Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:04
Behavioral task
behavioral1
Sample
63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe
-
Size
5.9MB
-
MD5
63e535857097e933a48fdfc04ce81f78
-
SHA1
80c3247545bb0d3c87af527c59262cdf8f1bc3bb
-
SHA256
dbefa66da539a445a7c5efeb5dbff11d2f29279bd4020c89f809a663eea08b62
-
SHA512
b62e1ea3da6c1e140d22dd7dcfb900f73b775a350802bdafa16c383a04cff5e6ec6649c37bbfd84f69a7caf73c2d4d1e9dd5106e4f613057a819f69ff63344ea
-
SSDEEP
98304:demTLkNdfE0pZ3u56utgpPFotBER/mQ32lUv:E+b56utgpPF8u/7v
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule \Windows\system\aNtnmJm.exe cobalt_reflective_dll C:\Windows\system\bmVNKnA.exe cobalt_reflective_dll C:\Windows\system\LFqyymK.exe cobalt_reflective_dll C:\Windows\system\UfxnBTK.exe cobalt_reflective_dll C:\Windows\system\RNbGtZL.exe cobalt_reflective_dll C:\Windows\system\kFBqKUY.exe cobalt_reflective_dll \Windows\system\qXpahEz.exe cobalt_reflective_dll C:\Windows\system\pAbYqBQ.exe cobalt_reflective_dll \Windows\system\NOiRgOu.exe cobalt_reflective_dll C:\Windows\system\LEDnDgI.exe cobalt_reflective_dll C:\Windows\system\bCkapmv.exe cobalt_reflective_dll C:\Windows\system\bdNRTVW.exe cobalt_reflective_dll \Windows\system\ipqwFdc.exe cobalt_reflective_dll C:\Windows\system\xSuJJNh.exe cobalt_reflective_dll C:\Windows\system\mqBIPQw.exe cobalt_reflective_dll C:\Windows\system\kFYNiLW.exe cobalt_reflective_dll C:\Windows\system\nmEawBK.exe cobalt_reflective_dll C:\Windows\system\mYVyZIv.exe cobalt_reflective_dll C:\Windows\system\xtOFajp.exe cobalt_reflective_dll C:\Windows\system\FxGvFUG.exe cobalt_reflective_dll \Windows\system\sJGYQwo.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 63 IoCs
Processes:
resource yara_rule behavioral1/memory/108-0-0x000000013FC50000-0x000000013FFA4000-memory.dmp xmrig \Windows\system\aNtnmJm.exe xmrig C:\Windows\system\bmVNKnA.exe xmrig behavioral1/memory/2916-15-0x000000013F220000-0x000000013F574000-memory.dmp xmrig behavioral1/memory/2416-11-0x000000013F0F0000-0x000000013F444000-memory.dmp xmrig C:\Windows\system\LFqyymK.exe xmrig behavioral1/memory/2812-21-0x000000013F2D0000-0x000000013F624000-memory.dmp xmrig C:\Windows\system\UfxnBTK.exe xmrig behavioral1/memory/2672-29-0x000000013F850000-0x000000013FBA4000-memory.dmp xmrig C:\Windows\system\RNbGtZL.exe xmrig behavioral1/memory/2728-35-0x000000013F080000-0x000000013F3D4000-memory.dmp xmrig C:\Windows\system\kFBqKUY.exe xmrig \Windows\system\qXpahEz.exe xmrig behavioral1/memory/108-53-0x000000013FC50000-0x000000013FFA4000-memory.dmp xmrig C:\Windows\system\pAbYqBQ.exe xmrig behavioral1/memory/2696-56-0x000000013FA90000-0x000000013FDE4000-memory.dmp xmrig \Windows\system\NOiRgOu.exe xmrig behavioral1/memory/2812-65-0x000000013F2D0000-0x000000013F624000-memory.dmp xmrig C:\Windows\system\LEDnDgI.exe xmrig behavioral1/memory/2540-76-0x000000013F560000-0x000000013F8B4000-memory.dmp xmrig C:\Windows\system\bCkapmv.exe xmrig C:\Windows\system\bdNRTVW.exe xmrig \Windows\system\ipqwFdc.exe xmrig C:\Windows\system\xSuJJNh.exe xmrig C:\Windows\system\mqBIPQw.exe xmrig C:\Windows\system\kFYNiLW.exe xmrig C:\Windows\system\nmEawBK.exe xmrig behavioral1/memory/108-138-0x000000013F560000-0x000000013F8B4000-memory.dmp xmrig behavioral1/memory/2508-107-0x000000013FA90000-0x000000013FDE4000-memory.dmp xmrig behavioral1/memory/1232-100-0x000000013F110000-0x000000013F464000-memory.dmp xmrig C:\Windows\system\mYVyZIv.exe xmrig behavioral1/memory/1696-93-0x000000013F370000-0x000000013F6C4000-memory.dmp xmrig C:\Windows\system\xtOFajp.exe xmrig behavioral1/memory/2728-75-0x000000013F080000-0x000000013F3D4000-memory.dmp xmrig C:\Windows\system\FxGvFUG.exe xmrig \Windows\system\sJGYQwo.exe xmrig behavioral1/memory/108-62-0x000000013F560000-0x000000013F8B4000-memory.dmp xmrig behavioral1/memory/2508-60-0x000000013FA90000-0x000000013FDE4000-memory.dmp xmrig behavioral1/memory/2164-88-0x000000013F180000-0x000000013F4D4000-memory.dmp xmrig behavioral1/memory/1628-85-0x000000013F5F0000-0x000000013F944000-memory.dmp xmrig behavioral1/memory/2712-83-0x000000013F680000-0x000000013F9D4000-memory.dmp