Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 06:39
Static task
static1
Behavioral task
behavioral1
Sample
19256bd12b5a792b34f795d902744001_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
19256bd12b5a792b34f795d902744001_JaffaCakes118.exe
-
Size
87KB
-
MD5
19256bd12b5a792b34f795d902744001
-
SHA1
050228507ddcc182dc15c34f2d5ca28e8aabfaa3
-
SHA256
4ac41d74455939bdb93f0278d8def69e8a7731066766208833a83e3cafefe21d
-
SHA512
05ecea31633d84ec3874ede6f69a0598180bdb14c65a856d71bf8d341bcb997adf3a9bcec969ed39dcffd47bc612d896f8ca3ec3eee5f493ab554575bcb0c06c
-
SSDEEP
1536:UikAwHxzZh2UXYmvdRmSZad2jN0RAJGWanGjPEep3KJ:xkAwRzhjdRmSZiANP8J
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2104-3-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2104-2-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2104-1-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2104-7-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2104-8-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2104-9-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2104-5-0x0000000000400000-0x000000000041A000-memory.dmp upx -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{217958F1-3519-11EF-BC57-569FD5A164C1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425718620" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
19256bd12b5a792b34f795d902744001_JaffaCakes118.exepid process 2104 19256bd12b5a792b34f795d902744001_JaffaCakes118.exe 2104 19256bd12b5a792b34f795d902744001_JaffaCakes118.exe 2104 19256bd12b5a792b34f795d902744001_JaffaCakes118.exe 2104 19256bd12b5a792b34f795d902744001_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
19256bd12b5a792b34f795d902744001_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 2104 19256bd12b5a792b34f795d902744001_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2624 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2624 iexplore.exe 2624 iexplore.exe 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
19256bd12b5a792b34f795d902744001_JaffaCakes118.exepid process 2104 19256bd12b5a792b34f795d902744001_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
19256bd12b5a792b34f795d902744001_JaffaCakes118.exeiexplore.exedescription pid process target process PID 2104 wrote to memory of 2624 2104 19256bd12b5a792b34f795d902744001_JaffaCakes118.exe iexplore.exe PID 2104 wrote to memory of 2624 2104 19256bd12b5a792b34f795d902744001_JaffaCakes118.exe iexplore.exe PID 2104 wrote to memory of 2624 2104 19256bd12b5a792b34f795d902744001_JaffaCakes118.exe iexplore.exe PID 2104 wrote to memory of 2624 2104 19256bd12b5a792b34f795d902744001_JaffaCakes118.exe iexplore.exe PID 2624 wrote to memory of 2572 2624 iexplore.exe IEXPLORE.EXE PID 2624 wrote to memory of 2572 2624 iexplore.exe IEXPLORE.EXE PID 2624 wrote to memory of 2572 2624 iexplore.exe IEXPLORE.EXE PID 2624 wrote to memory of 2572 2624 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\19256bd12b5a792b34f795d902744001_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\19256bd12b5a792b34f795d902744001_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2624 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD505daf274bda2b62b14358855dbd9b003
SHA1e158220c7ea7d356afacffcca1b32e0ac382abb5
SHA2564934c05c6ce33c14e35eb4e00f108a8a889640f063db80a34afc3ed92e201557
SHA512e2b09f5cf503d52c72dd4e5f22b948301af44f8d50e2ee604f2e2ad23853355a4ba123312d3fd6da0f869310b417e11cd8d073d272065ca196248d3117901f79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD53eaa71ac22b9e6345902ec8266199e26
SHA1a71d557acef6efad4c2d268b50e615ac857fa7e0
SHA256548ae4e5587baee26c997f814378bf474248757834611fcb7fe2dda6ca97ecf7
SHA5128855d2f51d86ae7c68952077d4a48c30352beaa9b591e9550e91c100a1cb392b072070d5666c2c65f34373abd4829b9e187f0d579a017d165f740cc1c4ac12c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5706437c51e47b4d164c856b1cc678b6d
SHA1665a41e0b3bc8b4299c68bd7a48d2899c7a58236
SHA2566390cf45eaf195943bb1f96c430f339a9489b5f034a4eb587a74e2b77b39e7d8
SHA5125d4bf28f1c7c9578fd3fec68a19226bb3390a4aa268660496836a6abad04327abe437e6252118a3b7c200c7c19512f617e1a37d40169cefc998232abb69ff88a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD52ea95d63ad42b8f8d9b799cf7f611b65
SHA146098d5a985cb1b0aeb7a74f6ce47304ec726ee5
SHA256687dc9048265a84e5d1f48e93d15ffedda1bd16c04c52079009d6031baacd147
SHA512ea86001312e01db5af277d7ac73e46bd0dc0b3fc054ce16e9c394d5772b32d205c6bc1f5854c9a809e97fc61c9fd82cf3727b75f33b06656b0be9ddc7daa1c5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD57f7b92e4b2d595ba38bb3af6e60037e8
SHA1a30408f3805261a64737214ab444a13def376437
SHA25621b1ceec50e6a29707ada6298f8a3a3119259132ac22c19fdfb1e353eb5945c9
SHA5126354c6d288df631dd4c6732151786de25f04bd107a70ed92771048319efe550d23a1adc9c6ed8b95b176410b97fc22c7586d82128408b0fdd0c02d49c50bacf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD59425863ef40c84388702e90d2a0c85fb
SHA1b315e96b5f05f591e331bb7733342a94a2d63b85
SHA256cc26112f318b17325a0867036addc02f0114d8cc531afa637ac7772cdcb21cff
SHA512a8970e8c8785b834aba9d05b96fc1947c8ba38744c142d7381a8598bee869fdeb16c71eec64fcac3a40fd0d3d1dcaa704c335549a249838d78c03a340a21cdf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5860ec24638b5b987af8ff0d67f857b8a
SHA12f4a22df62dbe994c630ae06827661242c875810
SHA256d0c4ed14f9d3da0ca361d12485958008e95e4b6b2f569ac18b93911489b6d7f6
SHA5121653e803d6118044e7ac7588fd19a300d5409be27249d5cadb43189c612c1584bd011c4b4bf8d0a6e3a82ff5aa7c4b11840c914df4c95948a8772ab67acdae46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5b4bca1ea82758b7871562c923a0ff055
SHA17c156cd234c812785da1a89f649d6e3779092d6d
SHA256440e3f3e3b5bfe5c8f23ce7b52cc783cbae324a7de862d5d034e0aa8d2b79410
SHA512ec5cc853d588e0e00154d4acd962699896a47a9db933c06706da7feaf44d04206ba3e71fe5011367d9745114dd87a8e6c959b7963ea84355e36f4e6d4abacde2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5de5bb4c6de48c65366868c0497c32184
SHA1e7ebb58c21ce96c73680f914164fc09a2cff42a3
SHA2563d830bb2616ff1c6fb356cb1d1eb340c256952bad2e90ffd7c4f6d035ad75597
SHA512a48d9b746815af106c408d09332188c09b3aeaa708a589170cc508ddf5b8f3ae2b0c7522adb4ccebc4dc2c9067d20fd929bc406a3926ee5e20c827f3b5244491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5fe067c80a1cdc704fbbb66024412c02b
SHA16d0ed7dd3e3c60c5c5e831750ef49e12c6e3970e
SHA256e8deb3459fe3e9e40df232f714d9f3564763d4f20ad139104dd35fe5aeb1d74f
SHA512633955ff041391d907737fd64f399a8ee088494f6cd6fabe98c6530ad0ab519f0f504186b6626579d192694026a90ec1f526b5539f6c6a86ea041e3b0d211e5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5cd536094d339a0090b604b527f38fe04
SHA1c827fa34ccb1e405e109d90e0a681c6b71c95829
SHA256dd80c8f21af91e94c20c0b41a451ca04e276743cd5d3b9a6078d901ef34f13cf
SHA51299ca8f706eee7d5271a20426152678d403009fd1e10fee0b29e25bc7226323dedf2f0dfe5ebd41fd92129e856d86a90453361428194607ce2a5f92db8eff305b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD57c9846472cfe46e99815042ef9bba258
SHA1fd683dae9df5e0d2107e594efba134ca73c2bc98
SHA256d967847126f449cc622f0e626837912cd85f9129b51868b047b48aea917d9cdf
SHA51239026b93eb49a74b1a3b5bef29449f5f16762d386373aaee7d149f48c48c00c78d1d180fc8151832a5d2b051723fd6a0eb02b1b393ec6d53831577035958436b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5f27450b35a84dc3a80b329b45351f131
SHA18a8b48188ac4d5156f75fde334ccefa3489c2456
SHA25625805599e58e1280a5db85b47cb098f28d487d4b0edf05edfa693871705dd9ef
SHA5122f6d7114060070502bca317b11e77f31d3451dcdd4c0ad5cd895b2a10d6ca12dfc4fcc43d8f29c437e7213eddc2f021eeb2079d8601134c07a9d380b72084052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5ec0ff6cf72225e8888a217441cb90802
SHA18284244b33b10b5bb112aff1ba854ccc995a2e92
SHA2564b67041e8861b936ba3b9eff1d3524b46b0d605f556950d22614552f27bdde9a
SHA5127ccec1b4b76f345948c86895942e681e150e68957faa45a66047098bccc58771ecd07a70a85655caec6fbd60c289c86020a3856d678912e038a06fc2f787fa44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5c81d2dce25a86379a8c64afb72f792e4
SHA132c06977cd6b0f91a00a1e01e777cce85f907b87
SHA256a50c9dd83dfe0b925c9d012f6b2d31f0b6ed92e3818a34edffe52c436c670d40
SHA51225b3e159800d9670c20dacfdec15ac9c643392d85d7789949d92c529c8fceb4cf8daeb67f1f1c2cc04d0ea3c0b6ebc510544bd15d67b570543d663fe88dd76b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5e9cfe1143d4b8ee08ae5330dd5fa2262
SHA1d6ee3b1db1161d2384947c397b401e43c17bf79a
SHA2565897af85c391ab1b889da1be5b4b27209bafe8d5355383fc2606e059bcb812d0
SHA512da6eba7e6f90f1cb9d8a2a73b82fc6f25e65963b032c7bacf448b2d2cdb3acd285dea397ec4ee6d1eaa0c99b7887d1075f350b471bc3d572243d0659f8289917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5756badd734ee4b71c0c58112e603dd32
SHA1c08c7a1b4da614fdfb38c144a3387b78f95ea475
SHA256977232b667f1402f07fa21e425c4b62a0313cc8015d25b07501844f1824f97d5
SHA5129e3f14c4e3a7f844b340629254563d434e7607656f032dd86683911e02073414a56b92b18040bb74419f1f6600a9cf49743b38c2777d617b3916a0343a46490a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD56ab366bd935317a92cee5ad9baf2d520
SHA1adaf042604dd5030e6590b7931bf9f6c14bf3816
SHA256e1ed0d16f875d6b0f57c882124eedcde5b07046b494d1f0e5f01736e0c649ebd
SHA51272ae67e3ccd570e3e9a1002c74c4d650334963898065b2c6e5ae5fbeb6d8803a4da9eed0145c6feaefa2f7976d65409e708df4f52e22669c62a058bef675af28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD525b9509bc86a0af68f234023a5056bad
SHA1a082b928221f0a70451c7f64d366c5d9bfd97f40
SHA256545ffbb880538307d8824cd520955163752ab54bf48f7498d3f7dabc53f389ec
SHA512cb0f54c387dba173070922a4a6b65574b184e387d62fb16152e056b4890a9658253d0105cdfc4d39f9fff463c57895f0aac687ac1916be4da295d0fcc600fb5a
-
C:\Users\Admin\AppData\Local\Temp\Cab370B.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar37FD.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
memory/2104-8-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/2104-3-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/2104-0-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/2104-7-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/2104-6-0x00000000003C0000-0x00000000003C1000-memory.dmpFilesize
4KB
-
memory/2104-10-0x0000000000190000-0x0000000000191000-memory.dmpFilesize
4KB
-
memory/2104-9-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/2104-12-0x0000000077DAF000-0x0000000077DB0000-memory.dmpFilesize
4KB
-
memory/2104-2-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/2104-5-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB
-
memory/2104-1-0x0000000000400000-0x000000000041A000-memory.dmpFilesize
104KB