Analysis
-
max time kernel
137s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:28
Behavioral task
behavioral1
Sample
63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe
-
Size
5.9MB
-
MD5
63f5fad74b84ccd2d8469b57f053f84b
-
SHA1
33bcd309bb05b439aa4f10aef53411627db8abd6
-
SHA256
4c873710dff29c33d1ab25f3b4cc213bb26f0ce86286f3a4150325b91a291b68
-
SHA512
d28445c816553bed34da14b91b2a072cc209f774a2ab171002ad9c6c00dd647289a6809359c2dc40ab15b11496da969e1ecbb30ce95f065c973bcc3f78d50ab5
-
SSDEEP
98304:demTLkNdfE0pZ3u56utgpPFotBER/mQ32lUX:E+b56utgpPF8u/7X
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule \Windows\system\ZMuPLRp.exe cobalt_reflective_dll C:\Windows\system\HTilnAX.exe cobalt_reflective_dll \Windows\system\kyQSUmP.exe cobalt_reflective_dll C:\Windows\system\aMucJsk.exe cobalt_reflective_dll \Windows\system\scUdzOh.exe cobalt_reflective_dll C:\Windows\system\ywNWclH.exe cobalt_reflective_dll C:\Windows\system\oHsiJzS.exe cobalt_reflective_dll \Windows\system\TMukJWZ.exe cobalt_reflective_dll \Windows\system\gSluetJ.exe cobalt_reflective_dll C:\Windows\system\ZQFeaSp.exe cobalt_reflective_dll C:\Windows\system\fCspxZX.exe cobalt_reflective_dll C:\Windows\system\KssnNXI.exe cobalt_reflective_dll \Windows\system\VinSNpg.exe cobalt_reflective_dll C:\Windows\system\zuzRMTF.exe cobalt_reflective_dll C:\Windows\system\HxWPqBU.exe cobalt_reflective_dll C:\Windows\system\xMfvvBJ.exe cobalt_reflective_dll C:\Windows\system\EuVuHNF.exe cobalt_reflective_dll C:\Windows\system\WjQadIG.exe cobalt_reflective_dll C:\Windows\system\HLPVZZk.exe cobalt_reflective_dll C:\Windows\system\RNoQlGb.exe cobalt_reflective_dll C:\Windows\system\EhOIJqi.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 54 IoCs
Processes:
resource yara_rule behavioral1/memory/2400-1-0x000000013FF20000-0x0000000140274000-memory.dmp xmrig \Windows\system\ZMuPLRp.exe xmrig C:\Windows\system\HTilnAX.exe xmrig \Windows\system\kyQSUmP.exe xmrig behavioral1/memory/3032-14-0x000000013F1B0000-0x000000013F504000-memory.dmp xmrig C:\Windows\system\aMucJsk.exe xmrig \Windows\system\scUdzOh.exe xmrig behavioral1/memory/3036-12-0x000000013F340000-0x000000013F694000-memory.dmp xmrig behavioral1/memory/2672-28-0x000000013FED0000-0x0000000140224000-memory.dmp xmrig behavioral1/memory/2400-33-0x000000013FAF0000-0x000000013FE44000-memory.dmp xmrig C:\Windows\system\ywNWclH.exe xmrig behavioral1/memory/2496-44-0x000000013FD10000-0x0000000140064000-memory.dmp xmrig behavioral1/memory/2604-37-0x000000013FAF0000-0x000000013FE44000-memory.dmp xmrig behavioral1/memory/2668-31-0x000000013F6E0000-0x000000013FA34000-memory.dmp xmrig C:\Windows\system\oHsiJzS.exe xmrig behavioral1/memory/2608-51-0x000000013F190000-0x000000013F4E4000-memory.dmp xmrig \Windows\system\TMukJWZ.exe xmrig behavioral1/memory/2516-58-0x000000013FBD0000-0x000000013FF24000-memory.dmp xmrig \Windows\system\gSluetJ.exe xmrig behavioral1/memory/780-97-0x000000013F880000-0x000000013FBD4000-memory.dmp xmrig C:\Windows\system\ZQFeaSp.exe xmrig behavioral1/memory/3032-108-0x000000013F1B0000-0x000000013F504000-memory.dmp xmrig behavioral1/memory/2568-106-0x000000013F600000-0x000000013F954000-memory.dmp xmrig behavioral1/memory/2400-102-0x000000013F600000-0x000000013F954000-memory.dmp xmrig C:\Windows\system\fCspxZX.exe xmrig C:\Windows\system\KssnNXI.exe xmrig \Windows\system\VinSNpg.exe xmrig C:\Windows\system\zuzRMTF.exe xmrig C:\Windows\system\HxWPqBU.exe xmrig C:\Windows\system\xMfvvBJ.exe xmrig C:\Windows\system\EuVuHNF.exe xmrig behavioral1/memory/2400-99-0x000000013FF20000-0x0000000140274000-memory.dmp xmrig C:\Windows\system\WjQadIG.exe xmrig behavioral1/memory/2508-96-0x000000013FF70000-0x00000001402C4000-memory.dmp xmrig C:\Windows\system\HLPVZZk.exe xmrig C:\Windows\system\RNoQlGb.exe xmrig behavioral1/memory/2572-79-0x000000013FD80000-0x00000001400D4000-memory.dmp xmrig