xmrig behavioral1/memory/2892-69-0x000000013F4D0000-0x000000013F824000-memory.dmp xmrig behavioral1/memory/2416-54-0x000000013F0F0000-0x000000013F444000-memory.dmp xmrig behavioral1/memory/2712-41-0x000000013F680000-0x000000013F9D4000-memory.dmp xmrig behavioral1/memory/2892-140-0x000000013F4D0000-0x000000013F824000-memory.dmp xmrig behavioral1/memory/2540-143-0x000000013F560000-0x000000013F8B4000-memory.dmp xmrig behavioral1/memory/2164-145-0x000000013F180000-0x000000013F4D4000-memory.dmp xmrig behavioral1/memory/1696-146-0x000000013F370000-0x000000013F6C4000-memory.dmp xmrig behavioral1/memory/1232-147-0x000000013F110000-0x000000013F464000-memory.dmp xmrig behavioral1/memory/2416-148-0x000000013F0F0000-0x000000013F444000-memory.dmp xmrig behavioral1/memory/2916-149-0x000000013F220000-0x000000013F574000-memory.dmp xmrig behavioral1/memory/2812-150-0x000000013F2D0000-0x000000013F624000-memory.dmp xmrig behavioral1/memory/2672-151-0x000000013F850000-0x000000013FBA4000-memory.dmp xmrig behavioral1/memory/2728-152-0x000000013F080000-0x000000013F3D4000-memory.dmp xmrig behavioral1/memory/2712-153-0x000000013F680000-0x000000013F9D4000-memory.dmp xmrig behavioral1/memory/2696-154-0x000000013FA90000-0x000000013FDE4000-memory.dmp xmrig behavioral1/memory/2892-155-0x000000013F4D0000-0x000000013F824000-memory.dmp xmrig behavioral1/memory/1628-157-0x000000013F5F0000-0x000000013F944000-memory.dmp xmrig behavioral1/memory/2540-156-0x000000013F560000-0x000000013F8B4000-memory.dmp xmrig behavioral1/memory/2164-158-0x000000013F180000-0x000000013F4D4000-memory.dmp xmrig behavioral1/memory/1696-159-0x000000013F370000-0x000000013F6C4000-memory.dmp xmrig behavioral1/memory/1232-160-0x000000013F110000-0x000000013F464000-memory.dmp xmrig behavioral1/memory/2508-161-0x000000013FA90000-0x000000013FDE4000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
aNtnmJm.exebmVNKnA.exeLFqyymK.exeUfxnBTK.exekFBqKUY.exeRNbGtZL.exeqXpahEz.exepAbYqBQ.exeNOiRgOu.exeFxGvFUG.exeLEDnDgI.exesJGYQwo.exextOFajp.exemYVyZIv.exebCkapmv.exenmEawBK.exekFYNiLW.exemqBIPQw.exebdNRTVW.exexSuJJNh.exeipqwFdc.exepid process 2416 aNtnmJm.exe 2916 bmVNKnA.exe 2812 LFqyymK.exe 2672 UfxnBTK.exe 2728 kFBqKUY.exe 2712 RNbGtZL.exe 2696 qXpahEz.exe 2508 pAbYqBQ.exe 2892 NOiRgOu.exe 2540 FxGvFUG.exe 1628 LEDnDgI.exe 2164 sJGYQwo.exe 1696 xtOFajp.exe 1232 mYVyZIv.exe 1384 bCkapmv.exe 1580 nmEawBK.exe 956 kFYNiLW.exe 1564 mqBIPQw.exe 2372 bdNRTVW.exe 1680 xSuJJNh.exe 2564 ipqwFdc.exe -
Loads dropped DLL 21 IoCs
Processes:
63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exepid process 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe -
Processes:
resource yara_rule behavioral1/memory/108-0-0x000000013FC50000-0x000000013FFA4000-memory.dmp upx \Windows\system\aNtnmJm.exe upx C:\Windows\system\bmVNKnA.exe upx behavioral1/memory/2916-15-0x000000013F220000-0x000000013F574000-memory.dmp upx behavioral1/memory/2416-11-0x000000013F0F0000-0x000000013F444000-memory.dmp upx C:\Windows\system\LFqyymK.exe upx behavioral1/memory/2812-21-0x000000013F2D0000-0x000000013F624000-memory.dmp upx C:\Windows\system\UfxnBTK.exe upx behavioral1/memory/2672-29-0x000000013F850000-0x000000013FBA4000-memory.dmp upx C:\Windows\system\RNbGtZL.exe upx behavioral1/memory/2728-35-0x000000013F080000-0x000000013F3D4000-memory.dmp upx C:\Windows\system\kFBqKUY.exe upx \Windows\system\qXpahEz.exe upx behavioral1/memory/108-53-0x000000013FC50000-0x000000013FFA4000-memory.dmp upx C:\Windows\system\pAbYqBQ.exe upx behavioral1/memory/2696-56-0x000000013FA90000-0x000000013FDE4000-memory.dmp upx \Windows\system\NOiRgOu.exe upx behavioral1/memory/2812-65-0x000000013F2D0000-0x000000013F624000-memory.dmp upx C:\Windows\system\LEDnDgI.exe upx behavioral1/memory/2540-76-0x000000013F560000-0x000000013F8B4000-memory.dmp upx C:\Windows\system\bCkapmv.exe upx C:\Windows\system\bdNRTVW.exe upx \Windows\system\ipqwFdc.exe upx C:\Windows\system\xSuJJNh.exe upx C:\Windows\system\mqBIPQw.exe upx C:\Windows\system\kFYNiLW.exe upx C:\Windows\system\nmEawBK.exe upx behavioral1/memory/2508-107-0x000000013FA90000-0x000000013FDE4000-memory.dmp