Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 05:15
Behavioral task
behavioral1
Sample
6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe
-
Size
5.9MB
-
MD5
6d7129dd5d04eeb2bf161eb054273b34
-
SHA1
fc9f96c5dc9f00c15340da8c8b2eae7d298fbc50
-
SHA256
4ecb5d0ca7be12d9bafdafd7819f6005b23bcf57860eee5477cb2cbac31ed2d1
-
SHA512
99fc38762708736aeaeceb810c4dc10702dcad025b7b62558e7fe4f2a9533783bf32c181358e35578f2a46435bff09bc21b4a680f1000476cb63427cdd9c4a1b
-
SSDEEP
98304:demTLkNdfE0pZ3u56utgpPFotBER/mQ32lUl:E+b56utgpPF8u/7l
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule \Windows\system\DhijtcR.exe cobalt_reflective_dll C:\Windows\system\zBaaARU.exe cobalt_reflective_dll C:\Windows\system\vVfzVod.exe cobalt_reflective_dll C:\Windows\system\edmnucz.exe cobalt_reflective_dll C:\Windows\system\oDqixay.exe cobalt_reflective_dll C:\Windows\system\ITnyKRx.exe cobalt_reflective_dll C:\Windows\system\YBoTyCZ.exe cobalt_reflective_dll C:\Windows\system\naOAyYW.exe cobalt_reflective_dll C:\Windows\system\nlJbNPp.exe cobalt_reflective_dll C:\Windows\system\RmHREAn.exe cobalt_reflective_dll C:\Windows\system\JrCwfpB.exe cobalt_reflective_dll C:\Windows\system\WUSUpxG.exe cobalt_reflective_dll C:\Windows\system\wZMjHTR.exe cobalt_reflective_dll C:\Windows\system\JLEAMmU.exe cobalt_reflective_dll \Windows\system\THRSNhn.exe cobalt_reflective_dll C:\Windows\system\dcevpLs.exe cobalt_reflective_dll \Windows\system\CbhuvHI.exe cobalt_reflective_dll C:\Windows\system\lTPrLec.exe cobalt_reflective_dll C:\Windows\system\rIUqSet.exe cobalt_reflective_dll C:\Windows\system\rOyRkBl.exe cobalt_reflective_dll C:\Windows\system\kaQcDhA.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 58 IoCs
Processes:
resource yara_rule behavioral1/memory/2168-0-0x000000013F480000-0x000000013F7D4000-memory.dmp xmrig \Windows\system\DhijtcR.exe xmrig behavioral1/memory/2600-12-0x000000013F180000-0x000000013F4D4000-memory.dmp xmrig C:\Windows\system\zBaaARU.exe xmrig behavioral1/memory/2560-22-0x000000013F630000-0x000000013F984000-memory.dmp xmrig behavioral1/memory/2100-20-0x000000013FAB0000-0x000000013FE04000-memory.dmp xmrig C:\Windows\system\vVfzVod.exe xmrig C:\Windows\system\edmnucz.exe xmrig behavioral1/memory/2632-28-0x000000013F050000-0x000000013F3A4000-memory.dmp xmrig C:\Windows\system\oDqixay.exe xmrig C:\Windows\system\ITnyKRx.exe xmrig behavioral1/memory/2688-43-0x000000013F650000-0x000000013F9A4000-memory.dmp xmrig behavioral1/memory/2420-40-0x000000013FF90000-0x00000001402E4000-memory.dmp xmrig C:\Windows\system\YBoTyCZ.exe xmrig behavioral1/memory/2588-51-0x000000013F490000-0x000000013F7E4000-memory.dmp xmrig C:\Windows\system\naOAyYW.exe xmrig behavioral1/memory/2168-56-0x000000013F480000-0x000000013F7D4000-memory.dmp xmrig behavioral1/memory/2460-57-0x000000013FBF0000-0x000000013FF44000-memory.dmp xmrig C:\Windows\system\nlJbNPp.exe xmrig behavioral1/memory/2964-64-0x000000013F640000-0x000000013F994000-memory.dmp xmrig C:\Windows\system\RmHREAn.exe xmrig behavioral1/memory/1556-71-0x000000013F320000-0x000000013F674000-memory.dmp xmrig behavioral1/memory/2632-78-0x000000013F050000-0x000000013F3A4000-memory.dmp xmrig C:\Windows\system\JrCwfpB.exe xmrig behavioral1/memory/2956-88-0x000000013FD90000-0x00000001400E4000-memory.dmp xmrig C:\Windows\system\WUSUpxG.exe xmrig C:\Windows\system\wZMjHTR.exe xmrig behavioral1/memory/2780-99-0x000000013FBB0000-0x000000013FF04000-memory.dmp xmrig behavioral1/memory/2168-93-0x000000013FB70000-0x000000013FEC4000-memory.dmp xmrig behavioral1/memory/2740-85-0x000000013FE90000-0x00000001401E4000-memory.dmp xmrig behavioral1/memory/2168-83-0x000000013FE90000-0x00000001401E4000-memory.dmp xmrig C:\Windows\system\JLEAMmU.exe xmrig behavioral1/memory/2100-73-0x000000013FAB0000-0x000000013FE04000-memory.dmp xmrig \Windows\system\THRSNhn.exe xmrig C:\Windows\system\dcevpLs.exe xmrig \Windows\system\CbhuvHI.exe xmrig C:\Windows\system\lTPrLec.exe xmrig C:\Windows\system\rIUqSet.exe xmrig