Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 16:04

General

  • Target

    63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe

  • Size

    5.9MB

  • MD5

    63e535857097e933a48fdfc04ce81f78

  • SHA1

    80c3247545bb0d3c87af527c59262cdf8f1bc3bb

  • SHA256

    dbefa66da539a445a7c5efeb5dbff11d2f29279bd4020c89f809a663eea08b62

  • SHA512

    b62e1ea3da6c1e140d22dd7dcfb900f73b775a350802bdafa16c383a04cff5e6ec6649c37bbfd84f69a7caf73c2d4d1e9dd5106e4f613057a819f69ff63344ea

  • SSDEEP

    98304:demTLkNdfE0pZ3u56utgpPFotBER/mQ32lUv:E+b56utgpPF8u/7v

Malware Config

Extracted

Family

cobaltstrike

Botnet

0

C2

http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

Attributes
  • access_type

    512

  • beacon_type

    256

  • create_remote_thread

    768

  • crypto_scheme

    256

  • host

    ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

  • http_header1

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==

  • http_method1

    GET

  • http_method2

    POST

  • maxdns

    255

  • pipe_name

    \\%s\pipe\msagent_%x

  • polling_time

    5000

  • port_number

    443

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /N4215/adj/amzn.us.sr.aps

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko

  • watermark

    0

Signatures

  • Cobalt Strike reflective loader 21 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 63 IoCs
  • Executes dropped EXE 21 IoCs
  • Loads dropped DLL 21 IoCs
  • UPX packed file 61 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:108
    • C:\Windows\System\aNtnmJm.exe
      C:\Windows\System\aNtnmJm.exe
      2⤵
      • Executes dropped EXE
      PID:2416
    • C:\Windows\System\bmVNKnA.exe
      C:\Windows\System\bmVNKnA.exe
      2⤵
      • Executes dropped EXE
      PID:2916
    • C:\Windows\System\LFqyymK.exe
      C:\Windows\System\LFqyymK.exe
      2⤵
      • Executes dropped EXE
      PID:2812
    • C:\Windows\System\UfxnBTK.exe
      C:\Windows\System\UfxnBTK.exe
      2⤵
      • Executes dropped EXE
      PID:2672
    • C:\Windows\System\kFBqKUY.exe
      C:\Windows\System\kFBqKUY.exe
      2⤵
      • Executes dropped EXE
      PID:2728
    • C:\Windows\System\RNbGtZL.exe
      C:\Windows\System\RNbGtZL.exe
      2⤵
      • Executes dropped EXE
      PID:2712
    • C:\Windows\System\pAbYqBQ.exe
      C:\Windows\System\pAbYqBQ.exe
      2⤵
      • Executes dropped EXE
      PID:2508
    • C:\Windows\System\qXpahEz.exe
      C:\Windows\System\qXpahEz.exe
      2⤵
      • Executes dropped EXE
      PID:2696
    • C:\Windows\System\FxGvFUG.exe
      C:\Windows\System\FxGvFUG.exe
      2⤵
      • Executes dropped EXE
      PID:2540
    • C:\Windows\System\NOiRgOu.exe
      C:\Windows\System\NOiRgOu.exe
      2⤵
      • Executes dropped EXE
      PID:2892
    • C:\Windows\System\sJGYQwo.exe
      C:\Windows\System\sJGYQwo.exe
      2⤵
      • Executes dropped EXE
      PID:2164
    • C:\Windows\System\LEDnDgI.exe
      C:\Windows\System\LEDnDgI.exe
      2⤵
      • Executes dropped EXE
      PID:1628
    • C:\Windows\System\xtOFajp.exe
      C:\Windows\System\xtOFajp.exe
      2⤵
      • Executes dropped EXE
      PID:1696
    • C:\Windows\System\mYVyZIv.exe
      C:\Windows\System\mYVyZIv.exe
      2⤵
      • Executes dropped EXE
      PID:1232
    • C:\Windows\System\bCkapmv.exe
      C:\Windows\System\bCkapmv.exe
      2⤵
      • Executes dropped EXE
      PID:1384
    • C:\Windows\System\nmEawBK.exe
      C:\Windows\System\nmEawBK.exe
      2⤵
      • Executes dropped EXE
      PID:1580
    • C:\Windows\System\kFYNiLW.exe
      C:\Windows\System\kFYNiLW.exe
      2⤵
      • Executes dropped EXE
      PID:956
    • C:\Windows\System\mqBIPQw.exe
      C:\Windows\System\mqBIPQw.exe
      2⤵
      • Executes dropped EXE
      PID:1564
    • C:\Windows\System\bdNRTVW.exe
      C:\Windows\System\bdNRTVW.exe
      2⤵
      • Executes dropped EXE
      PID:2372
    • C:\Windows\System\xSuJJNh.exe
      C:\Windows\System\xSuJJNh.exe
      2⤵
      • Executes dropped EXE
      PID:1680
    • C:\Windows\System\ipqwFdc.exe
      C:\Windows\System\ipqwFdc.exe
      2⤵
      • Executes dropped EXE
      PID:2564

