Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
02-07-2024 07:52
Static task
static1
Behavioral task
behavioral1
Sample
1e88c95fd3adff10c0b222fbf4eb0948_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
1e88c95fd3adff10c0b222fbf4eb0948_JaffaCakes118.exe
-
Size
93KB
-
MD5
1e88c95fd3adff10c0b222fbf4eb0948
-
SHA1
792fba645755b28b4a99c5a8e82ed796a0116dae
-
SHA256
e6ed3cecfb6b68358bb98c24cf2af4b76e3d9965f5b4a66235ba75bb1c35a765
-
SHA512
e1d8e14f8a1102804236a11a20bad2246b45960b89d5caa05c748358f64facefe79853326913cf26ec6b9b4df7ab6f7dd74849d2b42192a2ada819f199606e0e
-
SSDEEP
1536:zZnxm6MG9xgfrvEaoiT/GyphjXDYjKwttoswRmhApEc:NnxwgxgfR/DVG7wBpEc
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
WaterMark.exepid process 3036 WaterMark.exe -
Loads dropped DLL 2 IoCs
Processes:
1e88c95fd3adff10c0b222fbf4eb0948_JaffaCakes118.exepid process 2848 1e88c95fd3adff10c0b222fbf4eb0948_JaffaCakes118.exe 2848 1e88c95fd3adff10c0b222fbf4eb0948_JaffaCakes118.exe -
Processes:
resource yara_rule behavioral1/memory/2848-2-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2848-1-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2848-7-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2848-6-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2848-4-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2848-3-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2848-9-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/3036-28-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/3036-537-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/3036-540-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 64 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Program Files\Common Files\System\Ole DB\msdasql.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\msvcr100.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.DirectoryServices.AccountManagement.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libx265_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libdeinterlace_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libdemux_chromecast_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libts_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\RELEASE-NOTES.html svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jsdt.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\about.html svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\System.RunTime.Serialization.Resources.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\tpcps.dll svchost.exe File opened for modification C:\Program Files\Internet Explorer\pdm.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\cpu.html svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Orange Circles.htm svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\license.html svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\mux\libmux_dummy_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libhqdn3d_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\hprof.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\PresentationFramework.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\control\libnetsync_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\epl-v10.html svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\Microsoft.VisualC.STLCLR.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\misc\libfingerprinter_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\libvmem_plugin.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Web.Abstractions.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libstl_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\mux\libmux_asf_plugin.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VC\msdia90.dll svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-environment-l1-1-0.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\System.ServiceModel.Resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\System.Management.Instrumentation.Resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\Microsoft.Build.Utilities.v3.5.resources.dll svchost.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\sunec.dll svchost.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOHTMED.EXE svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libudp_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\services_discovery\libmicrodns_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\hprof.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\epl-v10.html svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\System.Speech.resources.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\picturePuzzle.html svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\1.7\Microsoft.Ink.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\UIAutomationTypes.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\liblpcm_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\control\libgestures_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libi422_yuy2_mmx_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libinvert_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\pencht.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\InkDiv.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\1033\ACERECR.DLL svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\mojo_core.dll svchost.exe File opened for modification C:\Program Files\Internet Explorer\IEShims.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\verify.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\System.Data.Services.Client.resources.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\cpu.html svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACEODEXL.DLL svchost.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\en-US\MSTTSFrontendENU.dll svchost.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\sqloledb.dll svchost.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
Processes:
WaterMark.exesvchost.exepid process 3036 WaterMark.exe 3036 WaterMark.exe 3036 WaterMark.exe 3036 WaterMark.exe 3036 WaterMark.exe 3036 WaterMark.exe 3036 WaterMark.exe 3036 WaterMark.exe 2484 svchost.exe 2484 svchost.exe 2484 svchost.exe 2484 svchost.exe 2484 svchost.exe 2484 svchost.exe 2484 svchost.exe 2484 svchost.exe 2484 svchost.exe 2484 svchost.exe 2484 svchost.exe 2484 svchost.exe 2484 svchost.exe 2484 svchost.exe 2484 svchost.exe 2484 svchost.exe 2484 svchost.exe 2484 svchost.exe 2484 svchost.exe 2484 svchost.exe 2484 svchost.exe 2484 svchost.exe 2484 svchost.exe 2484 svchost.exe 2484 svchost.exe 2484 svchost.exe 2484 svchost.exe 2484 svchost.exe 2484 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WaterMark.exesvchost.exedescription pid process Token: SeDebugPrivilege 3036 WaterMark.exe Token: SeDebugPrivilege 2484 svchost.exe Token: SeDebugPrivilege 3036 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
1e88c95fd3adff10c0b222fbf4eb0948_JaffaCakes118.exeWaterMark.exepid process 2848 1e88c95fd3adff10c0b222fbf4eb0948_JaffaCakes118.exe 3036 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1e88c95fd3adff10c0b222fbf4eb0948_JaffaCakes118.exeWaterMark.exesvchost.exedescription pid process target process PID 2848 wrote to memory of 3036 2848 1e88c95fd3adff10c0b222fbf4eb0948_JaffaCakes118.exe WaterMark.exe PID 2848 wrote to memory of 3036 2848 1e88c95fd3adff10c0b222fbf4eb0948_JaffaCakes118.exe WaterMark.exe PID 2848 wrote to memory of 3036 2848 1e88c95fd3adff10c0b222fbf4eb0948_JaffaCakes118.exe WaterMark.exe PID 2848 wrote to memory of 3036 2848 1e88c95fd3adff10c0b222fbf4eb0948_JaffaCakes118.exe WaterMark.exe PID 3036 wrote to memory of 2700 3036 WaterMark.exe svchost.exe PID 3036 wrote to memory of 2700 3036 WaterMark.exe svchost.exe PID 3036 wrote to memory of 2700 3036 WaterMark.exe svchost.exe PID 3036 wrote to memory of 2700 3036 WaterMark.exe svchost.exe PID 3036 wrote to memory of 2700 3036 WaterMark.exe svchost.exe PID 3036 wrote to memory of 2700 3036 WaterMark.exe svchost.exe PID 3036 wrote to memory of 2700 3036 WaterMark.exe svchost.exe PID 3036 wrote to memory of 2700 3036 WaterMark.exe svchost.exe PID 3036 wrote to memory of 2700 3036 WaterMark.exe svchost.exe PID 3036 wrote to memory of 2700 3036 WaterMark.exe svchost.exe PID 3036 wrote to memory of 2484 3036 WaterMark.exe svchost.exe PID 3036 wrote to memory of 2484 3036 WaterMark.exe svchost.exe PID 3036 wrote to memory of 2484 3036 WaterMark.exe svchost.exe PID 3036 wrote to memory of 2484 3036 WaterMark.exe svchost.exe PID 3036 wrote to memory of 2484 3036 WaterMark.exe svchost.exe PID 3036 wrote to memory of 2484 3036 WaterMark.exe svchost.exe PID 3036 wrote to memory of 2484 3036 WaterMark.exe svchost.exe PID 3036 wrote to memory of 2484 3036 WaterMark.exe svchost.exe PID 3036 wrote to memory of 2484 3036 WaterMark.exe svchost.exe PID 3036 wrote to memory of 2484 3036 WaterMark.exe svchost.exe PID 2484 wrote to memory of 260 2484 svchost.exe smss.exe PID 2484 wrote to memory of 260 2484 svchost.exe smss.exe PID 2484 wrote to memory of 260 2484 svchost.exe smss.exe PID 2484 wrote to memory of 260 2484 svchost.exe smss.exe PID 2484 wrote to memory of 260 2484 svchost.exe smss.exe PID 2484 wrote to memory of 340 2484 svchost.exe csrss.exe PID 2484 wrote to memory of 340 2484 svchost.exe csrss.exe PID 2484 wrote to memory of 340 2484 svchost.exe csrss.exe PID 2484 wrote to memory of 340 2484 svchost.exe csrss.exe PID 2484 wrote to memory of 340 2484 svchost.exe csrss.exe PID 2484 wrote to memory of 388 2484 svchost.exe wininit.exe PID 2484 wrote to memory of 388 2484 svchost.exe wininit.exe PID 2484 wrote to memory of 388 2484 svchost.exe wininit.exe PID 2484 wrote to memory of 388 2484 svchost.exe wininit.exe PID 2484 wrote to memory of 388 2484 svchost.exe wininit.exe PID 2484 wrote to memory of 400 2484 svchost.exe csrss.exe PID 2484 wrote to memory of 400 2484 svchost.exe csrss.exe PID 2484 wrote to memory of 400 2484 svchost.exe csrss.exe PID 2484 wrote to memory of 400 2484 svchost.exe csrss.exe PID 2484 wrote to memory of 400 2484 svchost.exe csrss.exe PID 2484 wrote to memory of 436 2484 svchost.exe winlogon.exe PID 2484 wrote to memory of 436 2484 svchost.exe winlogon.exe PID 2484 wrote to memory of 436 2484 svchost.exe winlogon.exe PID 2484 wrote to memory of 436 2484 svchost.exe winlogon.exe PID 2484 wrote to memory of 436 2484 svchost.exe winlogon.exe PID 2484 wrote to memory of 484 2484 svchost.exe services.exe PID 2484 wrote to memory of 484 2484 svchost.exe services.exe PID 2484 wrote to memory of 484 2484 svchost.exe services.exe PID 2484 wrote to memory of 484 2484 svchost.exe services.exe PID 2484 wrote to memory of 484 2484 svchost.exe services.exe PID 2484 wrote to memory of 492 2484 svchost.exe lsass.exe PID 2484 wrote to memory of 492 2484 svchost.exe lsass.exe PID 2484 wrote to memory of 492 2484 svchost.exe lsass.exe PID 2484 wrote to memory of 492 2484 svchost.exe lsass.exe PID 2484 wrote to memory of 492 2484 svchost.exe lsass.exe PID 2484 wrote to memory of 500 2484 svchost.exe lsm.exe PID 2484 wrote to memory of 500 2484 svchost.exe lsm.exe PID 2484 wrote to memory of 500 2484 svchost.exe lsm.exe PID 2484 wrote to memory of 500 2484 svchost.exe lsm.exe PID 2484 wrote to memory of 500 2484 svchost.exe lsm.exe
Processes
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
-
C:\Windows\system32\wininit.exewininit.exe1⤵
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding4⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R4⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\1e88c95fd3adff10c0b222fbf4eb0948_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1e88c95fd3adff10c0b222fbf4eb0948_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.htmlFilesize
199KB
MD58e6a627cc9a8fe82fe74907395c13e36
SHA105239f68fcc84d6d11597c3e6fd89ab12cadf3fe
SHA25627157dbe9b3a256dca47f3c8d8b44ab10ac2a1c4f8d4567425dacf69428c3e99
SHA5123160310e8ff837550eb582a09d04d5de64402bd216d11bc845f0f8ff912e613f783782da4df30a327ecfdf334c1a29d67c4edf943d8609d5b6b446aa81b9c1a1
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.htmlFilesize
195KB
MD51dfaa93c1fffc1a54176f78476b52210
SHA1e84643408298f11594f8cda6cd3044a4b51a89c6
SHA256dc5a8fadeb4c29691b33a632bf111008ccd53dc6bd6a3c81e7f503eed7f9d532
SHA512638b71e68b7dd61d3a21f17181f7945e07318c45d60b6057f56636c343f1d4fa03ca344caabbadc2b45d4443447072319b66cdaa3f214f14fc466c0d4fdd3325
-
\Program Files (x86)\Microsoft\WaterMark.exeFilesize
93KB
MD51e88c95fd3adff10c0b222fbf4eb0948
SHA1792fba645755b28b4a99c5a8e82ed796a0116dae
SHA256e6ed3cecfb6b68358bb98c24cf2af4b76e3d9965f5b4a66235ba75bb1c35a765
SHA512e1d8e14f8a1102804236a11a20bad2246b45960b89d5caa05c748358f64facefe79853326913cf26ec6b9b4df7ab6f7dd74849d2b42192a2ada819f199606e0e
-
memory/2484-75-0x0000000020010000-0x000000002001B000-memory.dmpFilesize
44KB
-
memory/2484-77-0x0000000020010000-0x000000002001B000-memory.dmpFilesize
44KB
-
memory/2484-61-0x0000000020010000-0x000000002001B000-memory.dmpFilesize
44KB
-
memory/2484-71-0x0000000020010000-0x000000002001B000-memory.dmpFilesize
44KB
-
memory/2484-76-0x00000000001A0000-0x00000000001A1000-memory.dmpFilesize
4KB
-
memory/2484-181-0x00000000777A0000-0x00000000777A1000-memory.dmpFilesize
4KB
-
memory/2484-78-0x0000000020010000-0x000000002001B000-memory.dmpFilesize
44KB
-
memory/2484-79-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/2484-80-0x0000000020010000-0x000000002001B000-memory.dmpFilesize
44KB
-
memory/2700-55-0x0000000020010000-0x0000000020022000-memory.dmpFilesize
72KB
-
memory/2700-761-0x0000000020010000-0x0000000020022000-memory.dmpFilesize
72KB
-
memory/2700-32-0x0000000020010000-0x0000000020022000-memory.dmpFilesize
72KB
-
memory/2700-34-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB
-
memory/2700-42-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB
-
memory/2700-41-0x00000000000A0000-0x00000000000A1000-memory.dmpFilesize
4KB
-
memory/2700-43-0x0000000020010000-0x0000000020022000-memory.dmpFilesize
72KB
-
memory/2700-47-0x0000000000090000-0x0000000000091000-memory.dmpFilesize
4KB
-
memory/2700-50-0x0000000020010000-0x0000000020022000-memory.dmpFilesize
72KB
-
memory/2700-48-0x0000000020010000-0x0000000020022000-memory.dmpFilesize
72KB
-
memory/2848-3-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2848-7-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2848-6-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2848-1-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2848-4-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2848-2-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2848-5-0x0000000000140000-0x0000000000141000-memory.dmpFilesize
4KB
-
memory/2848-9-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2848-0-0x0000000000400000-0x000000000044A000-memory.dmpFilesize
296KB
-
memory/3036-24-0x0000000000400000-0x000000000044A000-memory.dmpFilesize
296KB
-
memory/3036-59-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/3036-28-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/3036-537-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/3036-540-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/3036-29-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/3036-30-0x000000007779F000-0x00000000777A0000-memory.dmpFilesize
4KB
-
memory/3036-70-0x000000007779F000-0x00000000777A0000-memory.dmpFilesize
4KB