Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 09:29
Static task
static1
Behavioral task
behavioral1
Sample
1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe
-
Size
299KB
-
MD5
1ac562c103f397bc360eb5a20f921a3c
-
SHA1
6b850fca8a549ef197abf6f60b2f27ace6feea92
-
SHA256
093b230ba4c569b847d0fe6319faac0fafe6c26fa808fa45f81def8f770c1a23
-
SHA512
b78cae3dd26688507672f230531a18d5aaa3ce8fec90bab23f6ad867ceb24c3c67c43ad488c17233c0bb2071a7fe73be92786af505aaeaeda14be5d1d38c0bac
-
SSDEEP
6144:ef3tv8uK5A5phFKlrINwmIETCcH4JJ96KIi3eLWOStEB8wP2YGpLeBOrMwsg:ef3x8uKIphFKaN5TGJj7rzEP29VeW3sg
Malware Config
Signatures
-
Executes dropped EXE 8 IoCs
Processes:
csboyDVD.dll³ÉÈ˲¥·ÅÆ÷×îаæ.exe_5BB3C7E96208784D787EB50FCE8B3E64F91223EF.exeservices.execsboyAuTo.dllservices.execsboyAuTo.dllservices.execsboyTT.dllpid process 2312 csboyDVD.dll 2056 ³ÉÈ˲¥·ÅÆ÷×îаæ.exe_5BB3C7E96208784D787EB50FCE8B3E64F91223EF.exe 2612 services.exe 2496 csboyAuTo.dll 3024 services.exe 2808 csboyAuTo.dll 2832 services.exe 1364 csboyTT.dll -
Loads dropped DLL 31 IoCs
Processes:
1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.execsboyDVD.dll³ÉÈ˲¥·ÅÆ÷×îаæ.exe_5BB3C7E96208784D787EB50FCE8B3E64F91223EF.exeservices.execsboyAuTo.dllcsboyAuTo.dllservices.execsboyTT.dllpid process 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe 2312 csboyDVD.dll 2312 csboyDVD.dll 2312 csboyDVD.dll 2312 csboyDVD.dll 2312 csboyDVD.dll 2056 ³ÉÈ˲¥·ÅÆ÷×îаæ.exe_5BB3C7E96208784D787EB50FCE8B3E64F91223EF.exe 2056 ³ÉÈ˲¥·ÅÆ÷×îаæ.exe_5BB3C7E96208784D787EB50FCE8B3E64F91223EF.exe 2056 ³ÉÈ˲¥·ÅÆ÷×îаæ.exe_5BB3C7E96208784D787EB50FCE8B3E64F91223EF.exe 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe 2612 services.exe 2612 services.exe 2612 services.exe 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe 2496 csboyAuTo.dll 2496 csboyAuTo.dll 2496 csboyAuTo.dll 2496 csboyAuTo.dll 2496 csboyAuTo.dll 2808 csboyAuTo.dll 2808 csboyAuTo.dll 3024 services.exe 3024 services.exe 3024 services.exe 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe 1364 csboyTT.dll 1364 csboyTT.dll 1364 csboyTT.dll -
Processes:
resource yara_rule \Program Files\Common Files\Services\csboyAuTo.dll upx behavioral1/memory/2496-74-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2384-75-0x00000000002C0000-0x00000000002F1000-memory.dmp upx behavioral1/memory/2808-93-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2496-108-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2496-148-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Processes:
resource yara_rule \Program Files\Common Files\Services\csboyTT.dll vmprotect behavioral1/memory/1364-123-0x0000000000400000-0x0000000000418000-memory.dmp vmprotect behavioral1/memory/1364-138-0x0000000000400000-0x0000000000418000-memory.dmp vmprotect behavioral1/memory/1364-149-0x0000000000400000-0x0000000000418000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
csboyAuTo.dlldescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Internet = "C:\\Program Files\\Common Files\\Services\\services.exe" csboyAuTo.dll -
Drops file in Program Files directory 16 IoCs
Processes:
1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exeservices.exeservices.exeservices.exedescription ioc process File created C:\Program Files\Common Files\Services\csboyTj.ocx 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Services\csboyTT.dll 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe File created C:\Program Files\Common Files\Services\csboyDVD.dll 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe File created C:\Program Files\Common Files\Services\csboyAuTo.dll 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe File created C:\Program Files\Common Files\csboy_ing_Code.ini services.exe File opened for modification C:\Program Files\Common Files\Services\csboyAuTo.dll 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Services\services.exe 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe File created C:\Program Files\Common Files\Services\csboyTT.dll 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe File created C:\Program Files\Common Files\Services\csboyDvd.ocx 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe File created C:\Program Files\Common Files\Services\csboyDw.ocx 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\csboy_ing_Code.ini services.exe File opened for modification C:\Program Files\Common Files\csboy_ing_Code.ini services.exe File opened for modification C:\Program Files\Common Files\Services\csboyDVD.dll 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe File created C:\Program Files\Common Files\Services\services.exe 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe File created C:\Program Files\Common Files\Services\csboyAuTo.ocx 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe File created C:\Program Files\Common Files\Services\csboybind.au 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
csboyAuTo.dllcsboyAuTo.dllcsboyTT.dllpid process 2496 csboyAuTo.dll 2496 csboyAuTo.dll 2496 csboyAuTo.dll 2808 csboyAuTo.dll 2808 csboyAuTo.dll 2808 csboyAuTo.dll 1364 csboyTT.dll 1364 csboyTT.dll 1364 csboyTT.dll 1364 csboyTT.dll -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
services.exeservices.exeservices.exedescription pid process Token: SeDebugPrivilege 2612 services.exe Token: SeDebugPrivilege 2832 services.exe Token: SeDebugPrivilege 3024 services.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
³ÉÈ˲¥·ÅÆ÷×îаæ.exe_5BB3C7E96208784D787EB50FCE8B3E64F91223EF.exepid process 2056 ³ÉÈ˲¥·ÅÆ÷×îаæ.exe_5BB3C7E96208784D787EB50FCE8B3E64F91223EF.exe 2056 ³ÉÈ˲¥·ÅÆ÷×îаæ.exe_5BB3C7E96208784D787EB50FCE8B3E64F91223EF.exe 2056 ³ÉÈ˲¥·ÅÆ÷×îаæ.exe_5BB3C7E96208784D787EB50FCE8B3E64F91223EF.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
³ÉÈ˲¥·ÅÆ÷×îаæ.exe_5BB3C7E96208784D787EB50FCE8B3E64F91223EF.exepid process 2056 ³ÉÈ˲¥·ÅÆ÷×îаæ.exe_5BB3C7E96208784D787EB50FCE8B3E64F91223EF.exe 2056 ³ÉÈ˲¥·ÅÆ÷×îаæ.exe_5BB3C7E96208784D787EB50FCE8B3E64F91223EF.exe 2056 ³ÉÈ˲¥·ÅÆ÷×îаæ.exe_5BB3C7E96208784D787EB50FCE8B3E64F91223EF.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
csboyTT.dllpid process 1364 csboyTT.dll 1364 csboyTT.dll -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.execsboyDVD.dllcsboyAuTo.dllcsboyAuTo.dlldescription pid process target process PID 2384 wrote to memory of 2312 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe csboyDVD.dll PID 2384 wrote to memory of 2312 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe csboyDVD.dll PID 2384 wrote to memory of 2312 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe csboyDVD.dll PID 2384 wrote to memory of 2312 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe csboyDVD.dll PID 2384 wrote to memory of 2312 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe csboyDVD.dll PID 2384 wrote to memory of 2312 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe csboyDVD.dll PID 2384 wrote to memory of 2312 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe csboyDVD.dll PID 2312 wrote to memory of 2056 2312 csboyDVD.dll ³ÉÈ˲¥·ÅÆ÷×îаæ.exe_5BB3C7E96208784D787EB50FCE8B3E64F91223EF.exe PID 2312 wrote to memory of 2056 2312 csboyDVD.dll ³ÉÈ˲¥·ÅÆ÷×îаæ.exe_5BB3C7E96208784D787EB50FCE8B3E64F91223EF.exe PID 2312 wrote to memory of 2056 2312 csboyDVD.dll ³ÉÈ˲¥·ÅÆ÷×îаæ.exe_5BB3C7E96208784D787EB50FCE8B3E64F91223EF.exe PID 2312 wrote to memory of 2056 2312 csboyDVD.dll ³ÉÈ˲¥·ÅÆ÷×îаæ.exe_5BB3C7E96208784D787EB50FCE8B3E64F91223EF.exe PID 2312 wrote to memory of 2056 2312 csboyDVD.dll ³ÉÈ˲¥·ÅÆ÷×îаæ.exe_5BB3C7E96208784D787EB50FCE8B3E64F91223EF.exe PID 2312 wrote to memory of 2056 2312 csboyDVD.dll ³ÉÈ˲¥·ÅÆ÷×îаæ.exe_5BB3C7E96208784D787EB50FCE8B3E64F91223EF.exe PID 2312 wrote to memory of 2056 2312 csboyDVD.dll ³ÉÈ˲¥·ÅÆ÷×îаæ.exe_5BB3C7E96208784D787EB50FCE8B3E64F91223EF.exe PID 2384 wrote to memory of 2612 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe services.exe PID 2384 wrote to memory of 2612 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe services.exe PID 2384 wrote to memory of 2612 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe services.exe PID 2384 wrote to memory of 2612 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe services.exe PID 2384 wrote to memory of 2612 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe services.exe PID 2384 wrote to memory of 2612 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe services.exe PID 2384 wrote to memory of 2612 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe services.exe PID 2384 wrote to memory of 2496 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe csboyAuTo.dll PID 2384 wrote to memory of 2496 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe csboyAuTo.dll PID 2384 wrote to memory of 2496 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe csboyAuTo.dll PID 2384 wrote to memory of 2496 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe csboyAuTo.dll PID 2384 wrote to memory of 2496 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe csboyAuTo.dll PID 2384 wrote to memory of 2496 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe csboyAuTo.dll PID 2384 wrote to memory of 2496 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe csboyAuTo.dll PID 2496 wrote to memory of 3024 2496 csboyAuTo.dll services.exe PID 2496 wrote to memory of 3024 2496 csboyAuTo.dll services.exe PID 2496 wrote to memory of 3024 2496 csboyAuTo.dll services.exe PID 2496 wrote to memory of 3024 2496 csboyAuTo.dll services.exe PID 2496 wrote to memory of 3024 2496 csboyAuTo.dll services.exe PID 2496 wrote to memory of 3024 2496 csboyAuTo.dll services.exe PID 2496 wrote to memory of 3024 2496 csboyAuTo.dll services.exe PID 2808 wrote to memory of 2832 2808 csboyAuTo.dll services.exe PID 2808 wrote to memory of 2832 2808 csboyAuTo.dll services.exe PID 2808 wrote to memory of 2832 2808 csboyAuTo.dll services.exe PID 2808 wrote to memory of 2832 2808 csboyAuTo.dll services.exe PID 2384 wrote to memory of 1364 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe csboyTT.dll PID 2384 wrote to memory of 1364 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe csboyTT.dll PID 2384 wrote to memory of 1364 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe csboyTT.dll PID 2384 wrote to memory of 1364 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe csboyTT.dll PID 2384 wrote to memory of 1364 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe csboyTT.dll PID 2384 wrote to memory of 1364 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe csboyTT.dll PID 2384 wrote to memory of 1364 2384 1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe csboyTT.dll
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1ac562c103f397bc360eb5a20f921a3c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Common Files\Services\csboyDVD.dll"C:\Program Files\Common Files\Services\csboyDVD.dll"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\³ÉÈ˲¥·ÅÆ÷×îаæ.exe_5BB3C7E96208784D787EB50FCE8B3E64F91223EF.exe"C:\Users\Admin\AppData\Local\Temp\³ÉÈ˲¥·ÅÆ÷×îаæ.exe_5BB3C7E96208784D787EB50FCE8B3E64F91223EF.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files\Common Files\Services\services.exe"C:\Program Files\Common Files\Services\services.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Common Files\Services\csboyAuTo.dll"C:\Program Files\Common Files\Services\csboyAuTo.dll"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Common Files\Services\services.exe"C:\Program Files\Common Files\Services\services.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Common Files\Services\csboyTT.dll"C:\Program Files\Common Files\Services\csboyTT.dll"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Common Files\Services\csboyAuTo.dll"C:\Program Files\Common Files\Services\csboyAuTo.dll"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Common Files\Services\services.exe"C:\Program Files\Common Files\Services\services.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Program Files\Common Files\Services\csboyAuTo.dllFilesize
47.7MB
MD5766ddba5d8d2964f6375a133f781d9dd
SHA1da8b4c77cfcb159384a83948d13269ee9db6dcb8
SHA256a5b2c0aaf947d5e996a28ac5e4126c38e7b0f66d486473822441c8c5cd28e56a
SHA5129caa67fcdda64c36e58c2fb40c71c17f2f18833aa7100a3e0b2450beb7ebe0bab3a4b5d077d9d43e0df00a86b8891fa5ffb9e106521886f9d73690fc9a1ecdca
-
\Program Files\Common Files\Services\csboyDVD.dllFilesize
606KB
MD52c204db0ad6134e2c4820e46f872d77a
SHA1899fed43754fbed45f021c87e9e8d5f38575bc78
SHA2564827a60f3772da9c7c0d21e4392685fe49c34f91bcca8417c08d6f8e05cace7c
SHA51210dab005089dc49c9e88a254fa5ca555f59f87f6d7ee1adf649832003c0274f4e2e3dd7456328d77b610f3b4176bf7f1f86af0ddaa4ec4cfd318ee87e95f7a03
-
\Program Files\Common Files\Services\csboyTT.dllFilesize
47.7MB
MD507a01a86f1c8d8a6653354794da41240
SHA1138aa7ad46a268b3463a770abf06d4f622b86ab5
SHA2563aaac757e5af4afd13fe39a9f3e32f0e521580febb9daf1a67a7be2441fea0e6
SHA512dbf225ae9a04a58d377047a2e75eb9adf352e8c194136c950151617e024a830b03dbd7c00663562136340ead7240c087ae411c5d6475ef618c37d8355442fd09
-
\Program Files\Common Files\Services\services.exeFilesize
47.8MB
MD5c062c0dad8a2bd0a9a7909c825a7229e
SHA142ac9bcb37bc520269376176304e9372c4c0f10b
SHA2569d869f424c4094c90e480a9d2cb265a2bd5a78615b891a82a5dc2fbc1f2809e9
SHA5127112be3c1840ffd712a31eb4175fdf459ededce62242755b030c71e597162643fafa22554b31338ae05dbba04146f58f1ae48ff78e367b514221c1c0008d1915
-
\Users\Admin\AppData\Local\Temp\³ÉÈ˲¥·ÅÆ÷×îаæ.exe_5BB3C7E96208784D787EB50FCE8B3E64F91223EF.exeFilesize
252KB
MD590027e51a3b1807742cd15fd33721d7e
SHA1cfb69530f4e0f0b8cded8d28f527c74ad8fa9546
SHA25613df7b5cd1da553331134b0105523bf20662da9bdd7416c7b98f6a562fd06b15
SHA51229729d843c8ca71624078bf22e8374f3a41f7b2f39f51c552a72d1d33bf8518d434873ad2bd23e48874978e9896869b2505f03dbbf32269ade501b876b2f7df1
-
memory/1364-149-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/1364-151-0x0000000000020000-0x0000000000038000-memory.dmpFilesize
96KB
-
memory/1364-150-0x0000000000020000-0x0000000000038000-memory.dmpFilesize
96KB
-
memory/1364-123-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/1364-129-0x0000000000020000-0x0000000000038000-memory.dmpFilesize
96KB
-
memory/1364-128-0x0000000000020000-0x0000000000038000-memory.dmpFilesize
96KB
-
memory/1364-138-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/2056-34-0x00000000031E0000-0x00000000033E4000-memory.dmpFilesize
2.0MB
-
memory/2056-28-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/2312-18-0x00000000003B0000-0x00000000003FE000-memory.dmpFilesize
312KB
-
memory/2312-26-0x00000000003D0000-0x00000000003D2000-memory.dmpFilesize
8KB
-
memory/2312-58-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/2312-15-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/2312-16-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/2384-122-0x00000000002C0000-0x00000000002D8000-memory.dmpFilesize
96KB
-
memory/2384-106-0x0000000000400000-0x0000000000462000-memory.dmpFilesize
392KB
-
memory/2384-1-0x0000000000230000-0x0000000000292000-memory.dmpFilesize
392KB
-
memory/2384-2-0x0000000000250000-0x0000000000252000-memory.dmpFilesize
8KB
-
memory/2384-67-0x00000000002C0000-0x00000000002D4000-memory.dmpFilesize
80KB
-
memory/2384-73-0x00000000002C0000-0x00000000002D4000-memory.dmpFilesize
80KB
-
memory/2384-8-0x00000000002C0000-0x000000000030E000-memory.dmpFilesize
312KB
-
memory/2384-75-0x00000000002C0000-0x00000000002F1000-memory.dmpFilesize
196KB
-
memory/2384-40-0x0000000000400000-0x0000000000462000-memory.dmpFilesize
392KB
-
memory/2384-59-0x0000000000400000-0x0000000000462000-memory.dmpFilesize
392KB
-
memory/2384-42-0x00000000002C0000-0x00000000002F1000-memory.dmpFilesize
196KB
-
memory/2384-131-0x0000000000400000-0x0000000000462000-memory.dmpFilesize
392KB
-
memory/2384-121-0x00000000002C0000-0x00000000002D4000-memory.dmpFilesize
80KB
-
memory/2384-0-0x0000000000400000-0x0000000000462000-memory.dmpFilesize
392KB
-
memory/2384-48-0x0000000000250000-0x0000000000252000-memory.dmpFilesize
8KB
-
memory/2384-114-0x00000000002C0000-0x00000000002D4000-memory.dmpFilesize
80KB
-
memory/2384-115-0x00000000002C0000-0x00000000002D8000-memory.dmpFilesize
96KB
-
memory/2496-136-0x0000000000020000-0x0000000000034000-memory.dmpFilesize
80KB
-
memory/2496-137-0x0000000000020000-0x0000000000034000-memory.dmpFilesize
80KB
-
memory/2496-140-0x0000000000330000-0x0000000000361000-memory.dmpFilesize
196KB
-
memory/2496-108-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/2496-135-0x0000000000330000-0x0000000000361000-memory.dmpFilesize
196KB
-
memory/2496-84-0x0000000000020000-0x0000000000034000-memory.dmpFilesize
80KB
-
memory/2496-85-0x0000000000020000-0x0000000000034000-memory.dmpFilesize
80KB
-
memory/2496-83-0x0000000000020000-0x0000000000034000-memory.dmpFilesize
80KB
-
memory/2496-74-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/2496-148-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/2496-89-0x0000000000330000-0x0000000000361000-memory.dmpFilesize
196KB
-
memory/2612-49-0x0000000000400000-0x0000000000430F69-memory.dmpFilesize
195KB
-
memory/2612-55-0x0000000000400000-0x0000000000430F69-memory.dmpFilesize
195KB
-
memory/2612-60-0x0000000000400000-0x0000000000430F69-memory.dmpFilesize
195KB
-
memory/2612-54-0x0000000000230000-0x0000000000261000-memory.dmpFilesize
196KB
-
memory/2808-94-0x00000000001B0000-0x00000000001E1000-memory.dmpFilesize
196KB
-
memory/2808-93-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/2832-134-0x0000000000400000-0x0000000000430F69-memory.dmpFilesize
195KB
-
memory/2832-102-0x0000000000400000-0x0000000000430F69-memory.dmpFilesize
195KB
-
memory/2832-100-0x0000000000400000-0x0000000000430F69-memory.dmpFilesize
195KB
-
memory/3024-132-0x0000000000400000-0x0000000000430F69-memory.dmpFilesize
195KB
-
memory/3024-104-0x0000000000400000-0x0000000000430F69-memory.dmpFilesize
195KB
-
memory/3024-101-0x0000000000230000-0x0000000000261000-memory.dmpFilesize
196KB
-
memory/3024-99-0x0000000000230000-0x0000000000261000-memory.dmpFilesize
196KB