Analysis

  • max time kernel
    138s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 05:15

General

  • Target

    6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe

  • Size

    5.9MB

  • MD5

    6d7129dd5d04eeb2bf161eb054273b34

  • SHA1

    fc9f96c5dc9f00c15340da8c8b2eae7d298fbc50

  • SHA256

    4ecb5d0ca7be12d9bafdafd7819f6005b23bcf57860eee5477cb2cbac31ed2d1

  • SHA512

    99fc38762708736aeaeceb810c4dc10702dcad025b7b62558e7fe4f2a9533783bf32c181358e35578f2a46435bff09bc21b4a680f1000476cb63427cdd9c4a1b

  • SSDEEP

    98304:demTLkNdfE0pZ3u56utgpPFotBER/mQ32lUl:E+b56utgpPF8u/7l

Malware Config

Extracted

Family

cobaltstrike

Botnet

0

C2

http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

Attributes
  • access_type

    512

  • beacon_type

    256

  • create_remote_thread

    768

  • crypto_scheme

    256

  • host

    ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

  • http_header1

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==

  • http_method1

    GET

  • http_method2

    POST

  • maxdns

    255

  • pipe_name

    \\%s\pipe\msagent_%x

  • polling_time

    5000

  • port_number

    443

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /N4215/adj/amzn.us.sr.aps

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko

  • watermark

    0

Signatures

  • Cobalt Strike reflective loader 21 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 58 IoCs
  • Executes dropped EXE 21 IoCs
  • Loads dropped DLL 21 IoCs
  • UPX packed file 55 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6d7129dd5d04eeb2bf161eb054273b34_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Windows\System\DhijtcR.exe
      C:\Windows\System\DhijtcR.exe
      2⤵
      • Executes dropped EXE
      PID:2600
    • C:\Windows\System\vVfzVod.exe
      C:\Windows\System\vVfzVod.exe
      2⤵
      • Executes dropped EXE
      PID:2100
    • C:\Windows\System\zBaaARU.exe
      C:\Windows\System\zBaaARU.exe
      2⤵
      • Executes dropped EXE
      PID:2560
    • C:\Windows\System\edmnucz.exe
      C:\Windows\System\edmnucz.exe
      2⤵
      • Executes dropped EXE
      PID:2632
    • C:\Windows\System\oDqixay.exe
      C:\Windows\System\oDqixay.exe
      2⤵
      • Executes dropped EXE
      PID:2420
    • C:\Windows\System\ITnyKRx.exe
      C:\Windows\System\ITnyKRx.exe
      2⤵
      • Executes dropped EXE
      PID:2688
    • C:\Windows\System\YBoTyCZ.exe
      C:\Windows\System\YBoTyCZ.exe
      2⤵
      • Executes dropped EXE
      PID:2588
    • C:\Windows\System\naOAyYW.exe
      C:\Windows\System\naOAyYW.exe
      2⤵
      • Executes dropped EXE
      PID:2460
    • C:\Windows\System\nlJbNPp.exe
      C:\Windows\System\nlJbNPp.exe
      2⤵
      • Executes dropped EXE
      PID:2964
    • C:\Windows\System\RmHREAn.exe
      C:\Windows\System\RmHREAn.exe
      2⤵
      • Executes dropped EXE
      PID:1556
    • C:\Windows\System\JLEAMmU.exe
      C:\Windows\System\JLEAMmU.exe
      2⤵
      • Executes dropped EXE
      PID:2740
    • C:\Windows\System\JrCwfpB.exe
      C:\Windows\System\JrCwfpB.exe
      2⤵
      • Executes dropped EXE
      PID:2956
    • C:\Windows\System\wZMjHTR.exe
      C:\Windows\System\wZMjHTR.exe
      2⤵
      • Executes dropped EXE
      PID:2752
    • C:\Windows\System\WUSUpxG.exe
      C:\Windows\System\WUSUpxG.exe
      2⤵
      • Executes dropped EXE
      PID:2780
    • C:\Windows\System\kaQcDhA.exe
      C:\Windows\System\kaQcDhA.exe
      2⤵
      • Executes dropped EXE
      PID:1372
    • C:\Windows\System\rOyRkBl.exe
      C:\Windows\System\rOyRkBl.exe
      2⤵
      • Executes dropped EXE
      PID:2128
    • C:\Windows\System\THRSNhn.exe
      C:\Windows\System\THRSNhn.exe
      2⤵
      • Executes dropped EXE
      PID:2656
    • C:\Windows\System\rIUqSet.exe
      C:\Windows\System\rIUqSet.exe
      2⤵
      • Executes dropped EXE
      PID:2756
    • C:\Windows\System\lTPrLec.exe
      C:\Windows\System\lTPrLec.exe
      2⤵
      • Executes dropped EXE
      PID:1948
    • C:\Windows\System\dcevpLs.exe
      C:\Windows\System\dcevpLs.exe
      2⤵
      • Executes dropped EXE
      PID:1844
    • C:\Windows\System\CbhuvHI.exe
      C:\Windows\System\CbhuvHI.exe
      2⤵
      • Executes dropped EXE
      PID:896

