Overview
overview
10Static
static
32239fcbdac...18.exe
windows7-x64
102239fcbdac...18.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3Setup.exe
windows7-x64
10Setup.exe
windows10-2004-x64
10Setupres.exe
windows7-x64
9Setupres.exe
windows10-2004-x64
9ipras.vbs
windows7-x64
8ipras.vbs
windows10-2004-x64
8Analysis
-
max time kernel
146s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 23:36
Static task
static1
Behavioral task
behavioral1
Sample
2239fcbdac9582e1a379dc39ca1e4dd1_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2239fcbdac9582e1a379dc39ca1e4dd1_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
Setup.exe
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
Setup.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral15
Sample
Setupres.exe
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
Setupres.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral17
Sample
ipras.vbs
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
ipras.vbs
Resource
win10v2004-20240419-en
General
-
Target
2239fcbdac9582e1a379dc39ca1e4dd1_JaffaCakes118.exe
-
Size
4.3MB
-
MD5
2239fcbdac9582e1a379dc39ca1e4dd1
-
SHA1
9f3b3a7126144c2e3195d073f385c34fa82cfb6b
-
SHA256
3fb79cd293ce64dcfd20d84df6db2d3c67869cde656bcbad684bb773f76c298f
-
SHA512
994688df44661ad342c97757212487cc30fe3a1241e1e05ad15f44a393d53f9bd8173cfbaf143c17c297eea6a052afe900c2199c3385abf636ac3f2aa0b5ee97
-
SSDEEP
98304:EJyh2DzSgTbg52T41Ahxo2DvzQ/LwqDVNzsgeIXS3HWbNYS1HGO5AUMW4kmw:EgDWq2s8xocE/Lxno1n2bNYS1HtAZW4S
Malware Config
Extracted
cryptbot
cede04.info
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
Setup.exeSetupres.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setupres.exe -
Blocklisted process makes network request 3 IoCs
Processes:
CScript.exeflow pid process 9 3636 CScript.exe 20 3636 CScript.exe 22 3636 CScript.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Setup.exeSetupres.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Setupres.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Setupres.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Setupres.exeSetup.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation Setupres.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation Setup.exe -
Executes dropped EXE 2 IoCs
Processes:
Setup.exeSetupres.exepid process 468 Setup.exe 2616 Setupres.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
Setup.exeSetupres.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Software\Wine Setup.exe Key opened \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Software\Wine Setupres.exe -
Loads dropped DLL 2 IoCs
Processes:
2239fcbdac9582e1a379dc39ca1e4dd1_JaffaCakes118.exepid process 4220 2239fcbdac9582e1a379dc39ca1e4dd1_JaffaCakes118.exe 4220 2239fcbdac9582e1a379dc39ca1e4dd1_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
Processes:
flow ioc 101 bitbucket.org 8 iplogger.org 9 iplogger.org 47 bitbucket.org 48 bitbucket.org -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 13 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
Setup.exeSetupres.exepid process 468 Setup.exe 2616 Setupres.exe -
Drops file in Program Files directory 3 IoCs
Processes:
2239fcbdac9582e1a379dc39ca1e4dd1_JaffaCakes118.exedescription ioc process File created C:\Program Files (x86)\Sir\Air\ipras.vbs 2239fcbdac9582e1a379dc39ca1e4dd1_JaffaCakes118.exe File created C:\Program Files (x86)\Sir\Air\Setup.exe 2239fcbdac9582e1a379dc39ca1e4dd1_JaffaCakes118.exe File created C:\Program Files (x86)\Sir\Air\Setupres.exe 2239fcbdac9582e1a379dc39ca1e4dd1_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Setup.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Setup.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4976 timeout.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Setup.exeSetupres.exepid process 468 Setup.exe 468 Setup.exe 2616 Setupres.exe 2616 Setupres.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
Processes:
Setup.exepid process 468 Setup.exe 468 Setup.exe 468 Setup.exe 468 Setup.exe 468 Setup.exe 468 Setup.exe 468 Setup.exe 468 Setup.exe 468 Setup.exe 468 Setup.exe 468 Setup.exe 468 Setup.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
2239fcbdac9582e1a379dc39ca1e4dd1_JaffaCakes118.exeSetup.execmd.exedescription pid process target process PID 4220 wrote to memory of 468 4220 2239fcbdac9582e1a379dc39ca1e4dd1_JaffaCakes118.exe Setup.exe PID 4220 wrote to memory of 468 4220 2239fcbdac9582e1a379dc39ca1e4dd1_JaffaCakes118.exe Setup.exe PID 4220 wrote to memory of 468 4220 2239fcbdac9582e1a379dc39ca1e4dd1_JaffaCakes118.exe Setup.exe PID 4220 wrote to memory of 3636 4220 2239fcbdac9582e1a379dc39ca1e4dd1_JaffaCakes118.exe CScript.exe PID 4220 wrote to memory of 3636 4220 2239fcbdac9582e1a379dc39ca1e4dd1_JaffaCakes118.exe CScript.exe PID 4220 wrote to memory of 3636 4220 2239fcbdac9582e1a379dc39ca1e4dd1_JaffaCakes118.exe CScript.exe PID 4220 wrote to memory of 2616 4220 2239fcbdac9582e1a379dc39ca1e4dd1_JaffaCakes118.exe Setupres.exe PID 4220 wrote to memory of 2616 4220 2239fcbdac9582e1a379dc39ca1e4dd1_JaffaCakes118.exe Setupres.exe PID 4220 wrote to memory of 2616 4220 2239fcbdac9582e1a379dc39ca1e4dd1_JaffaCakes118.exe Setupres.exe PID 468 wrote to memory of 4632 468 Setup.exe cmd.exe PID 468 wrote to memory of 4632 468 Setup.exe cmd.exe PID 468 wrote to memory of 4632 468 Setup.exe cmd.exe PID 4632 wrote to memory of 4976 4632 cmd.exe timeout.exe PID 4632 wrote to memory of 4976 4632 cmd.exe timeout.exe PID 4632 wrote to memory of 4976 4632 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2239fcbdac9582e1a379dc39ca1e4dd1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2239fcbdac9582e1a379dc39ca1e4dd1_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Sir\Air\Setup.exe"C:\Program Files (x86)\Sir\Air\Setup.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\jwcOvh6IeBxTiP & timeout 2 & del /f /q "C:\Program Files (x86)\Sir\Air\Setup.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 24⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\CScript.exe"C:\Windows\system32\CScript.exe" "C:\Program Files (x86)\Sir\Air\ipras.vbs" //e:vbscript //B //NOLOGO2⤵
- Blocklisted process makes network request
-
C:\Program Files (x86)\Sir\Air\Setupres.exe"C:\Program Files (x86)\Sir\Air\Setupres.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Sir\Air\Setup.exeFilesize
2.2MB
MD541af7998ebb519e0a0ca9635a865be5d
SHA168a7613a8d4483efb67f3794c245420e0daf2f95
SHA256f05dc2ebf5bebbe40f1698489b873adcbefa41c98afe544fa04fd1ded91c9189
SHA51231af03c31f0568ae57aab30c3d320a5505f3106ffd02c19b9bb5c740f76af332b27d929fca715029bfd49f2a0f404643616f0f88ab4f115693949688112ac5bb
-
C:\Program Files (x86)\Sir\Air\Setupres.exeFilesize
2.0MB
MD5b00f36abdbc0edb4729ae72ed388e965
SHA1a1bf243bda51006cf4c8b9ee1fdcffb206058973
SHA2565e64432c3afc95cfda49aa9479fd66efb8d7ef9812a2acb3fa9a0f536a2e5db9
SHA5128dd8e5d9d6ad4a5515ae178f27e4878ddab3b8cf8786177cac91719517a959fba30cc7d93eb0eff9d1d71d097dbbdf07684fd8b077e144927079db8b8d1f5bb3
-
C:\Program Files (x86)\Sir\Air\ipras.vbsFilesize
126B
MD5b802ff9244875f69db2fae0f78e92b10
SHA149385a89cd575894a29fbda969b99cc1f5cf8076
SHA256a1b0cb16fb2ecd66fccf156024404801ad694056e8a596326c1b27b57d8eabe8
SHA512609856415a7ae2b3e260f945f1c8a8d2a28884c202d37181bea948708918f24b42ae03f17dba1520fddc91b2f7a182b0b8f885f33ea6f81bb3ee4c72e4e9350e
-
C:\ProgramData\jwcOvh6IeBxTiP\47283761.txtFilesize
156B
MD5b5089e0c5a3d5377e9bd19c0557ef04e
SHA19402e326be3d240e234c06892b15c24e93c93eb8
SHA256d77789b2c49759c882f4fdd6f53e665b0d012f8f0949d0150eaba47fbf2a0eb5
SHA512942349ccb99854f274ef1e20b623660588e15bd0d25bfc817fe9b2d010db656af340652e0e67b41edbf0cf259d55ab880d6b50acb1d7e8ab394f1393f7956c13
-
C:\ProgramData\jwcOvh6IeBxTiP\Files\_Info.txtFilesize
8KB
MD51f17acca25107e899bb46630d7b364e2
SHA185fcac741a7a0e371e21f6a844e562b21d26ec62
SHA256efa1365530f54b0fc9d0944e083400336bcd6dc11b96c752966d7acc953ddddc
SHA5123eb1306f2ea8d05c730a6f56c223513125db02fb735b5346077727cdefc73fcd95235eb05c97c2586b1a63c3ba91d4980cc9832af0e19b30ebc5d73e5587ec71
-
C:\ProgramData\jwcOvh6IeBxTiP\Files\_Screen.jpgFilesize
55KB
MD5720186a2718e79d180305abdb97336d8
SHA16c378230fa0cf031f5b8671e13644966436fa5bb
SHA25640723e85f1c51a7bcd39dc9d0735727bba8a50d81569eda941047700548f3950
SHA512b36b86d93fab7d84445742b51c5762e12bd03df8b0b24492fb5c4e89d6f0fd609ebd026658e0f1e4ac21673c82d9b5f33ff98d81473ff2f7b1debda49377513b
-
C:\ProgramData\jwcOvh6IeBxTiP\HRKdPILNd1E.zipFilesize
50KB
MD51e9a03696b34aac82d5a340568a6dbda
SHA1a36af90ff1e9e9e48bd0ce545f1e0832815c491e
SHA256bed1fb150bb7baaa46ca9a4f361fdb7ee96d5413753d7b33f2be2fdf8015917d
SHA512c1cb925f531b6919baaf3df9cfe0c245fae7331e414baabb5cf8025313ef83c12b366482691a27301979a686f0a25d68193e9e54f564d11aff72f3515e5a3a66
-
C:\ProgramData\jwcOvh6IeBxTiP\MOZ_CO~1.DBFilesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
C:\Users\Admin\AppData\Local\Temp\nsy4305.tmp\UAC.dllFilesize
14KB
MD5adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
C:\Users\Admin\AppData\Local\Temp\nsy4305.tmp\nsExec.dllFilesize
6KB
MD5132e6153717a7f9710dcea4536f364cd
SHA1e39bc82c7602e6dd0797115c2bd12e872a5fb2ab
SHA256d29afce2588d8dd7bb94c00ca91cac0e85b80ffa6b221f5ffcb83a2497228eb2
SHA5129aeb0b3051ce07fb9f03dfee7cea4a5e423425e48cb538173bd2a167817f867a30bd4d27d07875f27ca00031745b24547030b7f146660b049fa717590f1c77e1
-
C:\Users\Admin\AppData\Roaming\ergfsdcsv.exeFilesize
14KB
MD55144ff98f2899b89cae6ab823001cc3d
SHA15bc102835752ec13da935bc30542c542cf57e3fc
SHA2563f9bee59eb6c4d868c1d53b78c62dd8f14f5d4c98252d795a20555b4e462093e
SHA5126509870a714826a5d9a7e8cdf58838cb72ab946d0092c639d2e365fe59593cfd149a2aaaa020cd030323667d8806e0e92e467778b6e58f5453e1198b07948912
-
C:\Users\Admin\AppData\Roaming\rgvsdc.exeFilesize
14KB
MD53cf0c2889ad635527434729953d586a2
SHA16a591d829794566c6e592ebc96d44059d543f3cb
SHA256e0c82b5d35f38b2a120a123330d09160c43827a0b16b78b0cf26c167a4b004d6
SHA5127646879eeb6aaf2c0758c27cd51640ee5bcf52e884c3d726ed2200368d1abf8fc7d95118372c13ac294498f92aa6130bce7b8a76662f559780a9c7058f99daa7
-
memory/468-234-0x0000000000D30000-0x000000000124B000-memory.dmpFilesize
5.1MB
-
memory/468-30-0x0000000000D30000-0x000000000124B000-memory.dmpFilesize
5.1MB
-
memory/468-22-0x0000000004FE0000-0x0000000004FE1000-memory.dmpFilesize
4KB
-
memory/468-33-0x0000000000D30000-0x000000000124B000-memory.dmpFilesize
5.1MB
-
memory/468-162-0x0000000000D30000-0x000000000124B000-memory.dmpFilesize
5.1MB
-
memory/468-34-0x0000000000D30000-0x000000000124B000-memory.dmpFilesize
5.1MB
-
memory/468-16-0x0000000000D30000-0x000000000124B000-memory.dmpFilesize
5.1MB
-
memory/468-179-0x0000000000D30000-0x000000000124B000-memory.dmpFilesize
5.1MB
-
memory/468-17-0x0000000077A84000-0x0000000077A86000-memory.dmpFilesize
8KB
-
memory/468-182-0x0000000000D30000-0x000000000124B000-memory.dmpFilesize
5.1MB
-
memory/468-23-0x0000000005000000-0x0000000005001000-memory.dmpFilesize
4KB
-
memory/468-184-0x0000000000D30000-0x000000000124B000-memory.dmpFilesize
5.1MB
-
memory/468-185-0x0000000000D30000-0x000000000124B000-memory.dmpFilesize
5.1MB
-
memory/468-258-0x0000000000D30000-0x000000000124B000-memory.dmpFilesize
5.1MB
-
memory/468-188-0x0000000000D30000-0x000000000124B000-memory.dmpFilesize
5.1MB
-
memory/468-257-0x0000000000D30000-0x000000000124B000-memory.dmpFilesize
5.1MB
-
memory/468-195-0x0000000000D30000-0x000000000124B000-memory.dmpFilesize
5.1MB
-
memory/468-25-0x0000000000D31000-0x0000000000D90000-memory.dmpFilesize
380KB
-
memory/468-200-0x0000000000D30000-0x000000000124B000-memory.dmpFilesize
5.1MB
-
memory/468-243-0x0000000000D30000-0x000000000124B000-memory.dmpFilesize
5.1MB
-
memory/468-204-0x0000000000D30000-0x000000000124B000-memory.dmpFilesize
5.1MB
-
memory/468-238-0x0000000000D30000-0x000000000124B000-memory.dmpFilesize
5.1MB
-
memory/468-208-0x0000000000D30000-0x000000000124B000-memory.dmpFilesize
5.1MB
-
memory/468-37-0x0000000000D30000-0x000000000124B000-memory.dmpFilesize
5.1MB
-
memory/468-212-0x0000000000D30000-0x000000000124B000-memory.dmpFilesize
5.1MB
-
memory/468-230-0x0000000000D30000-0x000000000124B000-memory.dmpFilesize
5.1MB
-
memory/468-216-0x0000000000D30000-0x000000000124B000-memory.dmpFilesize
5.1MB
-
memory/468-24-0x0000000004FB0000-0x0000000004FB1000-memory.dmpFilesize
4KB
-
memory/2616-245-0x0000000000400000-0x000000000091E000-memory.dmpFilesize
5.1MB
-
memory/2616-240-0x0000000000400000-0x000000000091E000-memory.dmpFilesize
5.1MB
-
memory/2616-232-0x0000000000400000-0x000000000091E000-memory.dmpFilesize
5.1MB
-
memory/2616-210-0x0000000000400000-0x000000000091E000-memory.dmpFilesize
5.1MB
-
memory/2616-227-0x0000000000400000-0x000000000091E000-memory.dmpFilesize
5.1MB
-
memory/2616-206-0x0000000000400000-0x000000000091E000-memory.dmpFilesize
5.1MB
-
memory/2616-214-0x0000000000400000-0x000000000091E000-memory.dmpFilesize
5.1MB
-
memory/2616-202-0x0000000000400000-0x000000000091E000-memory.dmpFilesize
5.1MB
-
memory/2616-236-0x0000000000400000-0x000000000091E000-memory.dmpFilesize
5.1MB
-
memory/2616-197-0x0000000000400000-0x000000000091E000-memory.dmpFilesize
5.1MB
-
memory/2616-190-0x0000000000400000-0x000000000091E000-memory.dmpFilesize
5.1MB
-
memory/2616-187-0x0000000000400000-0x000000000091E000-memory.dmpFilesize
5.1MB
-
memory/2616-181-0x0000000000400000-0x000000000091E000-memory.dmpFilesize
5.1MB
-
memory/2616-177-0x0000000000400000-0x000000000091E000-memory.dmpFilesize
5.1MB
-
memory/2616-264-0x0000000000400000-0x000000000091E000-memory.dmpFilesize
5.1MB
-
memory/2616-265-0x0000000000400000-0x000000000091E000-memory.dmpFilesize
5.1MB