upx behavioral1/memory/1232-100-0x000000013F110000-0x000000013F464000-memory.dmp upx C:\Windows\system\mYVyZIv.exe upx behavioral1/memory/1696-93-0x000000013F370000-0x000000013F6C4000-memory.dmp upx C:\Windows\system\xtOFajp.exe upx behavioral1/memory/2728-75-0x000000013F080000-0x000000013F3D4000-memory.dmp upx C:\Windows\system\FxGvFUG.exe upx \Windows\system\sJGYQwo.exe upx behavioral1/memory/2508-60-0x000000013FA90000-0x000000013FDE4000-memory.dmp upx behavioral1/memory/2164-88-0x000000013F180000-0x000000013F4D4000-memory.dmp upx behavioral1/memory/1628-85-0x000000013F5F0000-0x000000013F944000-memory.dmp upx behavioral1/memory/2712-83-0x000000013F680000-0x000000013F9D4000-memory.dmp upx behavioral1/memory/2892-69-0x000000013F4D0000-0x000000013F824000-memory.dmp upx behavioral1/memory/2416-54-0x000000013F0F0000-0x000000013F444000-memory.dmp upx behavioral1/memory/2712-41-0x000000013F680000-0x000000013F9D4000-memory.dmp upx behavioral1/memory/2892-140-0x000000013F4D0000-0x000000013F824000-memory.dmp upx behavioral1/memory/2540-143-0x000000013F560000-0x000000013F8B4000-memory.dmp upx behavioral1/memory/2164-145-0x000000013F180000-0x000000013F4D4000-memory.dmp upx behavioral1/memory/1696-146-0x000000013F370000-0x000000013F6C4000-memory.dmp upx behavioral1/memory/1232-147-0x000000013F110000-0x000000013F464000-memory.dmp upx behavioral1/memory/2416-148-0x000000013F0F0000-0x000000013F444000-memory.dmp upx behavioral1/memory/2916-149-0x000000013F220000-0x000000013F574000-memory.dmp upx behavioral1/memory/2812-150-0x000000013F2D0000-0x000000013F624000-memory.dmp upx behavioral1/memory/2672-151-0x000000013F850000-0x000000013FBA4000-memory.dmp upx behavioral1/memory/2728-152-0x000000013F080000-0x000000013F3D4000-memory.dmp upx behavioral1/memory/2712-153-0x000000013F680000-0x000000013F9D4000-memory.dmp upx behavioral1/memory/2696-154-0x000000013FA90000-0x000000013FDE4000-memory.dmp upx behavioral1/memory/2892-155-0x000000013F4D0000-0x000000013F824000-memory.dmp upx behavioral1/memory/1628-157-0x000000013F5F0000-0x000000013F944000-memory.dmp upx behavioral1/memory/2540-156-0x000000013F560000-0x000000013F8B4000-memory.dmp upx behavioral1/memory/2164-158-0x000000013F180000-0x000000013F4D4000-memory.dmp upx behavioral1/memory/1696-159-0x000000013F370000-0x000000013F6C4000-memory.dmp upx behavioral1/memory/1232-160-0x000000013F110000-0x000000013F464000-memory.dmp upx behavioral1/memory/2508-161-0x000000013FA90000-0x000000013FDE4000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exedescription ioc process File created C:\Windows\System\bCkapmv.exe 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe File created C:\Windows\System\kFYNiLW.exe 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe File created C:\Windows\System\bdNRTVW.exe 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe File created C:\Windows\System\ipqwFdc.exe 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe File created C:\Windows\System\bmVNKnA.exe 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe File created C:\Windows\System\kFBqKUY.exe 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe File created C:\Windows\System\FxGvFUG.exe 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe File created C:\Windows\System\NOiRgOu.exe 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe File created C:\Windows\System\xSuJJNh.exe 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe File created C:\Windows\System\LFqyymK.exe 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe File created C:\Windows\System\UfxnBTK.exe 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe File created C:\Windows\System\qXpahEz.exe 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe File created C:\Windows\System\xtOFajp.exe 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe File created C:\Windows\System\nmEawBK.exe 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe File created C:\Windows\System\mqBIPQw.exe 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe File created C:\Windows\System\aNtnmJm.exe 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe File created C:\Windows\System\RNbGtZL.exe 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe File created C:\Windows\System\pAbYqBQ.exe 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe File created C:\Windows\System\sJGYQwo.exe 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe File created C:\Windows\System\LEDnDgI.exe 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe File created C:\Windows\System\mYVyZIv.exe 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exedescription pid process Token: SeLockMemoryPrivilege 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe Token: SeLockMemoryPrivilege 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exedescription pid process target process PID 108 wrote to memory of 2416 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe aNtnmJm.exe PID 108 wrote to memory of 2416 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe aNtnmJm.exe PID 108 wrote to memory of 2416 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe aNtnmJm.exe PID 108 wrote to memory of 2916 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe bmVNKnA.exe PID 108 wrote to memory of 2916 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe bmVNKnA.exe PID 108 wrote to memory of 2916 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe bmVNKnA.exe PID 108 wrote to memory of 2812 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe LFqyymK.exe PID 108 wrote to memory of 2812 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe LFqyymK.exe PID 108 wrote to memory of 2812 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe LFqyymK.exe PID 108 wrote to memory of 2672 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe UfxnBTK.exe PID 108 wrote to memory of 2672 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe UfxnBTK.exe PID 108 wrote to memory of 2672 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe UfxnBTK.exe PID 108 wrote to memory of 2728 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe kFBqKUY.exe PID 108 wrote to memory of 2728 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe kFBqKUY.exe PID 108 wrote to memory of 2728 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe kFBqKUY.exe PID 108 wrote to memory of 2712 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe RNbGtZL.exe PID 108 wrote to memory of 2712 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe RNbGtZL.exe PID 108 wrote to memory of 2712 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe RNbGtZL.exe PID 108 wrote to memory of 2508 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe pAbYqBQ.exe PID 108 wrote to memory of 2508 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe pAbYqBQ.exe PID 108 wrote to memory of 2508 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe pAbYqBQ.exe PID 108 wrote to memory of 2696 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe qXpahEz.exe PID 108 wrote to memory of 2696 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe qXpahEz.exe PID 108 wrote to memory of 2696 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe qXpahEz.exe PID 108 wrote to memory of 2540 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe FxGvFUG.exe PID 108 wrote to memory of 2540 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe FxGvFUG.exe PID 108 wrote to memory of 2540 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe FxGvFUG.exe PID 108 wrote to memory of 2892 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe NOiRgOu.exe PID 108 wrote to memory of 2892 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe NOiRgOu.exe PID 108 wrote to memory of 2892 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe NOiRgOu.exe PID 108 wrote to memory of 2164 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe sJGYQwo.exe PID 108 wrote to memory of 2164 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe sJGYQwo.exe PID 108 wrote to memory of 2164 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe sJGYQwo.exe PID 108 wrote to memory of 1628 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe LEDnDgI.exe PID 108 wrote