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\system\ITnyKRx.exe
    Filesize

    5.9MB

    MD5

    120c86c090b14df209f83d38ff1545f5

    SHA1

    66e1fd263e0e84ef7c9b6878227ef6fce2b1dc06

    SHA256

    f67324ec3713615e418f761ad20c355ccccbe1d8e33a8c1f1a4b70f9b85cd382

    SHA512

    20b9de51a24249fd018a4feda94a6d673586d3145107af9619d8f3cf72a2b6e3405dde0e22ea67e37dc8e8819191db956e724e946e9c6a079915f39d867c59a5

  • C:\Windows\system\JLEAMmU.exe
    Filesize

    5.9MB

    MD5

    89aa247d55e00258bb8cec5c10b0d8b6

    SHA1

    8754b219e92a02a72dfecabe6eb8c006237df5cb

    SHA256

    e12cc7f41e74675b545b3d2515a447ef977be4fa88d9beb702959394600dc612

    SHA512

    9e0ffb6c00392990731394122c59ce513b3d2a63629caaa26f56e1862cb2438fc32d6226694535faf946bb8e03592fe14ee2f12a74e745d31702837fb072dc80

  • C:\Windows\system\JrCwfpB.exe
    Filesize

    5.9MB

    MD5

    ff048b96ea9ec30309150f33365b9f0a

    SHA1

    15f32d2432b295a1b2c7dca296bd9307f6a2770b

    SHA256

    2666957c3516e94f31797234a01791dd5b524e9244fb2b78762c8a383194689e

    SHA512

    e1e624aac152c4c472af37114c6291cfdb58f1872bafd862e30dcdcbacfc02e0570e5c0171d1a6740dbd3b84e5aa998a230696e33447c9812cf1ad304ebdcff8

  • C:\Windows\system\RmHREAn.exe
    Filesize

    5.9MB

    MD5

    efa6857bcad5a3488e1bbd8a6bf322be

    SHA1

    cd7072315630722be0d089a03af5ec1ce3b89c10

    SHA256

    610522057f455fe44310abeed55e1ec54917a8016f4a55661dfa9119a12bc281

    SHA512

    e3eb184c478c389818c51c552009db8c11088b81dd4d43f2ba51d8012ec5e936f5fd11b7e6affeb9a43c2d87588985ab82d1346fedfadde656b97f5a6565438f

  • C:\Windows\system\WUSUpxG.exe
    Filesize

    5.9MB

    MD5

    5a5588e25c8cd6a507d3e6a7cbd2bd00

    SHA1

    37ae20edd234f75aa7840623e73baf8371807ec3

    SHA256

    27853b5c338f60d4f639bcdbd11ce640d4bfc18fb2f6f74cc29c7ed1b5d656d7

    SHA512

    08d15db18ca9904a8a1af8124be24c1eb45d8e1fcce5b7ef4cf37864e74c895294f0fe6c5b83fe75c1bd9cbb43e10126cd75a3f28914617f09a91532611923af