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\system\FxGvFUG.exe
    Filesize

    5.9MB

    MD5

    a1dab161d0d56244f266080625d0da35

    SHA1

    790cd26b5fbdf991de1b267ebedce10054204d7b

    SHA256

    48002dda7bc46eef867ff36627278c679b6547529bf6e166df3ade9378c0e517

    SHA512

    adc4e326c2746e1df8c750ec678c9fde12c4624b77a19ef03945bb8e2cc5eda644c9d018435ec6f02c60d53fb3de6d794f3b2e5db03c5997decbcc46a5db48ef

  • C:\Windows\system\LEDnDgI.exe
    Filesize

    5.9MB

    MD5

    996f14c106c07495abf4cb40c04db385

    SHA1

    a3141e4095d9b44679a9ec909d1c195fb88dab42

    SHA256

    b3652c2092025fea423d19c1946f317ab980cd86ca20ffd3407c77c0f81a2be2

    SHA512

    5883ef2825535997be57672f6a185d986ecbb218066aa25378cc621a8c699b867554d6c5b543839a2d39bad0428284ad327eb321c5c82183683c807369eef8e8

  • C:\Windows\system\LFqyymK.exe
    Filesize

    5.9MB

    MD5

    6010208b5124882601c8464162f48dad

    SHA1

    b8d354c59f30a81b34806b1163dffe2f8472d7a6

    SHA256

    e7ca054c15d401cffa7d899e74e586636089bc11244c316726a8863525447088

    SHA512

    ac3621b2ca9b478037dee874600fd28d776947d276d75f1ae917f713c67395433bb96741164d35b49993fc92d84e5373cf5da227a575fb735906dd880851439b

  • C:\Windows\system\RNbGtZL.exe
    Filesize

    5.9MB

    MD5

    6ef2fa07066f522fe4dada42b3d6f696

    SHA1

    abf477857955cfccb2c223e4f498941220cc4d68

    SHA256

    a252b9071e2a7f8ce7f8d7baf385283cb9f75bc86667a17bd10ed1b5b995ec12

    SHA512

    933106c8e8cdf238c8b3a794e68b4cda1861a6396161043ebafe39b4bf56e339ecfb7177390db4b5cae549a06f6bdf5e3bc3deabd863267d945a49f5e2168a8f

  • C:\Windows\system\UfxnBTK.exe
    Filesize

    5.9MB

    MD5

    0da65b7acc4d51d31e1a91193535ac33

    SHA1

    d59b6111d47e20729fda6b739ee747e2229e9c91

    SHA256

    4e7a31610ddee4cf4635b7ec727af55795ae2b755331454677b40289fa18607f

    SHA512

    4fcaad693e266d0f1bd3a0c2626078de512a5c376db46f5a6f83e2f31f5a5e9bd6968871443fde54cb7ae940c7491936126e8456d376ef89d4d1a2841080b3f9