behavioral1/memory/2372-75-0x000000013FF30000-0x0000000140284000-memory.dmp xmrig behavioral1/memory/2276-67-0x000000013F840000-0x000000013FB94000-memory.dmp xmrig C:\Windows\system\EhOIJqi.exe xmrig behavioral1/memory/3036-142-0x000000013F340000-0x000000013F694000-memory.dmp xmrig behavioral1/memory/3032-143-0x000000013F1B0000-0x000000013F504000-memory.dmp xmrig behavioral1/memory/2672-144-0x000000013FED0000-0x0000000140224000-memory.dmp xmrig behavioral1/memory/2668-145-0x000000013F6E0000-0x000000013FA34000-memory.dmp xmrig behavioral1/memory/2604-146-0x000000013FAF0000-0x000000013FE44000-memory.dmp xmrig behavioral1/memory/2496-147-0x000000013FD10000-0x0000000140064000-memory.dmp xmrig behavioral1/memory/2608-148-0x000000013F190000-0x000000013F4E4000-memory.dmp xmrig behavioral1/memory/2516-149-0x000000013FBD0000-0x000000013FF24000-memory.dmp xmrig behavioral1/memory/2276-150-0x000000013F840000-0x000000013FB94000-memory.dmp xmrig behavioral1/memory/2372-151-0x000000013FF30000-0x0000000140284000-memory.dmp xmrig behavioral1/memory/2572-152-0x000000013FD80000-0x00000001400D4000-memory.dmp xmrig behavioral1/memory/2508-153-0x000000013FF70000-0x00000001402C4000-memory.dmp xmrig behavioral1/memory/780-154-0x000000013F880000-0x000000013FBD4000-memory.dmp xmrig behavioral1/memory/2568-155-0x000000013F600000-0x000000013F954000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
ZMuPLRp.exeHTilnAX.exekyQSUmP.exeaMucJsk.exescUdzOh.exeywNWclH.exeoHsiJzS.exeTMukJWZ.exeEhOIJqi.exegSluetJ.exeZQFeaSp.exeRNoQlGb.exeHLPVZZk.exeWjQadIG.exefCspxZX.exeKssnNXI.exeEuVuHNF.exexMfvvBJ.exezuzRMTF.exeHxWPqBU.exeVinSNpg.exepid process 3036 ZMuPLRp.exe 3032 HTilnAX.exe 2672 kyQSUmP.exe 2668 aMucJsk.exe 2604 scUdzOh.exe 2496 ywNWclH.exe 2608 oHsiJzS.exe 2516 TMukJWZ.exe 2276 EhOIJqi.exe 2372 gSluetJ.exe 2572 ZQFeaSp.exe 2508 RNoQlGb.exe 780 HLPVZZk.exe 2568 WjQadIG.exe 2436 fCspxZX.exe 1828 KssnNXI.exe 1976 EuVuHNF.exe 2140 xMfvvBJ.exe 2820 zuzRMTF.exe 2256 HxWPqBU.exe 1588 VinSNpg.exe -
Loads dropped DLL 21 IoCs
Processes:
63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exepid process 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe -
Processes:
resource yara_rule behavioral1/memory/2400-1-0x000000013FF20000-0x0000000140274000-memory.dmp upx \Windows\system\ZMuPLRp.exe upx C:\Windows\system\HTilnAX.exe upx \Windows\system\kyQSUmP.exe upx behavioral1/memory/3032-14-0x000000013F1B0000-0x000000013F504000-memory.dmp upx C:\Windows\system\aMucJsk.exe upx \Windows\system\scUdzOh.exe upx behavioral1/memory/3036-12-0x000000013F340000-0x000000013F694000-memory.dmp upx behavioral1/memory/2672-28-0x000000013FED0000-0x0000000140224000-memory.dmp upx C:\Windows\system\ywNWclH.exe upx behavioral1/memory/2496-44-0x000000013FD10000-0x0000000140064000-memory.dmp upx behavioral1/memory/2604-37-0x000000013FAF0000-0x000000013FE44000-memory.dmp upx behavioral1/memory/2668-31-0x000000013F6E0000-0x000000013FA34000-memory.dmp upx C:\Windows\system\oHsiJzS.exe upx behavioral1/memory/2608-51-0x000000013F190000-0x000000013F4E4000-memory.dmp upx \Windows\system\TMukJWZ.exe upx behavioral1/memory/2516-58-0x000000013FBD0000-0x000000013FF24000-memory.dmp upx \Windows\system\gSluetJ.exe upx behavioral1/memory/780-97-0x000000013F880000-0x000000013FBD4000-memory.dmp upx C:\Windows\system\ZQFeaSp.exe upx behavioral1/memory/3032-108-0x000000013F1B0000-0x000000013F504000-memory.dmp upx behavioral1/memory/2568-106-0x000000013F600000-0x000000013F954000-memory.dmp upx C:\Windows\system\fCspxZX.exe upx C:\Windows\system\KssnNXI.exe upx \Windows\system\VinSNpg.exe upx C:\Windows\system\zuzRMTF.exe upx C:\Windows\system\HxWPqBU.exe upx C:\Windows\system\xMfvvBJ.exe upx C:\Windows\system\EuVuHNF.exe upx behavioral1/memory/2400-99-0x000000013FF20000-0x0000000140274000-memory.dmp upx C:\Windows\system\WjQadIG.exe upx behavioral1/memory/2508-96-0x000000013FF70000-0x00000001402C4000-memory.dmp upx C:\Windows\system\HLPVZZk.exe upx C:\Windows\system\RNoQlGb.exe upx behavioral1/memory/2572-79-0x000000013FD80000-0x00000001400D4000-memory.dmp upx behavioral1/memory/2372-75-0x000000013FF30000-0x0000000140284000-memory.dmp upx behavioral1/memory/2276-67-0x000000013F840000-0x000000013FB94000-memory.dmp upx C:\Windows\system\EhOIJqi.exe upx behavioral1/memory/3036-142-0x000000013F340000-0x000000013F694000-memory.dmp upx behavioral1/memory/3032-143-0x000000013F1B0000-0x000000013F504000-memory.dmp upx behavioral1/memory/2672-144-0x000000013FED0000-0x0000000140224000-memory.dmp upx behavioral1/memory/2668-145-0x000000013F6E0000-0x000000013FA34000-memory.dmp upx behavioral1/memory/2604-146-0x000000013FAF0000-0x000000013FE44000-memory.dmp upx behavioral1/memory/2496-147-0x000000013FD10000-0x0000000140064000-memory.dmp upx behavioral1/memory/2608-148-0x000000013F190000-0x000000013F4E4000-memory.dmp upx behavioral1/memory/2516-149-0x000000013FBD0000-0x000000013FF24000-memory.dmp upx behavioral1/memory/2276-150-0x000000013F840000-0x000000013FB94000-memory.dmp upx behavioral1/memory/2372-151-0x000000013FF30000-0x0000000140284000-memory.dmp upx behavioral1/memory/2572-152-0x000000013FD80000-0x00000001400D4000-memory.dmp upx behavioral1/memory/2508-153-0x000000013FF70000-0x00000001402C4000-memory.dmp upx behavioral1/memory/780-154-0x000000013F880000-0x000000013FBD4000-memory.dmp upx behavioral1/memory/2568-155-0x000000013F600000-0x000000013F954000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exedescription ioc process File created C:\Windows\System\HLPVZZk.exe 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe File created C:\Windows\System\fCspxZX.exe 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe File created C:\Windows\System\KssnNXI.exe 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe File created C:\Windows\System\ZMuPLRp.exe 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe File created C:\Windows\System\TMukJWZ.exe 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe File created C:\Windows\System\gSluetJ.exe 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe File created C:\Windows\System\ZQFeaSp.exe 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe File created C:\Windows\System\WjQadIG.exe 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe File created C:\Windows\System\EuVuHNF.exe 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe File created C:\Windows\System\xMfvvBJ.exe 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe File created C:\Windows\System\HxWPqBU.exe 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe File created C:\Windows\System\ywNWclH.exe 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe File created C:\Windows\System\VinSNpg.exe 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe File created C:\Windows\System\kyQSUmP.exe 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe File created C:\Windows\System\aMucJsk.exe 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe File created C:\Windows\System\oHsiJzS.exe 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe File created C:\Windows\System\RNoQlGb.exe 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe File created C:\Windows\System\zuzRMTF.exe 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe File created C:\Windows\System\HTilnAX.exe 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe File created C:\Windows\System\scUdzOh.exe 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe File created C:\Windows\System\EhOIJqi.exe 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exedescription pid process Token: SeLockMemoryPrivilege 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe Token: SeLockMemoryPrivilege 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exedescription pid process target process PID 2400 wrote to