  • C:\Windows\system\YBoTyCZ.exe
    Filesize

    5.9MB

    MD5

    1ab78ddeaef03b3ac867f950e96a747d

    SHA1

    dc25713413a18ddc399ef53540372fcdcc6fd706

    SHA256

    96e456ee9f87624074e1a8074701c31560df2f098e5f8f5fd8ce6ebe8354ec31

    SHA512

    916b485237ef5df604e0bbd36d6c6b491f75469327c255ce5ba1e40eda9c12e3e276f46e964d0ea48e329066b7db35b672e4bd2822bbd7f56000c9af39284781

  • C:\Windows\system\dcevpLs.exe
    Filesize

    5.9MB

    MD5

    d9a03a29ee7a36a5848f6bbdcfa2eac5

    SHA1

    f06038877d0ce60b61152deb0cbaad7e27bfc009

    SHA256

    8622a9b5b3df9e8609d4382aab9106d4961e63564ead13df4adff0bb0a79e151

    SHA512

    45b827bee339d27e2227439f4d8fe146b70d76de10097e00305abf1bab9343b25ec3c0de94d3d82bf09fe2a187f2382aa417f927ea417b83f369690becc00bb8

  • C:\Windows\system\edmnucz.exe
    Filesize

    5.9MB

    MD5

    b34998d9e2c8d4b627f0384837633641

    SHA1

    cfcccc502e9526d0e411a8f258082541e9f9b498

    SHA256

    01f419ada3a9123822c3596f270c52b4198b138661e255afa164c80ff9091de5

    SHA512

    8b6203f1c3044364e325d71b4bc6bddf82ea2ce58416604ca9b43c0f7f33b8c5fbd3f4ee77063fb95f0f08e15b80ebe4912fa158c1d76af34cbe8a0d5d492c76

  • C:\Windows\system\kaQcDhA.exe
    Filesize

    5.9MB

    MD5

    ad3c8f46b55718b592e3104ea9623170

    SHA1

    4b586890287904588e2fba1e9d7b698a8b2af09a

    SHA256

    cb1f8d37206b1fd14323cb0f71b3752aba9fa858692a6576a58686abc2802c41

    SHA512

    c7804648afba33d60399cac06e044fa6f0a1a883730b1b2727a049dace89a6ebe06bab07a9423f2855118f6133a01b6873e9deff86e5fa33e1427f6cf5107e34

  • C:\Windows\system\lTPrLec.exe
    Filesize

    5.9MB

    MD5

    029c76f3d7c4847db7d653a2c3ba2fd9

    SHA1

    9d4767e50cc54d75ee70f245cc50b888702fd6a9

    SHA256

    b4b6aabf2bb3eb13bb5d983ebeee1b3a45f7315cd6a165bb6fc31b79bdefd245

    SHA512

    1e7c6a2f2b6b7c5657fcb84bf45a10f572fe31d64064f4c88fe5a345a77e1438f9a61e6ce224e8b7ad4cbae55fb12e55493916967065270fe12d4222c2545166

  • C:\Windows\system\naOAyYW.exe
    Filesize

    5.9MB

    MD5

    062dbb0fa70354e891f7b68401093817

    SHA1

    7d5b9a821740afdb9cae2a4e472d30b90e18f8c5

    SHA256

    5f6081ef236b5c03d72edfa5c2f8176b3cc62a1c20524f71a1aeed5ecf54e6b1

    SHA512

    2bd9a47a230cd6a3e9da8befd17fffb9ed322f27835cce391610c7cbf6523d23aa003a9a41a1d947a5a66d24a0cd9be84e0b0c615632d3decbdd1dcd1ede0f72

  • C:\Windows\system\nlJbNPp.exe
    Filesize

    5.9MB

    MD5

    b70ab076105792c081002a6207c54eb1

    SHA1

    20fe8b8c9c3e9aa809c1a4316f8d7c0d7191ce35

    SHA256

    6be1e69f5eb16e0cdd6cfcc6c8418e60c27661a6fcf3ba60154a02ba5472fb62

    SHA512

    bb48321ee148003ac4ff77facdbb65ea23e91203bb46ac30bbacbc9929c23979d0d9806cbb2a16167b944571b8a225779b17e7d08d7154a9ccda1c24241ce1fc