  • C:\Windows\system\bCkapmv.exe
    Filesize

    5.9MB

    MD5

    1cdb301f25396aff2b906a221527cb9d

    SHA1

    be96814761ba1eb95865c38e02bfc4403b43e5d8

    SHA256

    845f68882543ae39bbe546689a44040b9929d458f78d71be8eb6959cc107c3b9

    SHA512

    f9491c5a08fee270e84c29f24ad915c447db5bb101bc20040a73b413e13b620222ad96a6efb901bc708852845a61b731ddaa7556b4c7bdb2cf6763d3b16084aa

  • C:\Windows\system\bdNRTVW.exe
    Filesize

    5.9MB

    MD5

    6ecd0782afff89f331a22a1f0b26bfc6

    SHA1

    0ff361a17ca685f65be21d81a9f263433ecb629c

    SHA256

    22f7f2076b6e48ddcdd911cd9b6e8493683dafbb50382c6717e3e22e62dfa06a

    SHA512

    a52c714ab4854613698471b4f1a5f93ca136d58f78902dd7635089906062e5221addf3d6b68720f501d606dace34ddd76bb0878739a3d875c08a4ab0738ead62

  • C:\Windows\system\bmVNKnA.exe
    Filesize

    5.9MB

    MD5

    95713f27ded216e420cbaaebfa755ee6

    SHA1

    a767a73def6402a4bcd2f17a49178883bd9155d9

    SHA256

    2e42041864011d1530661c0fd6ede50201cd56fe27b23f27f82f55db5a1268f9

    SHA512

    c1c07e1467dec56488df76851302ac1a4e36849892ae76bc93943884289cc32b318986f47bfba6089c0e86464fb8900a88e94141f12dca24277859039aad7a7f

  • C:\Windows\system\kFBqKUY.exe
    Filesize

    5.9MB

    MD5

    895afc7be1f67771677962c4d3b6a6ff

    SHA1

    a37fb505d68e42d9e5fae37bd0680d97a4d13d27

    SHA256

    5949c62e616c7a0c4d5060ed7537f17a05242cf9844a8d13ec6a356e7d3f074f

    SHA512

    f088d55fe822179f7317fd87ee799525dafaaf9fccff8e758c6bc98063c204afc4934da6bb791669d3d0d9f3003fa3d67e73e69d8b3b42a5ffb8593e0935888f

  • C:\Windows\system\kFYNiLW.exe
    Filesize

    5.9MB

    MD5

    d4589cf3d64cb54bafe0f9e9cd3dd482

    SHA1

    a9f0b3515ef41a3c1c6e658a325d81c0b062bff8

    SHA256

    950e8b1203a9823ff2e30328a434d8abaf879703554b60af15ca67e5a2896d78

    SHA512

    32a7de994545961b96bdbb45899f1d9c56003580118d0006a3fce0a8f51ca03f210ccea328528ca75f13858a312aea158317e885685abfd0257a56e701afdcd0

  • C:\Windows\system\mYVyZIv.exe
    Filesize

    5.9MB

    MD5

    2de81a6890890c35aec68dbfe1af788f

    SHA1

    62e5828a867948ae136c52194b76be4c9adbcfe7

    SHA256

    e328199b9f9e64b99d16e2f7a69fe18efb243a73f583ca758b5f4ff37ecf9192

    SHA512

    b2ae4ed0984dd1f6833c7422e11008bd749a4a40c617c19f69d7b12fafdd470c871a308b035447e4a897baa6104086564280c980a5d957418d64f4049bf501e3

  • C:\Windows\system\mqBIPQw.exe
    Filesize

    5.9MB

    MD5

    e1394c14deba1c8ebcbd166a274a7d7d

    SHA1

    57bef2b1de7ebfe93218347c4073b03774be03ea

    SHA256

    5c08b377e2f1ce18d290200f1efa42c9c8b7a2ddbd14cf3572393e930e5661f4

    SHA512

    77788d785a5dce170660dd689cbbf3e5952e4f411d639ae5efb0d8140410b763590f72529706434e5f94668061b3d44721e1208945dccbecc495297cfe17b86d