C:\Windows\system\rOyRkBl.exe xmrig C:\Windows\system\kaQcDhA.exe xmrig behavioral1/memory/2752-135-0x000000013FB70000-0x000000013FEC4000-memory.dmp xmrig behavioral1/memory/2964-139-0x000000013F640000-0x000000013F994000-memory.dmp xmrig behavioral1/memory/2168-140-0x000000013FE90000-0x00000001401E4000-memory.dmp xmrig behavioral1/memory/2752-144-0x000000013FB70000-0x000000013FEC4000-memory.dmp xmrig behavioral1/memory/2600-146-0x000000013F180000-0x000000013F4D4000-memory.dmp xmrig behavioral1/memory/2560-147-0x000000013F630000-0x000000013F984000-memory.dmp xmrig behavioral1/memory/2100-148-0x000000013FAB0000-0x000000013FE04000-memory.dmp xmrig behavioral1/memory/2632-149-0x000000013F050000-0x000000013F3A4000-memory.dmp xmrig behavioral1/memory/2420-150-0x000000013FF90000-0x00000001402E4000-memory.dmp xmrig behavioral1/memory/2688-151-0x000000013F650000-0x000000013F9A4000-memory.dmp xmrig behavioral1/memory/2588-152-0x000000013F490000-0x000000013F7E4000-memory.dmp xmrig behavioral1/memory/2460-153-0x000000013FBF0000-0x000000013FF44000-memory.dmp xmrig behavioral1/memory/2964-154-0x000000013F640000-0x000000013F994000-memory.dmp xmrig behavioral1/memory/1556-155-0x000000013F320000-0x000000013F674000-memory.dmp xmrig behavioral1/memory/2740-156-0x000000013FE90000-0x00000001401E4000-memory.dmp xmrig behavioral1/memory/2956-157-0x000000013FD90000-0x00000001400E4000-memory.dmp xmrig behavioral1/memory/2780-158-0x000000013FBB0000-0x000000013FF04000-memory.dmp xmrig behavioral1/memory/2752-159-0x000000013FB70000-0x000000013FEC4000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
Processes:
DhijtcR.exevVfzVod.exezBaaARU.exeedmnucz.exeoDqixay.exeITnyKRx.exeYBoTyCZ.exenaOAyYW.exenlJbNPp.exeRmHREAn.exeJLEAMmU.exeJrCwfpB.exeWUSUpxG.exewZMjHTR.exekaQcDhA.exerOyRkBl.exeTHRSNhn.exerIUqSet.exelTPrLec.exedcevpLs.exeCbhuvHI.exepid process 2600 DhijtcR.exe 2100 vVfzVod.exe 2560 zBaaARU.exe 2632 edmnucz.exe 2420 oDqixay.exe 2688 ITnyKRx.exe 2588 YBoTyCZ.exe 2460 naOAyYW.exe 2964 nlJbNPp.exe 1556 RmHREAn.exe 2740 JLEAMmU.exe 2956 JrCwfpB.exe 2780 WUSUpxG.exe 2752 wZMjHTR.exe 1372 kaQcDhA.exe 2128 rOyRkBl.exe 2656 THRSNhn.exe 2756 rIUqSet.exe 1948 lTPrLec.exe 1844 dcevpLs.exe 896 CbhuvHI.exe -
Loads dropped DLL 21 IoCs
Processes:
6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exepid process 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe -
Processes:
resource yara_rule behavioral1/memory/2168-0-0x000000013F480000-0x000000013F7D4000-memory.dmp upx \Windows\system\DhijtcR.exe upx behavioral1/memory/2600-12-0x000000013F180000-0x000000013F4D4000-memory.dmp upx C:\Windows\system\zBaaARU.exe upx behavioral1/memory/2560-22-0x000000013F630000-0x000000013F984000-memory.dmp upx behavioral1/memory/2100-20-0x000000013FAB0000-0x000000013FE04000-memory.dmp upx C:\Windows\system\vVfzVod.exe upx C:\Windows\system\edmnucz.exe upx behavioral1/memory/2632-28-0x000000013F050000-0x000000013F3A4000-memory.dmp upx C:\Windows\system\oDqixay.exe upx C:\Windows\system\ITnyKRx.exe upx behavioral1/memory/2688-43-0x000000013F650000-0x000000013F9A4000-memory.dmp upx behavioral1/memory/2420-40-0x000000013FF90000-0x00000001402E4000-memory.dmp upx C:\Windows\system\YBoTyCZ.exe upx behavioral1/memory/2588-51-0x000000013F490000-0x000000013F7E4000-memory.dmp upx C:\Windows\system\naOAyYW.exe upx behavioral1/memory/2168-56-0x000000013F480000-0x000000013F7D4000-memory.dmp upx behavioral1/memory/2460-57-0x000000013FBF0000-0x000000013FF44000-memory.dmp upx C:\Windows\system\nlJbNPp.exe upx behavioral1/memory/2964-64-0x000000013F640000-0x000000013F994000-memory.dmp upx C:\Windows\system\RmHREAn.exe upx behavioral1/memory/1556-71-0x000000013F320000-0x000000013F674000-memory.dmp upx behavioral1/memory/2632-78-0x000000013F050000-0x000000013F3A4000-memory.dmp upx C:\Windows\system\JrCwfpB.exe upx behavioral1/memory/2956-88-0x000000013FD90000-0x00000001400E4000-memory.dmp upx C:\Windows\system\WUSUpxG.exe upx C:\Windows\system\wZMjHTR.exe upx