to memory of 1628 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe LEDnDgI.exe PID 108 wrote to memory of 1628 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe LEDnDgI.exe PID 108 wrote to memory of 1696 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe xtOFajp.exe PID 108 wrote to memory of 1696 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe xtOFajp.exe PID 108 wrote to memory of 1696 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe xtOFajp.exe PID 108 wrote to memory of 1232 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe mYVyZIv.exe PID 108 wrote to memory of 1232 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe mYVyZIv.exe PID 108 wrote to memory of 1232 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe mYVyZIv.exe PID 108 wrote to memory of 1384 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe bCkapmv.exe PID 108 wrote to memory of 1384 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe bCkapmv.exe PID 108 wrote to memory of 1384 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe bCkapmv.exe PID 108 wrote to memory of 1580 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe nmEawBK.exe PID 108 wrote to memory of 1580 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe nmEawBK.exe PID 108 wrote to memory of 1580 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe nmEawBK.exe PID 108 wrote to memory of 956 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe kFYNiLW.exe PID 108 wrote to memory of 956 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe kFYNiLW.exe PID 108 wrote to memory of 956 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe kFYNiLW.exe PID 108 wrote to memory of 1564 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe mqBIPQw.exe PID 108 wrote to memory of 1564 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe mqBIPQw.exe PID 108 wrote to memory of 1564 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe mqBIPQw.exe PID 108 wrote to memory of 2372 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe bdNRTVW.exe PID 108 wrote to memory of 2372 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe bdNRTVW.exe PID 108 wrote to memory of 2372 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe bdNRTVW.exe PID 108 wrote to memory of 1680 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe xSuJJNh.exe PID 108 wrote to memory of 1680 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe xSuJJNh.exe PID 108 wrote to memory of 1680 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe xSuJJNh.exe PID 108 wrote to memory of 2564 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe ipqwFdc.exe PID 108 wrote to memory of 2564 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe ipqwFdc.exe PID 108 wrote to memory of 2564 108 63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe ipqwFdc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\63e535857097e933a48fdfc04ce81f78_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\aNtnmJm.exeC:\Windows\System\aNtnmJm.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\bmVNKnA.exeC:\Windows\System\bmVNKnA.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\LFqyymK.exeC:\Windows\System\LFqyymK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\UfxnBTK.exeC:\Windows\System\UfxnBTK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\kFBqKUY.exeC:\Windows\System\kFBqKUY.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\RNbGtZL.exeC:\Windows\System\RNbGtZL.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\pAbYqBQ.exeC:\Windows\System\pAbYqBQ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\qXpahEz.exeC:\Windows\System\qXpahEz.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\FxGvFUG.exeC:\Windows\System\FxGvFUG.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\NOiRgOu.exeC:\Windows\System\NOiRgOu.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\sJGYQwo.exeC:\Windows\System\sJGYQwo.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\LEDnDgI.exeC:\Windows\System\LEDnDgI.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\xtOFajp.exeC:\Windows\System\xtOFajp.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\mYVyZIv.exeC:\Windows\System\mYVyZIv.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\bCkapmv.exeC:\Windows\System\bCkapmv.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\nmEawBK.exeC:\Windows\System\nmEawBK.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\kFYNiLW.exeC:\Windows\System\kFYNiLW.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\mqBIPQw.exeC:\Windows\System\mqBIPQw.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\bdNRTVW.exeC:\Windows\System\bdNRTVW.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\xSuJJNh.exeC:\Windows\System\xSuJJNh.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ipqwFdc.exeC:\Windows\System\ipqwFdc.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\FxGvFUG.exeFilesize
5.9MB
MD5a1dab161d0d56244f266080625d0da35
SHA1790cd26b5fbdf991de1b267ebedce10054204d7b
SHA25648002dda7bc46eef867ff36627278c679b6547529bf6e166df3ade9378c0e517
SHA512adc4e326c2746e1df8c750ec678c9fde12c4624b77a19ef03945bb8e2cc5eda644c9d018435ec6f02c60d53fb3de6d794f3b2e5db03c5997decbcc46a5db48ef
-
C:\Windows\system\LEDnDgI.exeFilesize
5.9MB
MD5996f14c106c07495abf4cb40c04db385
SHA1a3141e4095d9b44679a9ec909d1c195fb88dab42
SHA256b3652c2092025fea423d19c1946f317ab980cd86ca20ffd3407c77c0f81a2be2
SHA5125883ef2825535997be57672f6a185d986ecbb218066aa25378cc621a8c699b867554d6c5b543839a2d39bad0428284ad327eb321c5c82183683c807369eef8e8
-
C:\Windows\system\LFqyymK.exeFilesize
5.9MB
MD56010208b5124882601c8464162f48dad
SHA1b8d354c59f30a81b34806b1163dffe2f8472d7a6
SHA256e7ca054c15d401cffa7d899e74e586636089bc11244c316726a8863525447088
SHA512ac3621b2ca9b478037dee874600fd28d776947d276d75f1ae917f713c67395433bb96741164d35b49993fc92d84e5373cf5da227a575fb735906dd880851439b
-
C:\Windows\system\RNbGtZL.exeFilesize
5.9MB
MD56ef2fa07066f522fe4dada42b3d6f696
SHA1abf477857955cfccb2c223e4f498941220cc4d68
SHA256a252b9071e2a7f8ce7f8d7baf385283cb9f75bc86667a17bd10ed1b5b995ec12
SHA512933106c8e8cdf238c8b3a794e68b4cda1861a6396161043ebafe39b4bf56e339ecfb7177390db4b5cae549a06f6bdf5e3bc3deabd863267d945a49f5e2168a8f
-
C:\Windows\system\UfxnBTK.exeFilesize
5.9MB
MD50da65b7acc4d51d31e1a91193535ac33
SHA1d59b6111d47e20729fda6b739ee747e2229e9c91
SHA2564e7a31610ddee4cf4635b7ec727af55795ae2b755331454677b40289fa18607f
SHA5124fcaad693e266d0f1bd3a0c2626078de512a5c376db46f5a6f83e2f31f5a5e9bd6968871443fde54cb7ae940c7491936126e8456d376ef89d4d1a2841080b3f9
-
C:\Windows\system\bCkapmv.exeFilesize
5.9MB
MD51cdb301f25396aff2b906a221527cb9d
SHA1be96814761ba1eb95865c38e02bfc4403b43e5d8
SHA256845f68882543ae39bbe546689a44040b9929d458f78d71be8eb6959cc107c3b9
SHA512f9491c5a08fee270e84c29f24ad915c447db5bb101bc20040a73b413e13b620222ad96a6efb901bc708852845a61b731ddaa7556b4c7bdb2cf6763d3b16084aa
-
C:\Windows\system\bdNRTVW.exeFilesize
5.9MB
MD56ecd0782afff89f331a22a1f0b26bfc6
SHA10ff361a17ca685f65be21d81a9f263433ecb629c
SHA25622f7f2076b6e48ddcdd911cd9b6e8493683dafbb50382c6717e3e22e62dfa06a
SHA512a52c714ab4854613698471b4f1a5f93ca136d58f78902dd7635089906062e5221addf3d6b68720f501d606dace34ddd76bb0878739a3d875c08a4ab0738ead62
-
C:\Windows\system\bmVNKnA.exeFilesize
5.9MB
MD595713f27ded216e420cbaaebfa755ee6
SHA1a767a73def6402a4bcd2f17a49178883bd9155d9
SHA2562e42041864011d1530661c0fd6ede50201cd56fe27b23f27f82f55db5a1268f9
SHA512c1c07e1467dec56488df76851302ac1a4e36849892ae76bc93943884289cc32b318986f47bfba6089c0e86464fb8900a88e94141f12dca24277859039aad7a7f
-
C:\Windows\system\kFBqKUY.exeFilesize
5.9MB
MD5895afc7be1f67771677962c4d3b6a6ff
SHA1a37fb505d68e42d9e5fae37bd0680d97a4d13d27
SHA2565949c62e616c7a0c4d5060ed7537f17a05242cf9844a8d13ec6a356e7d3f074f
SHA512f088d55fe822179f7317fd87ee799525dafaaf9fccff8e758c6bc98063c204afc4934da6bb791669d3d0d9f3003fa3d67e73e69d8b3b42a5ffb8593e0935888f
-
C:\Windows\system\kFYNiLW.exeFilesize
5.9MB
MD5d4589cf3d64cb54bafe0f9e9cd3dd482
SHA1a9f0b3515ef41a3c1c6e658a325d81c0b062bff8
SHA256950e8b1203a9823ff2e30328a434d8abaf879703554b60af15ca67e5a2896d78
SHA51232a7de994545961b96bdbb45899f1d9c56003580118d0006a3fce0a8f51ca03f210ccea328528ca75f13858a312aea158317e885685abfd0257a56e701afdcd0