  • C:\Windows\system\nmEawBK.exe
    Filesize

    5.9MB

    MD5

    15b3ba64de1998dcafef3e1dd335ba83

    SHA1

    130bbb527f3d0ac691b3c58fb8abc1fb4bea0e45

    SHA256

    92914bbcc345b3115e3a23337513c1333fe3ba5f507f9c0a935c038900091c61

    SHA512

    0251727c3b7227c3154598b76820185eed5e5b3108cb26d3b7626128c8d2d8a8cdc8746c0c5baf2fc3ef58b41bb03a6d4751d463c6b903e586d8549f8da0f1b0

  • C:\Windows\system\pAbYqBQ.exe
    Filesize

    5.9MB

    MD5

    256dd66ca4159104fb44a08dda29d07c

    SHA1

    34c909739a76b2dbd33a72e576566094e6c2e156

    SHA256

    9bb0c70fa8bb0a6613106c47b2edd03527d67c0020665743b78e350578281b4f

    SHA512

    54d04abd40f28e6b3bdcd585554c598617d474dd4761a5bcac8a88feefddbfb4a3b2d3bf14eeea7b86cb7c6c1ee4307907c2d04cd1d285101c9baa7def216154

  • C:\Windows\system\xSuJJNh.exe
    Filesize

    5.9MB

    MD5

    bea5e21edb102153ed721715f22a3aee

    SHA1

    991fb4217c367809720d8cf7b3b6c0a1648642cf

    SHA256

    242947182c6e1cde4d1f094bdfa0757787786f7b8ee5a8c16c943dd0533ac0f3

    SHA512

    ab09e71cc32ad4c8dda7b21d219c31616b95cd94433e0f873d0ea1b70590ce3a491a7f9a972cb276d391fff7372ef3618926034db08f8c6e0582d929a22217b4

  • C:\Windows\system\xtOFajp.exe
    Filesize

    5.9MB

    MD5

    421117565b977096741bdd1aad07c76c

    SHA1

    02317fd4c5c9d22e5ecb731f488ce44c08a8bcbb

    SHA256

    6100b66968f0a7d58be097f251e5528a12af6b3b63d79538330f1d1679a39630

    SHA512

    3a2940461974ae369d65eeeb01d8f49c7bef105d3d6314e556036bf71944c586c26d07a5494a0c83094b8064ac8a2e54a35d0702d286f8794c68679e26150025

  • \Windows\system\NOiRgOu.exe
    Filesize

    5.9MB

    MD5

    23b68acc0babfca9c04c36aebe4f1c59

    SHA1

    d1570837473446ceee54e428a1cccb29aabeadde

    SHA256

    0b57c3a7cc259b32d862f8cabf1c3429c060533f169df4c109c69c2df33df5d2

    SHA512

    db09c35541d16e43d69f636d30363fe9b15c13d59e552613f6ee340aa0550f5bd6c7688c27f9373319b2162452be3744268d842fcb7a879ddf1b66421f803634

  • \Windows\system\aNtnmJm.exe
    Filesize

    5.9MB

    MD5

    b304fa9149d7523e4a3732a5e55fe846

    SHA1

    b9cc31a1707989e5ed574e9fe44d611a5c9b66f3

    SHA256

    a9c3cb08169016c6366913a1a21627221b4ccab4ea156e21fee9941194103885

    SHA512

    17a5b5adb6bff1caa7fe7109d250f150ba963d730833880e7d2da3e3850be3283a462c4553fdedce84651cb0c94030bf9c010e447c9e6fc21d577a41d6483abd

  • \Windows\system\ipqwFdc.exe
    Filesize

    5.9MB

    MD5

    df0fe6606668c91262d04e27f31f0c93

    SHA1

    eaa8cc7bcf875a0d2ef2e4c2c6fc14ba403d6af5

    SHA256

    16de4fa916572b8c7333e8c130056da76db3cc31158ae3c92ae4fb473826ffe2

    SHA512

    97051dc9c6e8b2f15bcbac91d966891d2505e03f322f4a32ed4e18208357077b3cc02ea728d481fb06a232afc8dbb7406cc7cbf93c7073b7804b8be59bad5048