memory of 3036 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe ZMuPLRp.exe PID 2400 wrote to memory of 3036 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe ZMuPLRp.exe PID 2400 wrote to memory of 3036 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe ZMuPLRp.exe PID 2400 wrote to memory of 3032 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe HTilnAX.exe PID 2400 wrote to memory of 3032 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe HTilnAX.exe PID 2400 wrote to memory of 3032 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe HTilnAX.exe PID 2400 wrote to memory of 2672 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe kyQSUmP.exe PID 2400 wrote to memory of 2672 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe kyQSUmP.exe PID 2400 wrote to memory of 2672 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe kyQSUmP.exe PID 2400 wrote to memory of 2668 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe aMucJsk.exe PID 2400 wrote to memory of 2668 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe aMucJsk.exe PID 2400 wrote to memory of 2668 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe aMucJsk.exe PID 2400 wrote to memory of 2604 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe scUdzOh.exe PID 2400 wrote to memory of 2604 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe scUdzOh.exe PID 2400 wrote to memory of 2604 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe scUdzOh.exe PID 2400 wrote to memory of 2496 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe ywNWclH.exe PID 2400 wrote to memory of 2496 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe ywNWclH.exe PID 2400 wrote to memory of 2496 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe ywNWclH.exe PID 2400 wrote to memory of 2608 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe oHsiJzS.exe PID 2400 wrote to memory of 2608 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe oHsiJzS.exe PID 2400 wrote to memory of 2608 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe oHsiJzS.exe PID 2400 wrote to memory of 2516 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe TMukJWZ.exe PID 2400 wrote to memory of 2516 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe TMukJWZ.exe PID 2400 wrote to memory of 2516 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe TMukJWZ.exe PID 2400 wrote to memory of 2276 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe EhOIJqi.exe PID 2400 wrote to memory of 2276 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe EhOIJqi.exe PID 2400 wrote to memory of 2276 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe EhOIJqi.exe PID 2400 wrote to memory of 2372 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe gSluetJ.exe PID 2400 wrote to memory of 2372 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe gSluetJ.exe PID 2400 wrote to memory of 2372 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe gSluetJ.exe PID 2400 wrote to memory of 2572 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe ZQFeaSp.exe PID 2400 wrote to memory of 2572 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe ZQFeaSp.exe PID 2400 wrote to memory of 2572 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe ZQFeaSp.exe PID 2400 wrote to memory of 2508 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe RNoQlGb.exe PID 2400 wrote to memory of 2508 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe RNoQlGb.exe PID 2400 wrote to memory of 2508 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe RNoQlGb.exe PID 2400 wrote to memory of 2568 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe WjQadIG.exe PID 2400 wrote to memory of 2568 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe WjQadIG.exe PID 2400 wrote to memory of 2568 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe WjQadIG.exe