-
C:\Windows\system\mYVyZIv.exeFilesize
5.9MB
MD52de81a6890890c35aec68dbfe1af788f
SHA162e5828a867948ae136c52194b76be4c9adbcfe7
SHA256e328199b9f9e64b99d16e2f7a69fe18efb243a73f583ca758b5f4ff37ecf9192
SHA512b2ae4ed0984dd1f6833c7422e11008bd749a4a40c617c19f69d7b12fafdd470c871a308b035447e4a897baa6104086564280c980a5d957418d64f4049bf501e3
-
C:\Windows\system\mqBIPQw.exeFilesize
5.9MB
MD5e1394c14deba1c8ebcbd166a274a7d7d
SHA157bef2b1de7ebfe93218347c4073b03774be03ea
SHA2565c08b377e2f1ce18d290200f1efa42c9c8b7a2ddbd14cf3572393e930e5661f4
SHA51277788d785a5dce170660dd689cbbf3e5952e4f411d639ae5efb0d8140410b763590f72529706434e5f94668061b3d44721e1208945dccbecc495297cfe17b86d
-
C:\Windows\system\nmEawBK.exeFilesize
5.9MB
MD515b3ba64de1998dcafef3e1dd335ba83
SHA1130bbb527f3d0ac691b3c58fb8abc1fb4bea0e45
SHA25692914bbcc345b3115e3a23337513c1333fe3ba5f507f9c0a935c038900091c61
SHA5120251727c3b7227c3154598b76820185eed5e5b3108cb26d3b7626128c8d2d8a8cdc8746c0c5baf2fc3ef58b41bb03a6d4751d463c6b903e586d8549f8da0f1b0
-
C:\Windows\system\pAbYqBQ.exeFilesize
5.9MB
MD5256dd66ca4159104fb44a08dda29d07c
SHA134c909739a76b2dbd33a72e576566094e6c2e156
SHA2569bb0c70fa8bb0a6613106c47b2edd03527d67c0020665743b78e350578281b4f
SHA51254d04abd40f28e6b3bdcd585554c598617d474dd4761a5bcac8a88feefddbfb4a3b2d3bf14eeea7b86cb7c6c1ee4307907c2d04cd1d285101c9baa7def216154
-
C:\Windows\system\xSuJJNh.exeFilesize
5.9MB
MD5bea5e21edb102153ed721715f22a3aee
SHA1991fb4217c367809720d8cf7b3b6c0a1648642cf
SHA256242947182c6e1cde4d1f094bdfa0757787786f7b8ee5a8c16c943dd0533ac0f3
SHA512ab09e71cc32ad4c8dda7b21d219c31616b95cd94433e0f873d0ea1b70590ce3a491a7f9a972cb276d391fff7372ef3618926034db08f8c6e0582d929a22217b4
-
C:\Windows\system\xtOFajp.exeFilesize
5.9MB
MD5421117565b977096741bdd1aad07c76c
SHA102317fd4c5c9d22e5ecb731f488ce44c08a8bcbb
SHA2566100b66968f0a7d58be097f251e5528a12af6b3b63d79538330f1d1679a39630
SHA5123a2940461974ae369d65eeeb01d8f49c7bef105d3d6314e556036bf71944c586c26d07a5494a0c83094b8064ac8a2e54a35d0702d286f8794c68679e26150025
-
\Windows\system\NOiRgOu.exeFilesize
5.9MB
MD523b68acc0babfca9c04c36aebe4f1c59
SHA1d1570837473446ceee54e428a1cccb29aabeadde
SHA2560b57c3a7cc259b32d862f8cabf1c3429c060533f169df4c109c69c2df33df5d2
SHA512db09c35541d16e43d69f636d30363fe9b15c13d59e552613f6ee340aa0550f5bd6c7688c27f9373319b2162452be3744268d842fcb7a879ddf1b66421f803634
-
\Windows\system\aNtnmJm.exeFilesize
5.9MB
MD5b304fa9149d7523e4a3732a5e55fe846
SHA1b9cc31a1707989e5ed574e9fe44d611a5c9b66f3
SHA256a9c3cb08169016c6366913a1a21627221b4ccab4ea156e21fee9941194103885
SHA51217a5b5adb6bff1caa7fe7109d250f150ba963d730833880e7d2da3e3850be3283a462c4553fdedce84651cb0c94030bf9c010e447c9e6fc21d577a41d6483abd
-
\Windows\system\ipqwFdc.exeFilesize
5.9MB
MD5df0fe6606668c91262d04e27f31f0c93
SHA1eaa8cc7bcf875a0d2ef2e4c2c6fc14ba403d6af5
SHA25616de4fa916572b8c7333e8c130056da76db3cc31158ae3c92ae4fb473826ffe2
SHA51297051dc9c6e8b2f15bcbac91d966891d2505e03f322f4a32ed4e18208357077b3cc02ea728d481fb06a232afc8dbb7406cc7cbf93c7073b7804b8be59bad5048
-
\Windows\system\qXpahEz.exeFilesize
5.9MB
MD5c3a7c514fbea98564dbaa754b954c735
SHA1f11213fadb4ed0889d7d2e9c819b52516eabe230
SHA256827b68fbcd0ebae9ace49827401be6408d132ba656f92671368cfd4e80b5e695
SHA512e44cfcc456a2794ec782e15ec347d40322e7c0b099c7aec8eaf7e61ac86e163a9e4750f09e2f27674a7f69ede1baae47b000ec8a982b8a74f401c0ff7f8ca231
-
\Windows\system\sJGYQwo.exeFilesize
5.9MB
MD5f60669ab9cb85d82f6fbc65b6c4b632d
SHA1b9f8578a361b27619fb7d053f9f4c5b5c52e4b19
SHA2567a8752ce3669a5ee7d92ee1ecd5f5c3fc45c50eab89d57853c2f2b01230f5156
SHA512d5f62daf2fd0e7ee55cdbe11df5e22f49c174470117ca268cae156dc9d62c2320f7f848aa1d735b6c94228679757ab433aa3370460a7be90aef75e716a3f294e
-
memory/108-142-0x000000013F180000-0x000000013F4D4000-memory.dmpFilesize
3.3MB
-
memory/108-139-0x000000013F4D0000-0x000000013F824000-memory.dmpFilesize
3.3MB
-
memory/108-1-0x00000000000F0000-0x0000000000100000-memory.dmpFilesize
64KB
-
memory/108-48-0x0000000002470000-0x00000000027C4000-memory.dmpFilesize
3.3MB
-
memory/108-99-0x000000013F110000-0x000000013F464000-memory.dmpFilesize
3.3MB
-
memory/108-53-0x000000013FC50000-0x000000013FFA4000-memory.dmpFilesize
3.3MB
-
memory/108-33-0x000000013F080000-0x000000013F3D4000-memory.dmpFilesize
3.3MB
-
memory/108-84-0x000000013F5F0000-0x000000013F944000-memory.dmpFilesize
3.3MB
-
memory/108-66-0x000000013F4D0000-0x000000013F824000-memory.dmpFilesize
3.3MB
-
memory/108-26-0x000000013F850000-0x000000013FBA4000-memory.dmpFilesize
3.3MB
-
memory/108-20-0x000000013F2D0000-0x000000013F624000-memory.dmpFilesize
3.3MB
-
memory/108-71-0x000000013F180000-0x000000013F4D4000-memory.dmpFilesize
3.3MB
-
memory/108-138-0x000000013F560000-0x000000013F8B4000-memory.dmpFilesize
3.3MB
-
memory/108-40-0x000000013F680000-0x000000013F9D4000-memory.dmpFilesize
3.3MB
-
memory/108-13-0x000000013F220000-0x000000013F574000-memory.dmpFilesize
3.3MB
-
memory/108-61-0x000000013F220000-0x000000013F574000-memory.dmpFilesize
3.3MB
-
memory/108-62-0x000000013F560000-0x000000013F8B4000-memory.dmpFilesize
3.3MB
-
memory/108-144-0x000000013F5F0000-0x000000013F944000-memory.dmpFilesize
3.3MB
-
memory/108-0-0x000000013FC50000-0x000000013FFA4000-memory.dmpFilesize
3.3MB
-
memory/1232-100-0x000000013F110000-0x000000013F464000-memory.dmpFilesize
3.3MB
-
memory/1232-147-0x000000013F110000-0x000000013F464000-memory.dmpFilesize
3.3MB
-
memory/1232-160-0x000000013F110000-0x000000013F464000-memory.dmpFilesize
3.3MB
-
memory/1628-157-0x000000013F5F0000-0x000000013F944000-memory.dmpFilesize
3.3MB
-
memory/1628-85-0x000000013F5F0000-0x000000013F944000-memory.dmpFilesize
3.3MB
-
memory/1696-93-0x000000013F370000-0x000000013F6C4000-memory.dmpFilesize
3.3MB
-
memory/1696-146-0x000000013F370000-0x000000013F6C4000-memory.dmpFilesize
3.3MB
-
memory/1696-159-0x000000013F370000-0x000000013F6C4000-memory.dmpFilesize
3.3MB
-
memory/2164-145-0x000000013F180000-0x000000013F4D4000-memory.dmpFilesize
3.3MB
-
memory/2164-88-0x000000013F180000-0x000000013F4D4000-memory.dmpFilesize
3.3MB
-
memory/2164-158-0x000000013F180000-0x000000013F4D4000-memory.dmpFilesize
3.3MB
-
memory/2416-148-0x000000013F0F0000-0x000000013F444000-memory.dmpFilesize
3.3MB
-
memory/2416-54-0x000000013F0F0000-0x000000013F444000-memory.dmpFilesize
3.3MB
-
memory/2416-11-0x000000013F0F0000-0x000000013F444000-memory.dmpFilesize
3.3MB
-
memory/2508-107-0x000000013FA90000-0x000000013FDE4000-memory.dmpFilesize
3.3MB
-
memory/2508-161-0x000000013FA90000-0x000000013FDE4000-memory.dmpFilesize
3.3MB
-
memory/2508-60-0x000000013FA90000-0x000000013FDE4000-memory.dmpFilesize
3.3MB
-
memory/2540-156-0x000000013F560000-0x000000013F8B4000-memory.dmpFilesize
3.3MB
-
memory/2540-143-0x000000013F560000-0x000000013F8B4000-memory.dmpFilesize
3.3MB
-
memory/2540-76-0x000000013F560000-0x000000013F8B4000-memory.dmpFilesize
3.3MB
-
memory/2672-29-0x000000013F850000-0x000000013FBA4000-memory.dmpFilesize
3.3MB
-
memory/2672-151-0x000000013F850000-0x000000013FBA4000-memory.dmpFilesize
3.3MB
-
memory/2696-56-0x000000013FA90000-0x000000013FDE4000-memory.dmpFilesize
3.3MB
-
memory/2696-154-0x000000013FA90000-0x000000013FDE4000-memory.dmpFilesize
3.3MB
-
memory/2712-41-0x000000013F680000-0x000000013F9D4000-memory.dmpFilesize
3.3MB
-
memory/2712-83-0x000000013F680000-0x000000013F9D4000-memory.dmpFilesize
3.3MB
-
memory/2712-153-0x000000013F680000-0x000000013F9D4000-memory.dmpFilesize
3.3MB
-
memory/2728-75-0x000000013F080000-0x000000013F3D4000-memory.dmpFilesize
3.3MB
-
memory/2728-152-0x000000013F080000-0x000000013F3D4000-memory.dmpFilesize
3.3MB
-
memory/2728-35-0x000000013F080000-0x000000013F3D4000-memory.dmpFilesize
3.3MB
-
memory/2812-150-0x000000013F2D0000-0x000000013F624000-memory.dmpFilesize
3.3MB
-
memory/2812-65-0x000000013F2D0000-0x000000013F624000-memory.dmpFilesize
3.3MB
-
memory/2812-21-0x000000013F2D0000-0x000000013F624000-memory.dmpFilesize
3.3MB
-
memory/2892-155-0x000000013F4D0000-0x000000013F824000-memory.dmpFilesize
3.3MB
-
memory/2892-69-0x000000013F4D0000-0x000000013F824000-memory.dmpFilesize
3.3MB
-
memory/2892-140-0x000000013F4D0000-0x000000013F824000-memory.dmpFilesize
3.3MB
-
memory/2916-149-0x000000013F220000-0x000000013F574000-memory.dmpFilesize
3.3MB
-
memory/2916-15-0x000000013F220000-0x000000013F574000-memory.dmpFilesize
3.3MB