  • C:\Windows\system\oDqixay.exe
    Filesize

    5.9MB

    MD5

    0033f7e735c94e6eb32e523bc3bc8d9a

    SHA1

    310a5b0cba2e0d1a9fb20d9e6a3f3438cb4cbdba

    SHA256

    ade5a7dff19c8f7685e4e21dd3bbe38fb77542cf5cc9cbfa55799ba20d3c636c

    SHA512

    571322e8060f5b923ef1482acfeadfcd86f1f43f6658988950ea3c881999cef4d9eb89743929816b8ce29d7c96fa57d458c540d9450ff7d96bca0597701c0367

  • C:\Windows\system\rIUqSet.exe
    Filesize

    5.9MB

    MD5

    fac2c1a611a8da003b99e9ad5c5fd42e

    SHA1

    b73fd638bcc11417d1ce89f0d47a787a0ff4e833

    SHA256

    c672d1f6b7ecad3cf1adc96d72f92f8f9d7ce802eb565967ac27e2ad6cee7ee2

    SHA512

    39a27cb03ec9a7decb3cdfc5327b5377b1a1a1d7fce576102e02ae8aae4922ea73ccbf22521c0f18226267ff919ad43729440f7ac2a2c5ebba725ac1f9b10197

  • C:\Windows\system\rOyRkBl.exe
    Filesize

    5.9MB

    MD5

    f4f2d2f2e94816af5243509a9985e27c

    SHA1

    c2b85370c94f594c4182973fe7b60c9d38dca00b

    SHA256

    0d313b209989672c222ccb43302c20461727dbc5f7f50ae1ec69ea3f9a180da3

    SHA512

    379c06448ac4e907b8ba1bce395ab24fc449c0cfbcd4dd2fe00fb4ba56a677f7843d48d21cf38b410a98fddd34dd97b13df0132abaf7657e730aaae7b8bd7674

  • C:\Windows\system\vVfzVod.exe
    Filesize

    5.9MB

    MD5

    a4b4ce7f6a24ca8c53a187f0d5a1be3b

    SHA1

    1a7a2326167068dbf2d284566210348133be4ce5

    SHA256

    cb2226c3da70b66c33902da47c348940da611430d6fb418cb0b90c609c4f1f0d

    SHA512

    517af6dc34efa179d86a7e84f9f05a8ee64f315420b6fe8c0d54be9ad5b30e1b66a7b4716decbabfc088455172728e3234d4a3502edd53237424b961b48b3383

  • C:\Windows\system\wZMjHTR.exe
    Filesize

    5.9MB

    MD5

    8487324e882fa116681ca454d6412513

    SHA1

    eb70d9bea8e77a1c97545c0b8b2d216d1b8865b2

    SHA256

    940658f55049c4459b89a144973dd4825354cac60972e7b9b9cd1852b2290023

    SHA512

    e5850114542ab5d2a326ed3cd6ca95cd3e76bd7581d60aaee31e0fdbf4c560e928ba35d6e0bdceede49996db1fef1cf6eb7ee4904d90f15cad22ce804f6fc9ac

  • C:\Windows\system\zBaaARU.exe
    Filesize

    5.9MB

    MD5

    ac60f25a8e3a6ef95f1d6a1201ff2648

    SHA1

    68a8025b6cddf85ea86c6495c8c7fa0cbca8e6cf

    SHA256

    d1bae82d4010e29004db0f389f0e2bab47e7f09327570c5c888b2f9a8aadd0e1

    SHA512

    8663decf22fa663d87d2afe2afd2c19e85828448f64b81976fe19bb18937b81345aaccba6aa186a03df3d9d8e0e99b07bef9b51c25d38ad0e58646ec1ebb0f56

  • \Windows\system\CbhuvHI.exe
    Filesize

    5.9MB

    MD5

    e1b9097fa090f5bd8dd7656eeaee6f55

    SHA1

    6b595ac689befb2f4f34e0a2dedb22e4990700cb

    SHA256

    0f7040054a2924bbe35afeed1963e3519f006ce575f800c856949c7670461ee2

    SHA512

    07a6907125ae460280e6af88283ce287b4b0832c14ea904e5644104fa4476d25b9023aa278ea57b4f36e25c80573463ac8733d1cef9557b8217b7fe424fb52ab

  • \Windows\system\DhijtcR.exe
    Filesize

    5.9MB

    MD5

    01b9979c5e2aa78d89b1499d746d4287

    SHA1

    fdfd6765cc001662e2b32550ce8b240fbc81ba27

    SHA256

    f5e0f56cf984fc148553604b9df5f0f7d7fce5bd4d46d629083f9e55a4ef1467

    SHA512

    0936d5d38817644f4a0f2f3f339bfc772cc099d6aa376bddf30dd366ba9781857a48284b5d76a927c2b9437ba43673eb2d00d72003c46d198bae6df225aee718

  • \Windows\system\THRSNhn.exe
    Filesize

    5.9MB

    MD5

    3c6c6c5a1643eeaca7572cee8bf28748

    SHA1

    699850b78dae281bddd4b9c501bd6d8309a7c421

    SHA256

    d1e5650b1ef8e5db5506a502cf42a91744aa6ad1bf3bbf02ff077da8839ce039

    SHA512

    3dbc7aca265e983770fd502e8f8c28cd25b708faecd824d501b5453ceb5a0fbbe50e6d59b2d5edd9b82c37c5799996b4c1da1e198a277b6fbe33fd48718c54cc

  • memory/1556-71-0x000000013F320000-0x000000013F674000-memory.dmp
    Filesize

    3.3MB

  • memory/1556-155-0x000000013F320000-0x000000013F674000-memory.dmp
    Filesize

    3.3MB

  • memory/2100-73-0x000000013FAB0000-0x000000013FE04000-memory.dmp
    Filesize

    3.3MB

  • memory/2100-20-0x000000013FAB0000-0x000000013FE04000-memory.dmp
    Filesize

    3.3MB

  • memory/2100-148-0x000000013FAB0000-0x000000013FE04000-memory.dmp
    Filesize

    3.3MB

  • memory/2168-93-0x000000013FB70000-0x000000013FEC4000-memory.dmp
    Filesize

    3.3MB

  • memory/2168-70-0x00000000023C0000-0x0000000002714000-memory.dmp
    Filesize

    3.3MB

  • memory/2168-1-0x0000000000180000-0x0000000000190000-memory.dmp
    Filesize

    64KB

  • memory/2168-145-0x000000013F9D0000-0x000000013FD24000-memory.dmp
    Filesize

    3.3MB

  • memory/2168-143-0x000000013FBB0000-0x000000013FF04000-memory.dmp
    Filesize

    3.3MB

  • memory/2168-56-0x000000013F480000-0x000000013F7D4000-memory.dmp
    Filesize

    3.3MB

  • memory/2168-86-0x000000013F050000-0x000000013F3A4000-memory.dmp
    Filesize

    3.3MB

  • memory/2168-142-0x000000013FB70000-0x000000013FEC4000-memory.dmp
    Filesize

    3.3MB

  • memory/2168-141-0x000000013FD90000-0x00000001400E4000-memory.dmp
    Filesize

    3.3MB

  • memory/2168-49-0x00000000023C0000-0x0000000002714000-memory.dmp
    Filesize

    3.3MB

  • memory/2168-140-0x000000013FE90000-0x00000001401E4000-memory.dmp
    Filesize

    3.3MB

  • memory/2168-98-0x000000013FBB0000-0x000000013FF04000-memory.dmp
    Filesize

    3.3MB

  • memory/2168-0-0x000000013F480000-0x000000013F7D4000-memory.dmp
    Filesize

    3.3MB

  • memory/2168-87-0x000000013FD90000-0x00000001400E4000-memory.dmp
    Filesize

    3.3MB

  • memory/2168-138-0x00000000023C0000-0x0000000002714000-memory.dmp
    Filesize

    3.3MB

  • memory/2168-83-0x000000013FE90000-0x00000001401E4000-memory.dmp
    Filesize

    3.3MB

  • memory/2168-36-0x000000013FF90000-0x00000001402E4000-memory.dmp
    Filesize

    3.3MB

  • memory/2168-137-0x000000013F9D0000-0x000000013FD24000-memory.dmp
    Filesize

    3.3MB

  • memory/2168-62-0x00000000023C0000-0x0000000002714000-memory.dmp
    Filesize

    3.3MB

  • memory/2168-42-0x00000000023C0000-0x0000000002714000-memory.dmp
    Filesize

    3.3MB

  • memory/2168-8-0x00000000023C0000-0x0000000002714000-memory.dmp
    Filesize

    3.3MB

  • memory/2168-16-0x000000013FAB0000-0x000000013FE04000-memory.dmp
    Filesize

    3.3MB

  • memory/2168-17-0x00000000023C0000-0x0000000002714000-memory.dmp
    Filesize

    3.3MB

  • memory/2420-150-0x000000013FF90000-0x00000001402E4000-memory.dmp
    Filesize

    3.3MB

  • memory/2420-40-0x000000013FF90000-0x00000001402E4000-memory.dmp
    Filesize

    3.3MB

  • memory/2460-153-0x000000013FBF0000-0x000000013FF44000-memory.dmp
    Filesize

    3.3MB

  • memory/2460-57-0x000000013FBF0000-0x000000013FF44000-memory.dmp
    Filesize

    3.3MB

  • memory/2560-22-0x000000013F630000-0x000000013F984000-memory.dmp
    Filesize

    3.3MB

  • memory/2560-147-0x000000013F630000-0x000000013F984000-memory.dmp
    Filesize

    3.3MB

  • memory/2588-152-0x000000013F490000-0x000000013F7E4000-memory.dmp
    Filesize

    3.3MB

  • memory/2588-51-0x000000013F490000-0x000000013F7E4000-memory.dmp
    Filesize

    3.3MB

  • memory/2600-12-0x000000013F180000-0x000000013F4D4000-memory.dmp
    Filesize

    3.3MB

  • memory/2600-146-0x000000013F180000-0x000000013F4D4000-memory.dmp
    Filesize

    3.3MB

  • memory/2632-149-0x000000013F050000-0x000000013F3A4000-memory.dmp
    Filesize

    3.3MB

  • memory/2632-78-0x000000013F050000-0x000000013F3A4000-memory.dmp
    Filesize

    3.3MB

  • memory/2632-28-0x000000013F050000-0x000000013F3A4000-memory.dmp
    Filesize

    3.3MB

  • memory/2688-151-0x000000013F650000-0x000000013F9A4000-memory.dmp
    Filesize

    3.3MB

  • memory/2688-43-0x000000013F650000-0x000000013F9A4000-memory.dmp
    Filesize

    3.3MB

  • memory/2740-156-0x000000013FE90000-0x00000001401E4000-memory.dmp
    Filesize

    3.3MB

  • memory/2740-85-0x000000013FE90000-0x00000001401E4000-memory.dmp
    Filesize

    3.3MB

  • memory/2752-135-0x000000013FB70000-0x000000013FEC4000-memory.dmp
    Filesize

    3.3MB

  • memory/2752-144-0x000000013FB70000-0x000000013FEC4000-memory.dmp
    Filesize

    3.3MB

  • memory/2752-159-0x000000013FB70000-0x000000013FEC4000-memory.dmp
    Filesize

    3.3MB

  • memory/2780-99-0x000000013FBB0000-0x000000013FF04000-memory.dmp
    Filesize

    3.3MB

  • memory/2780-158-0x000000013FBB0000-0x000000013FF04000-memory.dmp
    Filesize

    3.3MB

  • memory/2956-88-0x000000013FD90000-0x00000001400E4000-memory.dmp
    Filesize

    3.3MB

  • memory/2956-157-0x000000013FD90000-0x00000001400E4000-memory.dmp
    Filesize

    3.3MB

  • memory/2964-139-0x000000013F640000-0x000000013F994000-memory.dmp
    Filesize

    3.3MB

  • memory/2964-154-0x000000013F640000-0x000000013F994000-memory.dmp
    Filesize

    3.3MB

  • memory/2964-64-0x000000013F640000-0x000000013F994000-memory.dmp
    Filesize

    3.3MB