  • \Windows\system\qXpahEz.exe
    Filesize

    5.9MB

    MD5

    c3a7c514fbea98564dbaa754b954c735

    SHA1

    f11213fadb4ed0889d7d2e9c819b52516eabe230

    SHA256

    827b68fbcd0ebae9ace49827401be6408d132ba656f92671368cfd4e80b5e695

    SHA512

    e44cfcc456a2794ec782e15ec347d40322e7c0b099c7aec8eaf7e61ac86e163a9e4750f09e2f27674a7f69ede1baae47b000ec8a982b8a74f401c0ff7f8ca231

  • \Windows\system\sJGYQwo.exe
    Filesize

    5.9MB

    MD5

    f60669ab9cb85d82f6fbc65b6c4b632d

    SHA1

    b9f8578a361b27619fb7d053f9f4c5b5c52e4b19

    SHA256

    7a8752ce3669a5ee7d92ee1ecd5f5c3fc45c50eab89d57853c2f2b01230f5156

    SHA512

    d5f62daf2fd0e7ee55cdbe11df5e22f49c174470117ca268cae156dc9d62c2320f7f848aa1d735b6c94228679757ab433aa3370460a7be90aef75e716a3f294e

  • memory/108-142-0x000000013F180000-0x000000013F4D4000-memory.dmp
    Filesize

    3.3MB

  • memory/108-139-0x000000013F4D0000-0x000000013F824000-memory.dmp
    Filesize

    3.3MB

  • memory/108-1-0x00000000000F0000-0x0000000000100000-memory.dmp
    Filesize

    64KB

  • memory/108-48-0x0000000002470000-0x00000000027C4000-memory.dmp
    Filesize

    3.3MB

  • memory/108-99-0x000000013F110000-0x000000013F464000-memory.dmp
    Filesize

    3.3MB

  • memory/108-53-0x000000013FC50000-0x000000013FFA4000-memory.dmp
    Filesize

    3.3MB

  • memory/108-33-0x000000013F080000-0x000000013F3D4000-memory.dmp
    Filesize

    3.3MB

  • memory/108-84-0x000000013F5F0000-0x000000013F944000-memory.dmp
    Filesize

    3.3MB

  • memory/108-66-0x000000013F4D0000-0x000000013F824000-memory.dmp
    Filesize

    3.3MB

  • memory/108-26-0x000000013F850000-0x000000013FBA4000-memory.dmp
    Filesize

    3.3MB

  • memory/108-20-0x000000013F2D0000-0x000000013F624000-memory.dmp
    Filesize

    3.3MB

  • memory/108-71-0x000000013F180000-0x000000013F4D4000-memory.dmp
    Filesize

    3.3MB

  • memory/108-138-0x000000013F560000-0x000000013F8B4000-memory.dmp
    Filesize

    3.3MB

  • memory/108-40-0x000000013F680000-0x000000013F9D4000-memory.dmp
    Filesize

    3.3MB

  • memory/108-13-0x000000013F220000-0x000000013F574000-memory.dmp
    Filesize

    3.3MB

  • memory/108-61-0x000000013F220000-0x000000013F574000-memory.dmp
    Filesize

    3.3MB

  • memory/108-62-0x000000013F560000-0x000000013F8B4000-memory.dmp
    Filesize

    3.3MB

  • memory/108-144-0x000000013F5F0000-0x000000013F944000-memory.dmp
    Filesize

    3.3MB

  • memory/108-0-0x000000013FC50000-0x000000013FFA4000-memory.dmp
    Filesize

    3.3MB

  • memory/1232-100-0x000000013F110000-0x000000013F464000-memory.dmp
    Filesize

    3.3MB

  • memory/1232-147-0x000000013F110000-0x000000013F464000-memory.dmp
    Filesize

    3.3MB

  • memory/1232-160-0x000000013F110000-0x000000013F464000-memory.dmp
    Filesize

    3.3MB

  • memory/1628-157-0x000000013F5F0000-0x000000013F944000-memory.dmp
    Filesize

    3.3MB

  • memory/1628-85-0x000000013F5F0000-0x000000013F944000-memory.dmp
    Filesize

    3.3MB

  • memory/1696-93-0x000000013F370000-0x000000013F6C4000-memory.dmp
    Filesize

    3.3MB

  • memory/1696-146-0x000000013F370000-0x000000013F6C4000-memory.dmp
    Filesize

    3.3MB

  • memory/1696-159-0x000000013F370000-0x000000013F6C4000-memory.dmp
    Filesize

    3.3MB

  • memory/2164-145-0x000000013F180000-0x000000013F4D4000-memory.dmp
    Filesize

    3.3MB

  • memory/2164-88-0x000000013F180000-0x000000013F4D4000-memory.dmp
    Filesize

    3.3MB

  • memory/2164-158-0x000000013F180000-0x000000013F4D4000-memory.dmp
    Filesize

    3.3MB

  • memory/2416-148-0x000000013F0F0000-0x000000013F444000-memory.dmp
    Filesize

    3.3MB

  • memory/2416-54-0x000000013F0F0000-0x000000013F444000-memory.dmp
    Filesize

    3.3MB

  • memory/2416-11-0x000000013F0F0000-0x000000013F444000-memory.dmp
    Filesize

    3.3MB

  • memory/2508-107-0x000000013FA90000-0x000000013FDE4000-memory.dmp
    Filesize

    3.3MB

  • memory/2508-161-0x000000013FA90000-0x000000013FDE4000-memory.dmp
    Filesize

    3.3MB

  • memory/2508-60-0x000000013FA90000-0x000000013FDE4000-memory.dmp
    Filesize

    3.3MB

  • memory/2540-156-0x000000013F560000-0x000000013F8B4000-memory.dmp
    Filesize

    3.3MB

  • memory/2540-143-0x000000013F560000-0x000000013F8B4000-memory.dmp
    Filesize

    3.3MB

  • memory/2540-76-0x000000013F560000-0x000000013F8B4000-memory.dmp
    Filesize

    3.3MB

  • memory/2672-29-0x000000013F850000-0x000000013FBA4000-memory.dmp
    Filesize

    3.3MB

  • memory/2672-151-0x000000013F850000-0x000000013FBA4000-memory.dmp
    Filesize

    3.3MB

  • memory/2696-56-0x000000013FA90000-0x000000013FDE4000-memory.dmp
    Filesize

    3.3MB

  • memory/2696-154-0x000000013FA90000-0x000000013FDE4000-memory.dmp
    Filesize

    3.3MB

  • memory/2712-41-0x000000013F680000-0x000000013F9D4000-memory.dmp
    Filesize

    3.3MB

  • memory/2712-83-0x000000013F680000-0x000000013F9D4000-memory.dmp
    Filesize

    3.3MB

  • memory/2712-153-0x000000013F680000-0x000000013F9D4000-memory.dmp
    Filesize

    3.3MB

  • memory/2728-75-0x000000013F080000-0x000000013F3D4000-memory.dmp
    Filesize

    3.3MB

  • memory/2728-152-0x000000013F080000-0x000000013F3D4000-memory.dmp
    Filesize

    3.3MB

  • memory/2728-35-0x000000013F080000-0x000000013F3D4000-memory.dmp
    Filesize

    3.3MB

  • memory/2812-150-0x000000013F2D0000-0x000000013F624000-memory.dmp
    Filesize

    3.3MB

  • memory/2812-65-0x000000013F2D0000-0x000000013F624000-memory.dmp
    Filesize

    3.3MB

  • memory/2812-21-0x000000013F2D0000-0x000000013F624000-memory.dmp
    Filesize

    3.3MB

  • memory/2892-155-0x000000013F4D0000-0x000000013F824000-memory.dmp
    Filesize

    3.3MB

  • memory/2892-69-0x000000013F4D0000-0x000000013F824000-memory.dmp
    Filesize

    3.3MB

  • memory/2892-140-0x000000013F4D0000-0x000000013F824000-memory.dmp
    Filesize

    3.3MB

  • memory/2916-149-0x000000013F220000-0x000000013F574000-memory.dmp
    Filesize

    3.3MB

  • memory/2916-15-0x000000013F220000-0x000000013F574000-memory.dmp
    Filesize

    3.3MB