PID 2400 wrote to memory of 780 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe HLPVZZk.exe PID 2400 wrote to memory of 780 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe HLPVZZk.exe PID 2400 wrote to memory of 780 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe HLPVZZk.exe PID 2400 wrote to memory of 2436 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe fCspxZX.exe PID 2400 wrote to memory of 2436 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe fCspxZX.exe PID 2400 wrote to memory of 2436 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe fCspxZX.exe PID 2400 wrote to memory of 1828 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe KssnNXI.exe PID 2400 wrote to memory of 1828 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe KssnNXI.exe PID 2400 wrote to memory of 1828 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe KssnNXI.exe PID 2400 wrote to memory of 1976 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe EuVuHNF.exe PID 2400 wrote to memory of 1976 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe EuVuHNF.exe PID 2400 wrote to memory of 1976 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe EuVuHNF.exe PID 2400 wrote to memory of 2140 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe xMfvvBJ.exe PID 2400 wrote to memory of 2140 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe xMfvvBJ.exe PID 2400 wrote to memory of 2140 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe xMfvvBJ.exe PID 2400 wrote to memory of 2820 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe zuzRMTF.exe PID 2400 wrote to memory of 2820 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe zuzRMTF.exe PID 2400 wrote to memory of 2820 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe zuzRMTF.exe PID 2400 wrote to memory of 2256 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe HxWPqBU.exe PID 2400 wrote to memory of 2256 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe HxWPqBU.exe PID 2400 wrote to memory of 2256 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe HxWPqBU.exe PID 2400 wrote to memory of 1588 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe VinSNpg.exe PID 2400 wrote to memory of 1588 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe VinSNpg.exe PID 2400 wrote to memory of 1588 2400 63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe VinSNpg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\63f5fad74b84ccd2d8469b57f053f84b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\ZMuPLRp.exeC:\Windows\System\ZMuPLRp.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\HTilnAX.exeC:\Windows\System\HTilnAX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\kyQSUmP.exeC:\Windows\System\kyQSUmP.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\aMucJsk.exeC:\Windows\System\aMucJsk.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\scUdzOh.exeC:\Windows\System\scUdzOh.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ywNWclH.exeC:\Windows\System\ywNWclH.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\oHsiJzS.exeC:\Windows\System\oHsiJzS.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\TMukJWZ.exeC:\Windows\System\TMukJWZ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\EhOIJqi.exeC:\Windows\System\EhOIJqi.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\gSluetJ.exeC:\Windows\System\gSluetJ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ZQFeaSp.exeC:\Windows\System\ZQFeaSp.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\RNoQlGb.exeC:\Windows\System\RNoQlGb.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\WjQadIG.exeC:\Windows\System\WjQadIG.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\HLPVZZk.exeC:\Windows\System\HLPVZZk.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\fCspxZX.exeC:\Windows\System\fCspxZX.