Analysis
-
max time kernel
156s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 14:44
Behavioral task
behavioral1
Sample
1bb314913ff8fc445f14bfb02b590ecf_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1bb314913ff8fc445f14bfb02b590ecf_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
1bb314913ff8fc445f14bfb02b590ecf_JaffaCakes118.exe
-
Size
28KB
-
MD5
1bb314913ff8fc445f14bfb02b590ecf
-
SHA1
aac9c83c163f2a43f6aa4e373838cdb9257d1bf6
-
SHA256
017441b8804304330c84bf9955206a91ac0f6047378ca3ff46f8529b5f93e916
-
SHA512
c15857259e4e4826af50ed8f019902b82645130ba9cc25e6b2be00b3966ed3e1aae4aecfa559f31e3ec415fc8e1eff6fa1e9d081338b3d4b5d670adc6e52c089
-
SSDEEP
384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyNkx2K2rj:Dv8IRRdsxq1DjJcqf12KU
Malware Config
Signatures
-
Detected microsoft outlook phishing page
-
Executes dropped EXE 1 IoCs
Processes:
services.exepid process 4808 services.exe -
Processes:
resource yara_rule behavioral2/memory/1380-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/1380-3-0x0000000000500000-0x0000000000510000-memory.dmp upx C:\Windows\services.exe upx behavioral2/memory/4808-6-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1380-14-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/4808-15-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4808-20-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4808-22-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1380-26-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/4808-27-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1380-31-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/4808-32-0x0000000000400000-0x0000000000408000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\tmpBB2D.tmp upx behavioral2/memory/1380-84-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/4808-85-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1380-247-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/4808-248-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1380-364-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/4808-365-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4808-367-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1380-371-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/4808-389-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1380-392-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/4808-393-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1380-394-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/4808-395-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1380-499-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/4808-536-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1380-656-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/4808-685-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
1bb314913ff8fc445f14bfb02b590ecf_JaffaCakes118.exeservices.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 1bb314913ff8fc445f14bfb02b590ecf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
Processes:
1bb314913ff8fc445f14bfb02b590ecf_JaffaCakes118.exedescription ioc process File created C:\Windows\services.exe 1bb314913ff8fc445f14bfb02b590ecf_JaffaCakes118.exe File opened for modification C:\Windows\java.exe 1bb314913ff8fc445f14bfb02b590ecf_JaffaCakes118.exe File created C:\Windows\java.exe 1bb314913ff8fc445f14bfb02b590ecf_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
