

memory/624-272-0x0000000031D50000-0x0000000031D69000-memory.dmp

memory/624-277-0x0000000031D70000-0x0000000031D89000-memory.dmp

memory/624-282-0x0000000031D90000-0x0000000031DA9000-memory.dmp

memory/624-287-0x0000000031DB0000-0x0000000031DC9000-memory.dmp

memory/624-292-0x0000000031DD0000-0x0000000031DE9000-memory.dmp

memory/624-297-0x0000000031DF0000-0x0000000031E09000-memory.dmp

memory/380-3270-0x0000000000400000-0x0000000000419000-memory.dmp