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\KssnNXI.exeC:\Windows\System\KssnNXI.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\EuVuHNF.exeC:\Windows\System\EuVuHNF.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\xMfvvBJ.exeC:\Windows\System\xMfvvBJ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zuzRMTF.exeC:\Windows\System\zuzRMTF.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\HxWPqBU.exeC:\Windows\System\HxWPqBU.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\VinSNpg.exeC:\Windows\System\VinSNpg.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\EhOIJqi.exeFilesize
5.9MB
MD56491b8a90fd4a9dee1c6b88abaa95dbc
SHA17c3186cc266214e32ef183c38f377452ecd173b0
SHA256a8a39f31d16f86c7a9531e39bb56fe1f30610462a4fd2cfd3fc21c63187d1ddd
SHA5125f63310b0abe0b301021b1967b8d64229f4f52ab802941fe19bc23a2e453a7364ba2f54eb45e5ad006fafd7898201636429d91f71d1c166920b9e1e01a1b7c83
-
C:\Windows\system\EuVuHNF.exeFilesize
5.9MB
MD58f640a75df214c9fcfe7c56c4cf9f211
SHA1a1ae700ab1ade810ec7c7093cd2a3aab76a42d2c
SHA256f23ffd2a6118801c1e076486159bd6f10ae976f6c5c718aa428257c3cc10aaca
SHA512415dcdc877413752bd31baf04ef70f32518fce3267980bae7a9b22a1a50430dd02aff3772d8c0e718f4f1adff06fcaf3072d9fd279a131b4a4f6e6c20cb3b785
-
C:\Windows\system\HLPVZZk.exeFilesize
5.9MB
MD518c52d84dfa851c39ab8c17a333442f1
SHA1ffa896319a13a906c154e270ded7d995f1d112d2
SHA25621d8fb4bed78dad586215dfbcc465e1cc13233f049d792b095085af7d528e63f
SHA5125a64e48de6ce46b393ae05d385a03bb03f344aab3b90b739a83e627fdb7a297dda4646882ddfcc9ef024ec3650e83bbac690fdf97d7fde8315e08c932b7bc838
-
C:\Windows\system\HTilnAX.exeFilesize
5.9MB
MD53183c582e542503c4bde3e4207577fe5
SHA1052de9e9aeb179433f64dfd92f3c4cca03017142
SHA2568543888b4abf39927fb3f1648e619b9284677b7c1f6b03ab8d233021d8447fc3
SHA51242b1055142eb9bd349b451fe1901f4a433bcb05c330c068e7f443528332268ac2d7c710af1a6460c4aa126ef05f1dfe0ebd8202492fac266e5fb11ab28ff8cce
-
C:\Windows\system\HxWPqBU.exeFilesize
5.9MB
MD5feeda6869b630a69b975af03c4fefdc5
SHA10f64340af6778e70c5c5180afbfdf770c1d3a3bf
SHA256077e8f65b80d0c71b5eba8b92d62876b36b8fddda1cff9306a1373be48bb7cc5
SHA512b14889ec1af106208aed93adb61b8c13281852c56066e4461f34fa2fa3c8b9d676b035189f861c13d5120f791891a970b9d29631e74ae3ad90c4a5884c5b1545
-
C:\Windows\system\KssnNXI.exeFilesize
5.9MB
MD5618e877407529f22812843c6ec109794
SHA1721ea49df222c6a1a9e0d00c0b7680a9457e451f
SHA256ecbd37719895b5e2d1057160194d411d86ee189ce02b315b76751f083ce985b7
SHA51292ab570d312249633bea4e76dbab1c2da8d17ad850c550453d77f6c51b26b5f541c0c01b28f1ed8ed67235c7eb376ae05e73998a4daa23b53daf99a36a796a29
-
C:\Windows\system\RNoQlGb.exeFilesize
5.9MB
MD5712d22e09fcb906318235786a2e70bc7
SHA1db97ef984184a33e8d6421323d5d1d956887f890
SHA2568f9dcf8496ec4b965feecd6f692e081ec544150d24c7a168a82a74b26d98a056
SHA5124e4c3004146f293e8c4990d346bfb4eedb6e5f94f0d0ec565e8f15c6023560dc0f75cea1e77b99da53cd8d89c4d86db40889e194716192da86a65c6412672278
-
C:\Windows\system\WjQadIG.exeFilesize
5.9MB
MD5e1fa9079a04c16cf44ea5df2d725430c
SHA152ca75412767a2db30592b4941a5728dc9b471db
SHA25648b7c7b5f77ddb0d62271d29cb2316881b89c6eb94bdd7aad3313289c7855d32
SHA512a6a83ec5a5a028afad36fd37cac0796b991565394a4ecc93f53c915dfb32469e70d0a7b8130e361ef04790ec329da8760312d187f083b9eb0835dfdba1fbd819
-
C:\Windows\system\ZQFeaSp.exeFilesize
5.9MB
MD508cf5adb4396e087e2d844c492f013c1
SHA12cdae3a5e6d4b476d96954360ddf7f56fe9322df
SHA256befe49edbca311d6b172ab1a3655a280a63a246f1a5816daa42ae7d1e6ee2ff2
SHA512d5b5e8d1c42bd3779a47cd9de2203150248e5968127d67b8202166072ebc7dbb67a710066c46d622a37f685c0c1cfc7993514656f6dceec885f42373bb2470c4
-
C:\Windows\system\aMucJsk.exeFilesize
5.9MB
MD53f8fbcf3b822850ca5ef0fa4aa8620f3
SHA14e18e3c2f46706b1a4fcff1f222cd231ee867f72
SHA256d07ac1738b311ead3d251753e2eceb47c0f50ca3c8ac9ad0aefa383b780d33cc
SHA51257aba1cc75369d798f173b4190ab562987ccb43f3dcea5a89faa37012820e3f7292f60c18c948ca818f2f8f0fe7e3c4c72bed644d08c02c96871453872dc5515
-
C:\Windows\system\fCspxZX.exeFilesize
5.9MB
MD5327daa074af2251eda8b6b6de0aee2aa
SHA17aff19cf1c52e4301e711db1ffb8b7cb1c6176c2
SHA25606f7ee33f76e543079aaafb19231393e77b6c2edb169a2e2ab6c44156a7d9bd7
SHA5124abd2d768e2de0c9a40e357f0427257cb28a3fa8f86791f722c622dbfc06c5c76d745f83b06a4288391866e8054b4b7135395e4a54962b0a224c4f6d0f356ca5
-
C:\Windows\system\oHsiJzS.exeFilesize
5.9MB
MD5ea0ae68fb82e2cb5b723befcbdd09617
SHA15a3b26d4c91c499ae5095f05e9e3182223168acd
SHA256994c327f49f35747a35050d90372ce2512a41aebf6c4c86b28b33cceb3dbf2bc
SHA51273304b0a5b5d3b22f262d883d02086f7594b13a2c0adab830e9ca636a7ff0da93c92108bbd27dc26533a4f28b1ca8bce164fe41105cadf4af3db7d5d25de61b8
-
C:\Windows\system\xMfvvBJ.exeFilesize
5.9MB
MD58f817bec4e94819c2079e0f1e2ba9040
SHA101e0541daa98028b34d8e96052e31c76d3b304fb
SHA25654222fad2d99740e79be9bd956abc102914b189ad5c37e84ee50286f151364aa
SHA512195c316c6f368747824a3dfada359908ceaee24f8afdd66019c440d49958f4705d7a981a4947e6f753bf0b130ca5004c8d5f0a144ffa9aadd6153c4aa6bc64b8
-
C:\Windows\system\ywNWclH.exeFilesize
5.9MB
MD5f087e661cdf801ff82497ba4a0aa49da
SHA1fac89292c44c849e3e4fe273885e7ce119e1c55d
SHA256bbf92398b3871279e0443e8da8fab0f4cc0afe0b26d23568be522df42e4dfdad
SHA512977e5b5ef9ff3157198e8c8b2d92b42084f57bb698636fe07937d144716bdf3bae3cee5f271b839ddc7475983e2167a9d743fca7de53535e9626172abc52c251
-
C:\Windows\system\zuzRMTF.exeFilesize
5.9MB
MD50506fe4efbe317e83a3e319a1fedceff
SHA1931bfb01cf0cdbee11177ffc621369016fbfc93c
SHA256e577713c6a7f9cac45da790d6911ea2990b0e97c8dcf30bd30780584edcd021e
SHA512d8b662d596bc632618e0afd8cf69489f1389363b676a8312ae0c12707178abec8dc0a77bf20ca08f3d24dfaeb37a212913c97cb60fa287426f48f45d132883fe
-
\Windows\system\TMukJWZ.exeFilesize
5.9MB
MD5b4f774b01153c55903f49648450f7ee0
SHA12a681b7fb2f0030c844de24283c0ec8023c0d869
SHA2566538bc6982eb6e7911020bc1b342f1877d3346b1d36a7157a148e1ee6c25e69a
SHA512beb57f9657c2b2bad4ca349074a9dfa1c6f259c05f94f85b6e50c33f18ab0fa2728335c2f3117128495a5a066d38db31b1190fd25f840ae7598fec8ec761a406
-
\Windows\system\VinSNpg.exeFilesize
5.9MB
MD5e988e8c692eeca15574bffbcf75e810c
SHA1c55e0590616657867e5cb84081b47ae8af204bcc
SHA25678a798de6ad680b82c5a735e520f6dd54a4c73f1900924082349ca31e339e33a
SHA512d92ac3bb059e9a534e990a15b28989e4a7317892348a262f530a1543b19b7d5c0bde9160e25463e08f2c269c87751eee193984c107ff047cf0334955e6d317ec
-
\Windows\system\ZMuPLRp.exeFilesize
5.9MB
MD59b9c96bce4795024a73f5c86264e003a
SHA15b43037335b0f7a0a466ab500eb6c6b61b526a95
SHA25689f0177f11ab5d2187399b90c1604adba1f27b18f1f198748ad135fce6ad2768
SHA512127b74fcf6633a4c78bff158cad267fe0170067144b1aee4a907128028dfe807680d00fccee87744637624a1a9e9618771c9ae5c18da914565f43251ee1846b9
-
\Windows\system\gSluetJ.exeFilesize
5.9MB
MD541b708308f73674a8e2b9f22025066ce
SHA1f43ea3e7ce957c1bc0b7b21ba8896b14435e959c
SHA256feb0e5390c582c5c98b2fd68c0f7c17d29ba49e3cfbb0c436c21f72512238b98
SHA512ea25b147ff9ff898d9c3cc83f5e70b2d5df067b70ba5b93f505a5772dcd3849ce506a4d897918ab019503db1b7ac270050cb55a143139cfcd82bd87c62253c00
-
\Windows\system\kyQSUmP.exeFilesize
5.9MB
MD5a97813612a20878f8137245fdeaa0934
SHA17b62828968f7df330dac113459cf1777d31ad017
SHA2560f8e4610fc5c63ae77f875b511ca8ab331fc1cb1ab4f452af69371b6ebcc753c
SHA5123758a7037751088d88e526daacfec68b7ab96a198f45a2c1c333eb9c375185f81ad1cccdfb9d86873ad183dcfb4fa3e9c7b315a7ccd7493b14c8c6d54367d99b
-
\Windows\system\scUdzOh.exeFilesize
5.9MB
MD530740ebedecce4264632be58a6aac242
SHA1c86cbf7c74fcf3f79b32e971c854a0496f52cc73
SHA2563608739a2482b67d8e323e75f2bf748fe7210dbc0449127eab07a2482be98ccf
SHA5121318081dcae6fc9a3a935ca640715efaf8112c72074a30ef929c0dbbf25535a0344ed435c5961b8d3554830e5b6bdd6473b4ebb96e81f9d4dbaaf8abe343cbc1
-
memory/780-97-0x000000013F880000-0x000000013FBD4000-memory.dmpFilesize
3.3MB
-
memory/780-154-0x000000013F880000-0x000000013FBD4000-memory.dmpFilesize
3.3MB
-
memory/2276-67-0x000000013F840000-0x000000013FB94000-memory.dmpFilesize