behavioral1/memory/2780-99-0x000000013FBB0000-0x000000013FF04000-memory.dmp upx behavioral1/memory/2740-85-0x000000013FE90000-0x00000001401E4000-memory.dmp upx C:\Windows\system\JLEAMmU.exe upx behavioral1/memory/2100-73-0x000000013FAB0000-0x000000013FE04000-memory.dmp upx \Windows\system\THRSNhn.exe upx C:\Windows\system\dcevpLs.exe upx \Windows\system\CbhuvHI.exe upx C:\Windows\system\lTPrLec.exe upx C:\Windows\system\rIUqSet.exe upx C:\Windows\system\rOyRkBl.exe upx C:\Windows\system\kaQcDhA.exe upx behavioral1/memory/2752-135-0x000000013FB70000-0x000000013FEC4000-memory.dmp upx behavioral1/memory/2964-139-0x000000013F640000-0x000000013F994000-memory.dmp upx behavioral1/memory/2752-144-0x000000013FB70000-0x000000013FEC4000-memory.dmp upx behavioral1/memory/2600-146-0x000000013F180000-0x000000013F4D4000-memory.dmp upx behavioral1/memory/2560-147-0x000000013F630000-0x000000013F984000-memory.dmp upx behavioral1/memory/2100-148-0x000000013FAB0000-0x000000013FE04000-memory.dmp upx behavioral1/memory/2632-149-0x000000013F050000-0x000000013F3A4000-memory.dmp upx behavioral1/memory/2420-150-0x000000013FF90000-0x00000001402E4000-memory.dmp upx behavioral1/memory/2688-151-0x000000013F650000-0x000000013F9A4000-memory.dmp upx behavioral1/memory/2588-152-0x000000013F490000-0x000000013F7E4000-memory.dmp upx behavioral1/memory/2460-153-0x000000013FBF0000-0x000000013FF44000-memory.dmp upx behavioral1/memory/2964-154-0x000000013F640000-0x000000013F994000-memory.dmp upx behavioral1/memory/1556-155-0x000000013F320000-0x000000013F674000-memory.dmp upx behavioral1/memory/2740-156-0x000000013FE90000-0x00000001401E4000-memory.dmp upx behavioral1/memory/2956-157-0x000000013FD90000-0x00000001400E4000-memory.dmp upx behavioral1/memory/2780-158-0x000000013FBB0000-0x000000013FF04000-memory.dmp upx behavioral1/memory/2752-159-0x000000013FB70000-0x000000013FEC4000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
Processes:
6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exedescription ioc process File created C:\Windows\System\vVfzVod.exe 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe File created C:\Windows\System\edmnucz.exe 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe File created C:\Windows\System\YBoTyCZ.exe 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe File created C:\Windows\System\naOAyYW.exe 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe File created C:\Windows\System\kaQcDhA.exe 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe File created C:\Windows\System\rOyRkBl.exe 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe File created C:\Windows\System\ITnyKRx.exe 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe File created C:\Windows\System\nlJbNPp.exe 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe File created C:\Windows\System\JrCwfpB.exe 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe File created C:\Windows\System\THRSNhn.exe 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe File created C:\Windows\System\rIUqSet.exe 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe File created C:\Windows\System\dcevpLs.exe 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe File created C:\Windows\System\DhijtcR.exe 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe File created C:\Windows\System\oDqixay.exe 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe File created C:\Windows\System\RmHREAn.exe 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe File created C:\Windows\System\JLEAMmU.exe 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe File created C:\Windows\System\WUSUpxG.exe 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe File created C:\Windows\System\lTPrLec.exe 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe File created C:\Windows\System\zBaaARU.exe 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe File created C:\Windows\System\wZMjHTR.exe 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe File created C:\Windows\System\CbhuvHI.exe 