1bb314913ff8fc445f14bfb02b590ecf_JaffaCakes118.exedescription pid process target process PID 1380 wrote to memory of 4808 1380 1bb314913ff8fc445f14bfb02b590ecf_JaffaCakes118.exe services.exe PID 1380 wrote to memory of 4808 1380 1bb314913ff8fc445f14bfb02b590ecf_JaffaCakes118.exe services.exe PID 1380 wrote to memory of 4808 1380 1bb314913ff8fc445f14bfb02b590ecf_JaffaCakes118.exe services.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bb314913ff8fc445f14bfb02b590ecf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1bb314913ff8fc445f14bfb02b590ecf_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4352 --field-trial-handle=2256,i,6670388345726423024,18382795228658886258,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8ZO46T3J\results[6].htmFilesize
1KB
MD5211da0345fa466aa8dbde830c83c19f8
SHA1779ece4d54a099274b2814a9780000ba49af1b81
SHA256aec2ac9539d1b0cac493bbf90948eca455c6803342cc83d0a107055c1d131fd5
SHA51237fd7ef6e11a1866e844439318ae813059106fbd52c24f580781d90da3f64829cf9654acac0dd0f2098081256c5dcdf35c70b2cbef6cbe3f0b91bd2d8edd22ca
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8ZO46T3J\search[10].htmFilesize
130KB
MD5de176241106f67a0c5a2785a33d0b00c
SHA1832650892444728f65d999df5d63d241f863adea
SHA25656c956fdbc343bc36b4a9699bc785f9f94b5744ca3d55ac7301780e1e90cd4a5
SHA51243cb26f96a65c84c823ca9f177d630b1ead375cc510c8416d52e3e7c07ecc3c74e83614693ce71ea42a5f6b3798a4a292af6f7fcc653d1d2bd2268d9367ae5b2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8ZO46T3J\search[7].htmFilesize
133KB
MD56166dd906c4b2a7f5989434b2f42a619
SHA1567e8ceeddf06652d2457cc83b9223c98c6859e3
SHA2564088485c6b0eae403b402af2884e065a84801974411eb4a44c0a36e54d6bc162
SHA512b1170371d5e5d8e9d174eb41d7d6d50461cbab590dcdfde789f01123c820b57bdb6c6e18794eea6da48521fe0ce1a1439f9f602d84e3ab7d5f951ead91356d39
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BHC2O5WS\9MJL9W88.htmFilesize
175KB
MD554ac63936c524032cc962aa19fbffac1
SHA13c32ca6262a142cf812dfc8e3ed7a1f3725f809c
SHA256a9fdf1c80b8667726a4140144430b52026950f8b6de1dc56a36ef72b813996cd
SHA512bc1ea574d85a49da03b02becd70b5494257248009fd6a38508823b18293ed95a0191080d9c35f15c41ee779fb1f3931ead58f4ffe60f652a6032ea85f2cf6434
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BHC2O5WS\MPW019G4.htmFilesize
175KB
MD5cf97f276a1771eabf691b4aac4a83e4b
SHA1c224aedf403d395e84cac57333a493c5706d34a6
SHA25602626c590b368611add1bcb0e4744321522ebf9d4b2c8cfa869ad610fa2c3349
SHA5125c2ee921eb1edc0c38aa73efbc2e01ef9774556d04df18d84e6fa606f42c022e4bf1fdfcaf5105215e2ae0671e4259e7992da679b9e5dbe68b4eeb07a572f0f4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BHC2O5WS\default[2].htmFilesize
312B
MD5c15952329e9cd008b41f979b6c76b9a2
SHA153c58cc742b5a0273df8d01ba2779a979c1ff967
SHA2565d065a88f9a1fb565c2d70e87148d469dd9dcbbefea4ccc8c181745eda748ab7
SHA5126aecdd949abcd2cb54e2fe3e1171ee47c247aa3980a0847b9934f506ef9b2d3180831adf6554c68b0621f9f9f3cd88767ef9487bc6e51cecd6a8857099a7b296
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BHC2O5WS\results[2].htmFilesize
1KB
MD5ee4aed56584bf64c08683064e422b722