3.3MB
-
memory/2276-150-0x000000013F840000-0x000000013FB94000-memory.dmpFilesize
3.3MB
-
memory/2372-151-0x000000013FF30000-0x0000000140284000-memory.dmpFilesize
3.3MB
-
memory/2372-75-0x000000013FF30000-0x0000000140284000-memory.dmpFilesize
3.3MB
-
memory/2400-103-0x000000013F880000-0x000000013FBD4000-memory.dmpFilesize
3.3MB
-
memory/2400-55-0x0000000002350000-0x00000000026A4000-memory.dmpFilesize
3.3MB
-
memory/2400-89-0x0000000002350000-0x00000000026A4000-memory.dmpFilesize
3.3MB
-
memory/2400-50-0x000000013F190000-0x000000013F4E4000-memory.dmpFilesize
3.3MB
-
memory/2400-109-0x000000013F1B0000-0x000000013F504000-memory.dmpFilesize
3.3MB
-
memory/2400-1-0x000000013FF20000-0x0000000140274000-memory.dmpFilesize
3.3MB
-
memory/2400-107-0x000000013F340000-0x000000013F694000-memory.dmpFilesize
3.3MB
-
memory/2400-139-0x0000000002350000-0x00000000026A4000-memory.dmpFilesize
3.3MB
-
memory/2400-105-0x000000013F7C0000-0x000000013FB14000-memory.dmpFilesize
3.3MB
-
memory/2400-0-0x0000000001B20000-0x0000000001B30000-memory.dmpFilesize
64KB
-
memory/2400-102-0x000000013F600000-0x000000013F954000-memory.dmpFilesize
3.3MB
-
memory/2400-33-0x000000013FAF0000-0x000000013FE44000-memory.dmpFilesize
3.3MB
-
memory/2400-82-0x0000000002350000-0x00000000026A4000-memory.dmpFilesize
3.3MB
-
memory/2400-8-0x000000013F340000-0x000000013F694000-memory.dmpFilesize
3.3MB
-
memory/2400-140-0x000000013F840000-0x000000013FB94000-memory.dmpFilesize
3.3MB
-
memory/2400-36-0x000000013F6E0000-0x000000013FA34000-memory.dmpFilesize
3.3MB
-
memory/2400-141-0x000000013F7C0000-0x000000013FB14000-memory.dmpFilesize
3.3MB
-
memory/2400-43-0x0000000002350000-0x00000000026A4000-memory.dmpFilesize
3.3MB
-
memory/2400-99-0x000000013FF20000-0x0000000140274000-memory.dmpFilesize
3.3MB
-
memory/2400-21-0x000000013F1B0000-0x000000013F504000-memory.dmpFilesize
3.3MB
-
memory/2400-35-0x0000000002350000-0x00000000026A4000-memory.dmpFilesize
3.3MB
-
memory/2400-95-0x0000000002350000-0x00000000026A4000-memory.dmpFilesize
3.3MB
-
memory/2496-44-0x000000013FD10000-0x0000000140064000-memory.dmpFilesize
3.3MB
-
memory/2496-147-0x000000013FD10000-0x0000000140064000-memory.dmpFilesize
3.3MB
-
memory/2508-96-0x000000013FF70000-0x00000001402C4000-memory.dmpFilesize
3.3MB
-
memory/2508-153-0x000000013FF70000-0x00000001402C4000-memory.dmpFilesize
3.3MB
-
memory/2516-58-0x000000013FBD0000-0x000000013FF24000-memory.dmpFilesize
3.3MB
-
memory/2516-149-0x000000013FBD0000-0x000000013FF24000-memory.dmpFilesize
3.3MB
-
memory/2568-155-0x000000013F600000-0x000000013F954000-memory.dmpFilesize
3.3MB
-
memory/2568-106-0x000000013F600000-0x000000013F954000-memory.dmpFilesize
3.3MB
-
memory/2572-152-0x000000013FD80000-0x00000001400D4000-memory.dmpFilesize
3.3MB
-
memory/2572-79-0x000000013FD80000-0x00000001400D4000-memory.dmpFilesize
3.3MB
-
memory/2604-37-0x000000013FAF0000-0x000000013FE44000-memory.dmpFilesize
3.3MB
-
memory/2604-146-0x000000013FAF0000-0x000000013FE44000-memory.dmpFilesize
3.3MB
-
memory/2608-51-0x000000013F190000-0x000000013F4E4000-memory.dmpFilesize
3.3MB
-
memory/2608-148-0x000000013F190000-0x000000013F4E4000-memory.dmpFilesize
3.3MB
-
memory/2668-31-0x000000013F6E0000-0x000000013FA34000-memory.dmpFilesize
3.3MB
-
memory/2668-145-0x000000013F6E0000-0x000000013FA34000-memory.dmpFilesize
3.3MB
-
memory/2672-144-0x000000013FED0000-0x0000000140224000-memory.dmpFilesize
3.3MB
-
memory/2672-28-0x000000013FED0000-0x0000000140224000-memory.dmpFilesize
3.3MB
-
memory/3032-14-0x000000013F1B0000-0x000000013F504000-memory.dmpFilesize
3.3MB
-
memory/3032-143-0x000000013F1B0000-0x000000013F504000-memory.dmpFilesize
3.3MB
-
memory/3032-108-0x000000013F1B0000-0x000000013F504000-memory.dmpFilesize
3.3MB
-
memory/3036-12-0x000000013F340000-0x000000013F694000-memory.dmpFilesize
3.3MB
-
memory/3036-142-0x000000013F340000-0x000000013F694000-memory.dmpFilesize
3.3MB