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exedescription pid process Token: SeLockMemoryPrivilege 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe Token: SeLockMemoryPrivilege 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exedescription pid process target process PID 2168 wrote to memory of 2600 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe DhijtcR.exe PID 2168 wrote to memory of 2600 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe DhijtcR.exe PID 2168 wrote to memory of 2600 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe DhijtcR.exe PID 2168 wrote to memory of 2100 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe vVfzVod.exe PID 2168 wrote to memory of 2100 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe vVfzVod.exe PID 2168 wrote to memory of 2100 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe vVfzVod.exe PID 2168 wrote to memory of 2560 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe zBaaARU.exe PID 2168 wrote to memory of 2560 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe zBaaARU.exe PID 2168 wrote to memory of 2560 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe zBaaARU.exe PID 2168 wrote to memory of 2632 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe edmnucz.exe PID 2168 wrote to memory of 2632 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe edmnucz.exe PID 2168 wrote to memory of 2632 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe edmnucz.exe PID 2168 wrote to memory of 2420 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe oDqixay.exe PID 2168 wrote to memory of 2420 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe oDqixay.exe PID 2168 wrote to memory of 2420 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe oDqixay.exe PID 2168 wrote to memory of 2688 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe ITnyKRx.exe PID 2168 wrote to memory of 2688 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe ITnyKRx.exe PID 2168 wrote to memory of 2688 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe ITnyKRx.exe PID 2168 wrote to memory of 2588 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe YBoTyCZ.exe PID 2168 wrote to memory of 2588 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe YBoTyCZ.exe PID 2168 wrote to memory of 2588 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe YBoTyCZ.exe PID 2168 wrote to memory of 2460 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe naOAyYW.exe PID 2168 wrote to memory of 2460 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe naOAyYW.exe PID 2168 wrote to memory of 2460 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe naOAyYW.exe PID 2168 wrote to memory of 2964 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe nlJbNPp.exe PID 2168 wrote to memory of 2964 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe nlJbNPp.exe PID 2168 wrote to memory of 2964 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe nlJbNPp.exe PID 2168 wrote to memory of 1556 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe RmHREAn.exe PID 2168 wrote to memory of 1556 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe RmHREAn.exe PID 2168 wrote to memory of 1556 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe RmHREAn.exe PID 2168 wrote to memory of 2740 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe JLEAMmU.exe PID 2168 wrote to memory of 2740 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe JLEAMmU.exe PID 2168 wrote to memory of 2740 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe JLEAMmU.exe PID 2168 wrote to memory of 2956 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe JrCwfpB.exe PID 2168 wrote to memory of 2956 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe JrCwfpB.exe PID 2168 wrote to memory of 2956 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe JrCwfpB.exe PID 2168 wrote to memory of 2752 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe wZMjHTR.exe PID 2168 wrote to memory of 2752 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe wZMjHTR.exe PID 2168 wrote to memory of 2752 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe wZMjHTR.exe PID 2168 wrote to memory of 2780 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe WUSUpxG.exe PID 2168 wrote to memory of 2780 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe WUSUpxG.exe PID 2168 wrote to memory of 2780 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe WUSUpxG.exe PID 2168 wrote to memory of 1372 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe kaQcDhA.exe PID 2168 wrote to memory of 1372 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe kaQcDhA.exe PID 2168 wrote to memory of 1372 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe kaQcDhA.exe PID 2168 wrote to memory of 2128 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe rOyRkBl.exe PID 2168 wrote to memory of 2128 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe rOyRkBl.exe PID 2168 wrote to memory of 2128 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe rOyRkBl.exe PID 2168 wrote to memory of 2656 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe THRSNhn.exe PID 2168 wrote to memory of 2656 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe THRSNhn.exe PID 2168 wrote to memory of 2656 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe THRSNhn.exe PID 2168 wrote to memory of 2756 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe rIUqSet.exe PID 2168 wrote to memory of 2756 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe rIUqSet.exe PID 2168 wrote to memory of 2756 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe rIUqSet.exe PID 2168 wrote to memory of 1948 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe lTPrLec.exe PID 2168 wrote to memory of 1948 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe lTPrLec.exe PID 2168 wrote to memory of 1948 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe lTPrLec.exe PID 2168 wrote to memory of 1844 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe dcevpLs.exe PID 2168 wrote to memory of 1844 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe dcevpLs.exe PID 2168 wrote to memory of 1844 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe dcevpLs.exe PID 2168 wrote to memory of 896 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe CbhuvHI.exe PID 2168 wrote to memory of 896 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe CbhuvHI.exe PID 2168 wrote to memory of 896 2168 6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe CbhuvHI.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\DhijtcR.exeC:\Windows\System\DhijtcR.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\vVfzVod.exeC:\Windows\System\vVfzVod.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\zBaaARU.exeC:\Windows\System\zBaaARU.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\edmnucz.exeC:\Windows\System\edmnucz.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\oDqixay.exeC:\Windows\System\oDqixay.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\ITnyKRx.exeC:\Windows\System\ITnyKRx.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\YBoTyCZ.exeC:\Windows\System\YBoTyCZ.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\naOAyYW.exeC:\Windows\System\naOAyYW.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\nlJbNPp.exeC:\Windows\System\nlJbNPp.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\RmHREAn.exeC:\Windows\System\RmHREAn.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\JLEAMmU.exeC:\Windows\System\JLEAMmU.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\JrCwfpB.exeC:\Windows\System\JrCwfpB.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\wZMjHTR.exeC:\Windows\System\wZMjHTR.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\WUSUpxG.exeC:\Windows\System\WUSUpxG.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\kaQcDhA.exeC:\Windows\System\kaQcDhA.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\rOyRkBl.exeC:\Windows\System\rOyRkBl.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\THRSNhn.exeC:\Windows\System\THRSNhn.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\rIUqSet.exeC:\Windows\System\rIUqSet.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\lTPrLec.exeC:\Windows\System\lTPrLec.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\dcevpLs.exeC:\Windows\System\dcevpLs.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\CbhuvHI.exeC:\Windows\System\CbhuvHI.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\ITnyKRx.exeFilesize
5.9MB
MD5120c86c090b14df209f83d38ff1545f5
SHA166e1fd263e0e84ef7c9b6878227ef6fce2b1dc06
SHA256f67324ec3713615e418f761ad20c355ccccbe1d8e33a8c1f1a4b70f9b85cd382
SHA51220b9de51a24249fd018a4feda94a6d673586d3145107af9619d8f3cf72a2b6e3405dde0e22ea67e37dc8e8819191db956e724e946e9c6a079915f39d867c59a5
-
C:\Windows\system\JLEAMmU.exeFilesize
5.9MB
MD589aa247d55e00258bb8cec5c10b0d8b6
SHA18754b219e92a02a72dfecabe6eb8c006237df5cb
SHA256e12cc7f41e74675b545b3d2515a447ef977be4fa88d9beb702959394600dc612
SHA5129e0ffb6c00392990731394122c59ce513b3d2a63629caaa26f56e1862cb2438fc32d6226694535faf946bb8e03592fe14ee2f12a74e745d31702837fb072dc80
-
C:\Windows\system\JrCwfpB.exeFilesize
5.9MB
MD5ff048b96ea9ec30309150f33365b9f0a
SHA115f32d2432b295a1b2c7dca296bd9307f6a2770b
SHA2562666957c3516e94f31797234a01791dd5b524e9244fb2b78762c8a383194689e
SHA512e1e624aac152c4c472af37114c6291cfdb58f1872bafd862e30dcdcbacfc02e0570e5c0171d1a6740dbd3b84e5aa998a230696e33447c9812cf1ad304ebdcff8
-
C:\Windows\system\RmHREAn.exeFilesize
5.9MB
MD5efa6857bcad5a3488e1bbd8a6bf322be
SHA1cd7072315630722be0d089a03af5ec1ce3b89c10
SHA256610522057f455fe44310abeed55e1ec54917a8016f4a55661dfa9119a12bc281
SHA512e3eb184c478c389818c51c552009db8c11088b81dd4d43f2ba51d8012ec5e936f5fd11b7e6affeb9a43c2d87588985ab82d1346fedfadde656b97f5a6565438f
-
C:\Windows\system\WUSUpxG.exeFilesize
5.9MB
MD55a5588e25c8cd6a507d3e6a7cbd2bd00
SHA137ae20edd234f75aa7840623e73baf8371807ec3
SHA25627853b5c338f60d4f639bcdbd11ce640d4bfc18fb2f6f74cc29c7ed1b5d656d7
SHA51208d15db18ca9904a8a1af8124be24c1eb45d8e1fcce5b7ef4cf37864e74c895294f0fe6c5b83fe75c1bd9cbb43e10126cd75a3f28914617f09a91532611923af
-
C:\Windows\system\YBoTyCZ.exeFilesize
5.9MB
MD51ab78ddeaef03b3ac867f950e96a747d
SHA1dc25713413a18ddc399ef53540372fcdcc6fd706
SHA25696e456ee9f87624074e1a8074701c31560df2f098e5f8f5fd8ce6ebe8354ec31
SHA512916b485237ef5df604e0bbd36d6c6b491f75469327c255ce5ba1e40eda9c12e3e276f46e964d0ea48e329066b7db35b672e4bd2822bbd7f56000c9af39284781
-
C:\Windows\system\dcevpLs.exeFilesize
5.9MB
MD5d9a03a29ee7a36a5848f6bbdcfa2eac5
SHA1f06038877d0ce60b61152deb0cbaad7e27bfc009
SHA2568622a9b5b3df9e8609d4382aab9106d4961e63564ead13df4adff0bb0a79e151
SHA51245b827bee339d27e2227439f4d8fe146b70d76de10097e00305abf1bab9343b25ec3c0de94d3d82bf09fe2a187f2382aa417f927ea417b83f369690becc00bb8
-
C:\Windows\system\edmnucz.exeFilesize
5.9MB
MD5b34998d9e2c8d4b627f0384837633641
SHA1cfcccc502e9526d0e411a8f258082541e9f9b498
SHA25601f419ada3a9123822c3596f270c52b4198b138661e255afa164c80ff9091de5
SHA5128b6203f1c3044364e325d71b4bc6bddf82ea2ce58416604ca9b43c0f7f33b8c5fbd3f4ee77063fb95f0f08e15b80ebe4912fa158c1d76af34cbe8a0d5d492c76
-
C:\Windows\system\kaQcDhA.exeFilesize
5.9MB
MD5ad3c8f46b55718b592e3104ea9623170
SHA14b586890287904588e2fba1e9d7b698a8b2af09a
SHA256cb1f8d37206b1fd14323cb0f71b3752aba9fa858692a6576a58686abc2802c41
SHA512c7804648afba33d60399cac06e044fa6f0a1a883730b1b2727a049dace89a6ebe06bab07a9423f2855118f6133a01b6873e9deff86e5fa33e1427f6cf5107e34
-
C:\Windows\system\lTPrLec.exeFilesize
5.9MB
MD5029c76f3d7c4847db7d653a2c3ba2fd9
SHA19d4767e50cc54d75ee70f245cc50b888702fd6a9
SHA256b4b6aabf2bb3eb13bb5d983ebeee1b3a45f7315cd6a165bb6fc31b79bdefd245
SHA5121e7c6a2f2b6b7c5657fcb84bf45a10f572fe31d64064f4c88fe5a345a77e1438f9a61e6ce224e8b7ad4cbae55fb12e55493916967065270fe12d4222c2545166
-
C:\Windows\system\naOAyYW.exeFilesize
5.9MB
MD5062dbb0fa70354e891f7b68401093817
SHA17d5b9a821740afdb9cae2a4e472d30b90e18f8c5
SHA2565f6081ef236b5c03d72edfa5c2f8176b3cc62a1c20524f71a1aeed5ecf54e6b1
SHA5122bd9a47a230cd6a3e9da8befd17fffb9ed322f27835cce391610c7cbf6523d23aa003a9a41a1d947a5a66d24a0cd9be84e0b0c615632d3decbdd1dcd1ede0f72
-
C:\Windows\system\nlJbNPp.exeFilesize
5.9MB
MD5b70ab076105792c081002a6207c54eb1
SHA120fe8b8c9c3e9aa809c1a4316f8d7c0d7191ce35
SHA2566be1e69f5eb16e0cdd6cfcc6c8418e60c27661a6fcf3ba60154a02ba5472fb62
SHA512bb48321ee148003ac4ff77facdbb65ea23e91203bb46ac30bbacbc9929c23979d0d9806cbb2a16167b944571b8a225779b17e7d08d7154a9ccda1c24241ce1fc
-
C:\Windows\system\oDqixay.exeFilesize
5.9MB
MD50033f7e735c94e6eb32e523bc3bc8d9a
SHA1310a5b0cba2e0d1a9fb20d9e6a3f3438cb4cbdba
SHA256ade5a7dff19c8f7685e4e21dd3bbe38fb77542cf5cc9cbfa55799ba20d3c636c
SHA512571322e8060f5b923ef1482acfeadfcd86f1f43f6658988950ea3c881999cef4d9eb89743929816b8ce29d7c96fa57d458c540d9450ff7d96bca0597701c0367
-
C:\Windows\system\rIUqSet.exeFilesize
5.9MB
MD5fac2c1a611a8da003b99e9ad5c5fd42e
SHA1b73fd638bcc11417d1ce89f0d47a787a0ff4e833
SHA256c672d1f6b7ecad3cf1adc96d72f92f8f9d7ce802eb565967ac27e2ad6cee7ee2
SHA51239a27cb03ec9a7decb3cdfc5327b5377b1a1a1d7fce576102e02ae8aae4922ea73ccbf22521c0f18226267ff919ad43729440f7ac2a2c5ebba725ac1f9b10197
-
C:\Windows\system\rOyRkBl.exeFilesize
5.9MB
MD5f4f2d2f2e94816af5243509a9985e27c
SHA1c2b85370c94f594c4182973fe7b60c9d38dca00b
SHA2560d313b209989672c222ccb43302c20461727dbc5f7f50ae1ec69ea3f9a180da3
SHA512379c06448ac4e907b8ba1bce395ab24fc449c0cfbcd4dd2fe00fb4ba56a677f7843d48d21cf38b410a98fddd34dd97b13df0132abaf7657e730aaae7b8bd7674
-
C:\Windows\system\vVfzVod.exeFilesize
5.9MB
MD5a4b4ce7f6a24ca8c53a187f0d5a1be3b
SHA11a7a2326167068dbf2d284566210348133be4ce5
SHA256cb2226c3da70b66c33902da47c348940da611430d6fb418cb0b90c609c4f1f0d
SHA512517af6dc34efa179d86a7e84f9f05a8ee64f315420b6fe8c0d54be9ad5b30e1b66a7b4716decbabfc088455172728e3234d4a3502edd53237424b961b48b3383
-
C:\Windows\system\wZMjHTR.exeFilesize
5.9MB
MD58487324e882fa116681ca454d6412513
SHA1eb70d9bea8e77a1c97545c0b8b2d216d1b8865b2
SHA256940658f55049c4459b89a144973dd4825354cac60972e7b9b9cd1852b2290023
SHA512e5850114542ab5d2a326ed3cd6ca95cd3e76bd7581d60aaee31e0fdbf4c560e928ba35d6e0bdceede49996db1fef1cf6eb7ee4904d90f15cad22ce804f6fc9ac
-
C:\Windows\system\zBaaARU.exeFilesize
5.9MB
MD5ac60f25a8e3a6ef95f1d6a1201ff2648
SHA168a8025b6cddf85ea86c6495c8c7fa0cbca8e6cf
SHA256d1bae82d4010e29004db0f389f0e2bab47e7f09327570c5c888b2f9a8aadd0e1
SHA5128663decf22fa663d87d2afe2afd2c19e85828448f64b81976fe19bb18937b81345aaccba6aa186a03df3d9d8e0e99b07bef9b51c25d38ad0e58646ec1ebb0f56
-
\Windows\system\CbhuvHI.exeFilesize
5.9MB
MD5e1b9097fa090f5bd8dd7656eeaee6f55
SHA16b595ac689befb2f4f34e0a2dedb22e4990700cb
SHA2560f7040054a2924bbe35afeed1963e3519f006ce575f800c856949c7670461ee2
SHA51207a6907125ae460280e6af88283ce287b4b0832c14ea904e5644104fa4476d25b9023aa278ea57b4f36e25c80573463ac8733d1cef9557b8217b7fe424fb52ab
-
\Windows\system\DhijtcR.exeFilesize
5.9MB
MD501b9979c5e2aa78d89b1499d746d4287
SHA1fdfd6765cc001662e2b32550ce8b240fbc81ba27
SHA256f5e0f56cf984fc148553604b9df5f0f7d7fce5bd4d46d629083f9e55a4ef1467
SHA5120936d5d38817644f4a0f2f3f339bfc772cc099d6aa376bddf30dd366ba9781857a48284b5d76a927c2b9437ba43673eb2d00d72003c46d198bae6df225aee718
-
\Windows\system\THRSNhn.exeFilesize
5.9MB
MD53c6c6c5a1643eeaca7572cee8bf28748
SHA1699850b78dae281bddd4b9c501bd6d8309a7c421
SHA256d1e5650b1ef8e5db5506a502cf42a91744aa6ad1bf3bbf02ff077da8839ce039
SHA5123dbc7aca265e983770fd502e8f8c28cd25b708faecd824d501b5453ceb5a0fbbe50e6d59b2d5edd9b82c37c5799996b4c1da1e198a277b6fbe33fd48718c54cc
-
memory/1556-71-0x000000013F320000-0x000000013F674000-memory.dmpFilesize
3.3MB
-
memory/1556-155-0x000000013F320000-0x000000013F674000-memory.dmpFilesize
3.3MB
-
memory/2100-73-0x000000013FAB0000-0x000000013FE04000-memory.dmpFilesize
3.3MB
-
memory/2100-20-0x000000013FAB0000-0x000000013FE04000-memory.dmpFilesize
3.3MB
-
memory/2100-148-0x000000013FAB0000-0x000000013FE04000-memory.dmpFilesize
3.3MB
-
memory/2168-93-0x000000013FB70000-0x000000013FEC4000-memory.dmpFilesize
3.3MB
-
memory/2168-70-0x00000000023C0000-0x0000000002714000-memory.dmpFilesize
3.3MB
-
memory/2168-1-0x0000000000180000-0x0000000000190000-memory.dmpFilesize
64KB
-
memory/2168-145-0x000000013F9D0000-0x000000013FD24000-memory.dmpFilesize
3.3MB
-
memory/2168-143-0x000000013FBB0000-0x000000013FF04000-memory.dmpFilesize
3.3MB
-
memory/2168-56-0x000000013F480000-0x000000013F7D4000-memory.dmpFilesize
3.3MB
-
memory/2168-86-0x000000013F050000-0x000000013F3A4000-memory.dmpFilesize
3.3MB
-
memory/2168-142-0x000000013FB70000-0x000000013FEC4000-memory.dmpFilesize
3.3MB
-
memory/2168-141-0x000000013FD90000-0x00000001400E4000-memory.dmpFilesize
3.3MB
-
memory/2168-49-0x00000000023C0000-0x0000000002714000-memory.dmpFilesize
3.3MB
-
memory/2168-140-0x000000013FE90000-0x00000001401E4000-memory.dmpFilesize
3.3MB
-
memory/2168-98-0x000000013FBB0000-0x000000013FF04000-memory.dmpFilesize
3.3MB
-
memory/2168-0-0x000000013F480000-0x000000013F7D4000-memory.dmpFilesize
3.3MB
-
memory/2168-87-0x000000013FD90000-0x00000001400E4000-memory.dmpFilesize
3.3MB
-
memory/2168-138-0x00000000023C0000-0x0000000002714000-memory.dmpFilesize
3.3MB
-
memory/2168-83-0x000000013FE90000-0x00000001401E4000-memory.dmpFilesize
3.3MB
-
memory/2168-36-0x000000013FF90000-0x00000001402E4000-memory.dmpFilesize
3.3MB
-
memory/2168-137-0x000000013F9D0000-0x000000013FD24000-memory.dmpFilesize
3.3MB
-
memory/2168-62-0x00000000023C0000-0x0000000002714000-memory.dmpFilesize
3.3MB
-
memory/2168-42-0x00000000023C0000-0x0000000002714000-memory.dmpFilesize
3.3MB
-
memory/2168-8-0x00000000023C0000-0x0000000002714000-memory.dmpFilesize
3.3MB
-
memory/2168-16-0x000000013FAB0000-0x000000013FE04000-memory.dmpFilesize
3.3MB
-
memory/2168-17-0x00000000023C0000-0x0000000002714000-memory.dmpFilesize
3.3MB
-
memory/2420-150-0x000000013FF90000-0x00000001402E4000-memory.dmpFilesize
3.3MB
-
memory/2420-40-0x000000013FF90000-0x00000001402E4000-memory.dmpFilesize
3.3MB
-
memory/2460-153-0x000000013FBF0000-0x000000013FF44000-memory.dmpFilesize
3.3MB
-
memory/2460-57-0x000000013FBF0000-0x000000013FF44000-memory.dmpFilesize
3.3MB
-
memory/2560-22-0x000000013F630000-0x000000013F984000-memory.dmpFilesize
3.3MB
-
memory/2560-147-0x000000013F630000-0x000000013F984000-memory.dmpFilesize
3.3MB
-
memory/2588-152-0x000000013F490000-0x000000013F7E4000-memory.dmpFilesize
3.3MB
-
memory/2588-51-0x000000013F490000-0x000000013F7E4000-memory.dmpFilesize
3.3MB
-
memory/2600-12-0x000000013F180000-0x000000013F4D4000-memory.dmpFilesize
3.3MB
-
memory/2600-146-0x000000013F180000-0x000000013F4D4000-memory.dmpFilesize
3.3MB
-
memory/2632-149-0x000000013F050000-0x000000013F3A4000-memory.dmpFilesize
3.3MB
-
memory/2632-78-0x000000013F050000-0x000000013F3A4000-memory.dmpFilesize
3.3MB
-
memory/2632-28-0x000000013F050000-0x000000013F3A4000-memory.dmpFilesize
3.3MB
-
memory/2688-151-0x000000013F650000-0x000000013F9A4000-memory.dmpFilesize
3.3MB
-
memory/2688-43-0x000000013F650000-0x000000013F9A4000-memory.dmpFilesize
3.3MB
-
memory/2740-156-0x000000013FE90000-0x00000001401E4000-memory.dmpFilesize
3.3MB
-
memory/2740-85-0x000000013FE90000-0x00000001401E4000-memory.dmpFilesize
3.3MB
-
memory/2752-135-0x000000013FB70000-0x000000013FEC4000-memory.dmpFilesize
3.3MB
-
memory/2752-144-0x000000013FB70000-0x000000013FEC4000-memory.dmpFilesize
3.3MB
-
memory/2752-159-0x000000013FB70000-0x000000013FEC4000-memory.dmpFilesize
3.3MB
-
memory/2780-99-0x000000013FBB0000-0x000000013FF04000-memory.dmpFilesize
3.3MB
-
memory/2780-158-0x000000013FBB0000-0x000000013FF04000-memory.dmpFilesize
3.3MB
-
memory/2956-88-0x000000013FD90000-0x00000001400E4000-memory.dmpFilesize
3.3MB
-
memory/2956-157-0x000000013FD90000-0x00000001400E4000-memory.dmpFilesize
3.3MB
-
memory/2964-139-0x000000013F640000-0x000000013F994000-memory.dmpFilesize
3.3MB
-
memory/2964-154-0x000000013F640000-0x000000013F994000-memory.dmpFilesize
3.3MB
-
memory/2964-64-0x000000013F640000-0x000000013F994000-memory.dmpFilesize
3.3MB