SHA145e5ba33f57c6848e84b66e7e856a6b60af6c4a8
SHA256a4e6ba8c1fe3df423e6f17fcbeeaa7e90e2bd2fffe8f98ff4b3e6ed970e32c61
SHA512058f023cb934a00c8f1c689001438c9bdd067d923ddcbe7a951f54d3ca82218803e0e81fbc9af5c56375ff7961deed0359af1ffa7335d41379ee97d01a76ded6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BHC2O5WS\search1O5L93XW.htmFilesize
167KB
MD54153302e121a7cfbe584e0cd64eb82c5
SHA17a535b7dcee63c8c51e776f36c0586a27124f24e
SHA2565aa6d397cdfd7d39c115824a32064765c54367575dd819aeee55ffca0b6e70dc
SHA5122f2c00b1ffad5ce54cd9959314681539bbacc0913366ace7b3f061f1b31321a5c190fa3dc10face7937f931dda19a49306faaf607042e1fc19e0ae435500b35b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BHC2O5WS\searchMVYHI7R1.htmFilesize
130KB
MD57c5e72fd193e7ca982635bdef6012d1d
SHA1c3faf603abe01a2b1ca5567a2a5fdd13f03fb04a
SHA25687d411375e861ad657d44cb86c5c834ab3b7b179b210f368601ac2db41f7b91a
SHA5120e11b3fbc453794f82fe7df71a1977510421ba8ef94668e3b6c6804e726d5c6d8628767db8ecdda26b7245f4dca7f597893fc988e39c9c4b930efb9e1b1fa57d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BHC2O5WS\searchP28FM5E8.htmFilesize
149KB
MD59e9fe1cc9b8adf3c3d3c7106c809afb6
SHA1aeafd5eb229275bcaf61b6975ac8c3ad0fac0507
SHA256d45c68bb9b3d0e46aba5d87b456d8c03e9b84e7f80ed2623a4678e84c69598e9
SHA512d015347b6d7c92606e36d060d8fa3a3a5978cc06e999db6b01ac15fd8e71278a45f6a2ab6a8f6c51ae1087f143757dde068facd1364a06167ed5893559babb29
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BHC2O5WS\searchZDFE1ZQ0.htmFilesize
141KB
MD5a2cade43ffa3f77473d4b13b5381a380
SHA13b1af2be4ee94f76df28a2246236ce264c25311c
SHA2569a49576051bcb2d40f06372e5200e1ac1d6774b01102f48b8f3c1b3094bfddde
SHA5127e9c4ad04f8acb9173a210c30764693203d51ea9ab39b40ecb916d95a5a0a901b3be5cc8415d634f15903e98d36d0ab48f5c6dbd59c113752eb48ec18e9543b7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BHC2O5WS\search[5].htmFilesize
123KB
MD5355ba8df2249f0aa8043a59dcd5a6027
SHA118d8e252988f1d0c2fafe08b98d426950659ab12
SHA256e224c510fae68c7f303be62b174452dc37ac863ddba3f1489b634719178b8f29
SHA512eb7e3ad24a3356d7f43f4eeb7c5023fc3d8be3d5c698131d6866157f99440707ea1d8f457c4961bbf0f70ffe950de46e70d6eaade82aff78710846dac631dd36
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\O8VM10HV\search1IBRLZSM.htmFilesize
138KB
MD5f7ca2f1024a139eece11bb9cb447055b
SHA11267af5d4361e97d898201a584c2953243f1ecc1
SHA256999c631ec44cac5825632e228c83c28a03a0bcb72f5fd7ae2467b250a1c19f23
SHA512a9b7b14ef11103527ef5d33c7a5889f17c1cdf14a9ce2d10b9d41166de4f834458c4beac3ff83a7d50cfb51034328a90aee3d44771008a54da9d6799b94b126d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\O8VM10HV\search8XEDWDM1.htmFilesize
167KB
MD59ab3e33b0215a862ebab9a4cc758a38a
SHA11eefa8b3c92774c272f32e535987f261bdeeda30
SHA25669f88ff1e903d855c75583132de963a2616cc3d682b32458af03a795b39496ae
SHA512ab2d928895c3c5c0ceb45358ac974f8004dbd3f3dd35b497b174da5e9009a7fc6b2db20c4d95060ad766a603af4916ba255fea99f71b0506dc91114c89d78d27
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\O8VM10HV\searchG9CALA0E.htmFilesize
196KB
MD5197a86561086d0efca07fb1e3d9be7bf
SHA18c1e343f22eb10cb3401cdefc55edc8eeba13c74
SHA2568dc1c0b79076b749f2cfef49a0b702cd28eb42dc69ac9a449d329cbc372d1873
SHA512afeca8266cbb8d37423194aa63cd89ed718290e968810c022e7a68f83e9220a673d26f2b23b95160edb390103593e5466eea5678dd752bd2435b9caf39d77c2b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\O8VM10HV\search[1].htmFilesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\O8VM10HV\search[3].htmFilesize
156KB
MD5411036cf9290daf7efee0dfd2c68c38d
SHA1334e65bd7fec7401a34f97ee2831f762ebe48a78
SHA2569513308e54f2bec3f1d79b42f500dfb9ef06bfcf707b3b8b25a23300cb335c47
SHA512d57c592c5ddeff1f89a5d970eb48c9f7b355e14a1e3d33791ddc77b488a8eaad9497c1d8170b414d06c5ebd3a6e40584ac91c955ab4888dd841ffcf2ac36e499
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\X0OFMNIL\6GDLDTQK.htmFilesize
175KB
MD556014a6c7d962a06a3bc9f08b74d09de
SHA1b600cd0cce01afeeceb2f126d0efa7e2edd8ce5f
SHA256b71641f6f301255704d926a22582b53b98a0ebfb26bbc83fb7e7ff52dd140f92
SHA5129e372d1da9a56e915d947e194508b4bf9d86748f403c26479827ea9b0557bbb6ebc63b85b2f6c694f77822643da23a72e026eb358ed86fab6c5520c55c134cc3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\X0OFMNIL\searchBRD8P9N4.htmFilesize
113KB
MD58727d35a6c90dc36841f696f658223d7
SHA198d6eaf995dd86a8d32939965dbc7532aa33e047
SHA25635d06bd7c77c427e8117fe4a64e8242a1e88beda38eb0e3d29b6a0feda4ab49e
SHA5126aa28a1b83a01c5349e3408a674dfa802f174957cd31c972aa6c5bbecd82fc5db261091a2dd64a8f3ce4834814fe24ed3d157dc60539a8f9aa262b0b31bc20fb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\X0OFMNIL\search[7].htmFilesize
122KB
MD549084f6b69721f01ca01da092135e465
SHA1908a70daf622bf101f4eaae4800737d405198991
SHA25669744ab8342813de38bf96fad97a9aa547b5298149986c31ffb5a801af19e9a8
SHA512365b4a5b72a0b6a2684e7613cd7b1e49481353b92ebb62cdebdc2289135bec1c735974597f1521a65b483c6e1b827c01d13a141343e47e54f5c723039388283b
-
C:\Users\Admin\AppData\Local\Temp\ngnckogk.logFilesize
1KB
MD521183eeec2230fa23e764ab551722f04
SHA16278a694d2d345ba0d115858282c0cadf1145527
SHA256b33eb7f8fe2a65bad8fcdfe1bc7793ae0df5efc4b0cc47ecd7b7ad28e143cf08
SHA51213749f4d3b57b7b383e80f833625c11107d309cda986c55e2ace48d3786194bb1a58a277f3134846669e3911abd7900d015e95eefbff969bd8500c7954215194
-
C:\Users\Admin\AppData\Local\Temp\tmpBB2D.tmpFilesize
28KB
MD53860ad11acd3afa5be341cc6d22d7928
SHA109fee2cc2e9a96516f4fbec3a963e07f8c9dfbc3
SHA2565490c895a7ded3b28ae16fd225020bb6fc7604c471709a45d1a15e0fd6e3a57d
SHA512c075330e71343243032792b177267dda14ff016cea39f1607485642a58964f3d2c117068f8c48eab4d93fe4f629b2469ec5b93588384f069502121cfb9b8ccdd
-
C:\Users\Admin\AppData\Local\Temp\tmpBB30.tmpFilesize
28KB
MD5e33fef53e9aebde1c447c56faf44762a
SHA11e2dc138cf72839d3081b73e42f69cc3dcb2bb6a
SHA25666769a96d215d643953a52e4086cda84e242b46f5652ac5eca3b28c4761cd7a9
SHA5124d7cd947f18d1c1e980d3f5c619da1b19218f1fde9682bfc8f29546bb6492214f23940987087888fe3eb7403476c2b29373aae1c762ca21981b5a72d019f0d9a
-
C:\Users\Admin\AppData\Local\Temp\zincite.logFilesize
1KB
MD5dc37da51daea55f0d6a42cb73c9d4326
SHA167ddfc9a05bd24aa1e67baf4fef395673f9ee58b
SHA25618cc72869948dac92eff7b4ac20d362eb8b36144e5865bc5f6bd1accf0cf1a8d
SHA512fc0345dfad6df5eb168d5396990354f609b6be5310d105a1bfd5332e9db9baf96ce4fe887b4b676b7ab0e8e95cb7adc113f2d1c4a9d1f52d740eabd706094946
-
C:\Users\Admin\AppData\Local\Temp\zincite.logFilesize
1KB
MD596442d436888f338ab3cc43d57ca469f
SHA1a83682b826f653de728234213a6a8bd505af8e55
SHA25650c1d33c4af35046b133d6d3ed40f370973d223bb6b8af0edbedf5a4302ea9d0
SHA5129bb66716964ebf8d0f36b4b1861c4111c7ecba913d1988c01fd53e7e8b4e47ab3210967b0b89f5abd35e6cdc137c0c668daedbbe72040307d2bbd5eeeccae380
-
C:\Users\Admin\AppData\Local\Temp\zincite.logFilesize
1KB
MD57506b8900f25ce3bca9c7b97b1258b49
SHA17bdcd85d66defa59fff9852be3b7a41239cbb137
SHA256ea8337c48a8d854bce007a099876603599e587f6aaeb0017b7ee03c9fce8705b
SHA512cc00ab48875a48af1baa9c560297491f30dd64ec362dde3d496737b27ce52d1ea15277962aced775f94ee09342f38a3f9d05dd7386ff1746f1c8c3b12967c84d
-
C:\Users\Admin\AppData\Local\Temp\zincite.logFilesize
1KB
MD595a80559f61f398675735e5b42a1cc62
SHA16e00c989637c4496ecd43134d68c7908a788b384
SHA256173739f301f195a3a4b1e123caac49b59e6370d91d51adc3d7e2de864c865f70
SHA512aa5939aa6a17af3a9927e7806a1f8fcd0e9115afb3a7c6ed6132896e8295c6d8b11b5bf11cbb65eb6a0d3964bee72d2111dffdb7a7e46406f6b3cf58d1e522fe
-
C:\Users\Admin\AppData\Local\Temp\zincite.logFilesize
1KB
MD5b6c90f87f7e2798aa755a2c7165d683b
SHA1cd4b0544ccdc37481f529e816ed3832fea35b854
SHA256e2692cd4a186b749fa43b950e3f600a169211135bbaecfa291f0bdf5bac4e61c
SHA5121c9d35857b378dac88bb87ed0a54465916ac36b26c01e7e1c648ea1fd7cacda6c18397aed12b51bd419673338640bc39480c18044c36c466e739127d811085a5
-
C:\Windows\services.exeFilesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2
-
memory/1380-31-0x0000000000500000-0x0000000000510000-memory.dmpFilesize
64KB
-
memory/1380-0-0x0000000000500000-0x0000000000510000-memory.dmpFilesize
64KB
-
memory/1380-394-0x0000000000500000-0x0000000000510000-memory.dmpFilesize
64KB
-
memory/1380-84-0x0000000000500000-0x0000000000510000-memory.dmpFilesize
64KB
-
memory/1380-26-0x0000000000500000-0x0000000000510000-memory.dmpFilesize
64KB
-
memory/1380-364-0x0000000000500000-0x0000000000510000-memory.dmpFilesize
64KB
-
memory/1380-14-0x0000000000500000-0x0000000000510000-memory.dmpFilesize
64KB
-
memory/1380-499-0x0000000000500000-0x0000000000510000-memory.dmpFilesize
64KB
-
memory/1380-371-0x0000000000500000-0x0000000000510000-memory.dmpFilesize
64KB
-
memory/1380-3-0x0000000000500000-0x0000000000510000-memory.dmpFilesize
64KB
-
memory/1380-247-0x0000000000500000-0x0000000000510000-memory.dmpFilesize
64KB
-
memory/1380-392-0x0000000000500000-0x0000000000510000-memory.dmpFilesize
64KB
-
memory/1380-656-0x0000000000500000-0x0000000000510000-memory.dmpFilesize
64KB
-
memory/4808-389-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4808-395-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4808-393-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4808-22-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4808-20-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4808-15-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4808-367-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4808-365-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4808-536-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4808-27-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4808-6-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4808-32-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4808-248-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4808-85-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4808-685-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB