Analysis
-
max time kernel
148s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 16:50
Static task
static1
Behavioral task
behavioral1
Sample
a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe
-
Size
163KB
-
MD5
a6961f695783bdf9b602551df545cbcd
-
SHA1
9d6f35b80e752f24f28821979f164532f46b6ad6
-
SHA256
99cd6c5bf2a0bccc76155ae1270c6c65aee26f07373886b90818e43d2947ce98
-
SHA512
9707707a92b9f158f2130362997f86ba0c77160dd19e4a60046566614806a096229d827ff376b819c107ecdec6e0808c8b63f5e38a4986f8cd78601a97dcb4ef
-
SSDEEP
3072:89JwqAaNrrDLrX7g5lRaBdMn67iCUF1sDpCUF1sD1L:8HwqAIfrylR+K6EF1sDDF1sD
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RsTray.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rsnetsvr.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NPFMntor.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQDoctorMain.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KASTask.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UpLive.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kwatch.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SysSafe.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQSC.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SDGames.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rpt.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CCenter.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\isPwdSvc.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatch9x.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcconsol.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\799d.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SmartUp.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SREngPS.EXE\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\jisu.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVPF.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KASTask.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KPFW32X.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ArSwp3.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVScan.kxp\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxFwHlp.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KRepair.com\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Wsyscheck.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32kui.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccSvcHst.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatch9x.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcconsol.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\scan32.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMonD.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ravcopy.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AntiU.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvwsc.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvXP.kxp explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32krn.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SmartUp.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxPol.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kissvc.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AgentSvr.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KASMain.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatch.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\loaddll.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\servet.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\runiep.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxAgent.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxCfg.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\niu.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tmp.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvDetect.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvolself.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ArSwp.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\logogo.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KMFilter.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TNT.Exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\av.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvastU3.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAV32.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pagefile.pif\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\arswp3.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tmp.exe\Debugger = "ntsd -d" explorer.exe -
Drops startup file 1 IoCs
Processes:
explorer.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1681.lnk explorer.exe -
Executes dropped EXE 1 IoCs
Processes:
explorer.exepid process 2420 explorer.exe -
Loads dropped DLL 2 IoCs
Processes:
explorer.exepid process 2420 explorer.exe 2420 explorer.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" explorer.exe -
Enumerates connected drives 3 TTPs 42 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
explorer.exea6961f695783bdf9b602551df545cbcd_JaffaCakes118.exedescription ioc process File opened (read-only) \??\e: explorer.exe File opened (read-only) \??\k: explorer.exe File opened (read-only) \??\q: explorer.exe File opened (read-only) \??\k: a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe File opened (read-only) \??\l: a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe File opened (read-only) \??\n: a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe File opened (read-only) \??\v: a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe File opened (read-only) \??\j: explorer.exe File opened (read-only) \??\h: a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe File opened (read-only) \??\j: a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe File opened (read-only) \??\q: a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe File opened (read-only) \??\s: a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe File opened (read-only) \??\w: a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe File opened (read-only) \??\y: a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe File opened (read-only) \??\o: explorer.exe File opened (read-only) \??\x: explorer.exe File opened (read-only) \??\l: explorer.exe File opened (read-only) \??\p: explorer.exe File opened (read-only) \??\r: explorer.exe File opened (read-only) \??\e: a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe File opened (read-only) \??\t: a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe File opened (read-only) \??\z: a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe File opened (read-only) \??\g: explorer.exe File opened (read-only) \??\h: explorer.exe File opened (read-only) \??\s: explorer.exe File opened (read-only) \??\t: explorer.exe File opened (read-only) \??\u: explorer.exe File opened (read-only) \??\v: explorer.exe File opened (read-only) \??\w: explorer.exe File opened (read-only) \??\g: a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe File opened (read-only) \??\r: a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe File opened (read-only) \??\u: a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe File opened (read-only) \??\m: explorer.exe File opened (read-only) \??\n: explorer.exe File opened (read-only) \??\i: a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe File opened (read-only) \??\m: a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe File opened (read-only) \??\p: a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe File opened (read-only) \??\i: explorer.exe File opened (read-only) \??\y: explorer.exe File opened (read-only) \??\o: a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe File opened (read-only) \??\x: a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe File opened (read-only) \??\z: explorer.exe -
Drops file in Program Files directory 6 IoCs
Processes:
a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exeexplorer.exedescription ioc process File created C:\Program Files (x86)\Common Files\Microsoft Shared\explorer.exe a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\explorer.exe a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\uiui8.dll explorer.exe File created C:\Program Files (x86)\Common Files\uiui8.dll explorer.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\explorer.exe explorer.exe File opened for modification C:\Program Files (x86)\Common Files explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exeexplorer.exepid process 4712 a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe 4712 a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe 2420 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
explorer.exedescription pid process Token: SeDebugPrivilege 2420 explorer.exe Token: SeDebugPrivilege 2420 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
explorer.exepid process 2420 explorer.exe 2420 explorer.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exedescription pid process target process PID 4712 wrote to memory of 2420 4712 a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe explorer.exe PID 4712 wrote to memory of 2420 4712 a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe explorer.exe PID 4712 wrote to memory of 2420 4712 a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a6961f695783bdf9b602551df545cbcd_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Common Files\Microsoft Shared\explorer.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\explorer.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Sets file execution options in registry
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Enumerates connected drives
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Common Files\Microsoft Shared\explorer.exeFilesize
163KB
MD5a6961f695783bdf9b602551df545cbcd
SHA19d6f35b80e752f24f28821979f164532f46b6ad6
SHA25699cd6c5bf2a0bccc76155ae1270c6c65aee26f07373886b90818e43d2947ce98
SHA5129707707a92b9f158f2130362997f86ba0c77160dd19e4a60046566614806a096229d827ff376b819c107ecdec6e0808c8b63f5e38a4986f8cd78601a97dcb4ef
-
C:\Program Files (x86)\Common Files\uiui8.dllFilesize
17KB
MD50cbc6b0568209d4ed0a0ff71db4fd13c
SHA18a7166784536e6ebe718d82667d2314c42938387
SHA256d52d74da5230180634f0459f228202dc876c1c2a5661badd170f8308061f1a60
SHA5124494eb6b4a1363b06b25bcf3504517279dbf99bc35ffc95d98e5f55804148ed1fbc68e99295fbc2971abb6f58d945e0e8d0f17e0e7f7bf9aa746486a580fc343
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\1681.lnkFilesize
449B
MD5ae342318b288719168082ba3f26d8e33
SHA10464e616edc87b677de3e514a5e5baf696ac92ec
SHA256331939a00efce9cab0dc7e690b7be7de0e3d2378f7ea48640bc80ead177332ec
SHA5122e7d224df58bdc39395208fae51726c6d7eff76752c1fdc746da3294b159c1b6fbc9440354ff935c41b2d18d6734cfcc6c18fb726b78fc7d73d870a32cebda34
-
memory/2420-43-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/2420-52-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/2420-29-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/2420-34-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/2420-38-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/2420-88-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/2420-47-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/2420-30-0x0000000000590000-0x000000000059B000-memory.dmpFilesize
44KB
-
memory/2420-56-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/2420-61-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/2420-65-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/2420-70-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/2420-75-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/2420-79-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/2420-83-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/4712-23-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB