Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/05/2024, 19:06

General

  • Target

    215057ac490b0c2564becb8482330d67_JaffaCakes118.exe

  • Size

    2.5MB

  • MD5

    215057ac490b0c2564becb8482330d67

  • SHA1

    e2fa1ce5ad9e2ba104ae9a2403455b465e7b28c1

  • SHA256

    dcd5e8958f299309d859ac081d0a64cc34a12d609185889ebbdda833b1319b5f

  • SHA512

    4e73d36d6a2461943a324a591dfd3e9ee2c43972ec0e0eb6e6bd75becbecd0858a738e8a51dc6eef152accab31301991b1562929e5cd5b8c0288bf89a5be4c8b

  • SSDEEP

    49152:nY9MWFHW4vzYvqM0VS0/C2FGthbTzErAbCS:sDF2OzYvyVt/4hbTzQAbt

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\215057ac490b0c2564becb8482330d67_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\215057ac490b0c2564becb8482330d67_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Users\Admin\AppData\Local\Temp\215057ac490b0c2564becb8482330d67_jaffacakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\215057ac490b0c2564becb8482330d67_jaffacakes118.exe" C:\Users\Admin\AppData\Local\Temp\215057ac490b0c2564becb8482330d67_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2012
    • C:\Program Files (x86)\Adobe\acrotray.exe
      "C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\215057ac490b0c2564becb8482330d67_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2628
      • C:\Program Files (x86)\Adobe\acrotray.exe
        "C:\Program Files (x86)\Adobe\acrotray.exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\215057ac490b0c2564becb8482330d67_JaffaCakes118.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2816
      • C:\Program Files (x86)\Adobe\acrotray .exe
        "C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\215057ac490b0c2564becb8482330d67_JaffaCakes118.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2436
        • C:\Program Files (x86)\Adobe\acrotray .exe
          "C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\215057ac490b0c2564becb8482330d67_JaffaCakes118.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2448
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2856
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2856 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2508
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2856 CREDAT:734221 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Adobe\acrotray .exe

    Filesize

    2.5MB

    MD5

    3c53c6e8ece591be65b12d5eafacf5f3

    SHA1

    c643606483ce2dd2995d8605bd0ae5008fce5a09

    SHA256

    401e2a43b097ece4b0a7391040494826af7f168c95d69604a71ed6d4e546f05d

    SHA512

    3f615ea8e6ea80926dbaa0f4b4d29073ddf87e12fd365905c8d0f6c8a5b6ccc3ac1ee2a066575fc23d14993052dd9793608a0c3a128a0badf53f8c8451001789

  • C:\Program Files (x86)\Adobe\acrotray.exe

    Filesize

    2.5MB

    MD5

    3080e7be670df6e075ef097e22640047

    SHA1

    091888d11a0f7bd8794ead70855e4fb4f2e03342

    SHA256

    5b16073c6d39b19ff01f3f0a22039e713bcb2b80674c153edf81a7a40b9f244d

    SHA512

    39bc3d1614350f3cd59e7097413ce4a78509ccfb7068323a52b8b0cc463682984285b17a471256aff9f8bc402cd8927b43e5fa9790609c32eb956d971d84b778

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    4ef42170ad7909b49ed126ed7dd21edb

    SHA1

    833d2c66eeae5db2baed137ad51b7740017120ca

    SHA256

    38ec46540e758ac8dd23cf21a0ea86ae20591c17d52a439ec20e6a74e0e8a3db

    SHA512

    9145becc2672f8c0aeba94b7dd746ad8aed671fed7a612841716714ce01ac421de8d04a8eaaf7fa40e5b46de3f0f584d347835bf0770eb22eff0c8db97eb9781

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2b5cc1b6d7b118fcc6ab30b37b4f596a

    SHA1

    7ac80a963f1b490340389a743bf74b4260ce214b

    SHA256

    0c83d37ebf28507db82b5e7865f61ef1700a94539315c20c103c95d6b9f7dbbc

    SHA512

    5b673cd5ea4f339421307a6ea53893614662e0f10aa5a9b68123e0ddeaeaf1d6aab16791b513db5aa51854deda738539b5cd9128cbe7a992b87cb9d517c7b092

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    608671085328411b7f31a7c1cd71bdce

    SHA1

    7a14b1d8fb593a2defb3750ce329ffe96d47af46

    SHA256

    366d2423c5c8bcfdfddaef9a7740864c75b7d32148c97ebd98365c14a0a077c4

    SHA512

    e79e7095ef0bb69a34c9a707ce6f1f842492b71f82cd8f26de58ba0a149de1db76db70777c13df9fd77bff9cf629d06182fb7e283cb567ae3dfce5591dccdd73

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3d7f3343a88f2d3199806e4a903098c9

    SHA1

    641c1a52c99e4ebb108deaeabafd208937fda14a

    SHA256

    1acec1196afff9f6315b703fd63450bf6bca8221f8ab84761339a38398c7a03b

    SHA512

    ca4592d14daa11d7d26f85ddaf13b4edb6d01f20f135ca1e13b31aeca44ae1d8ffd41aa5ea3cef4ecb04226e04aa1f11187d4369957bb4237a183ccb0f3b6061

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    59134df2ea59e37f041b177bf745f86a

    SHA1

    02c4792a1830964686aa17e56e032dff255c34c8

    SHA256

    4c3537d15c58e50eedf69c1106bd6c957b013d2d62207052da16fa8870fd3a39

    SHA512

    30f2068cf71c2fb4e96e0ab8f0495aa11d04104088599877c7cf7f0fc465f33d92c2351f70459a321ef84e614062de34c90c1e3262ed6b83cc653071041b8a7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3d6b53eadf74aff8549cd48aa49faf70

    SHA1

    dad815cc9a4e3c6dcb62e0764945f11a25725c82

    SHA256

    ae8c2fec740b306f7a0c5a0ed5854d1a0a5cda61fae53cd0bf13cfeba5cba2f4

    SHA512

    861a7e4204d2df9189111070be0caede5a18ccf7c7a0850b2600c07acd3cfeab7bc6cd8355447ab6b64d7f14e0da018058cf17607fcf41598e4a2c1d484de18b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    839b9f8b1bd711ca8b1c2565ce159d3d

    SHA1

    172f76ca9a7622ebad6a09d7ee372ddfe80d8e3f

    SHA256

    38366b6bd44f6273df52956f40d91719af436525c7e61fe07221e9d2797e95c9

    SHA512

    918dc616c340732376bdae4b44139eba32fdd1148d91c712a24ce3c60f5733420b2651e8603b2875de9ded21814139fc818c81434e705d0092279c933c866256

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    12c22d4fc6a348bef3f0fe0cb445411b

    SHA1

    1681ddc91245e55da57d5cbc0321eef8893b1c9c

    SHA256

    072cd23a0fb06ca40b892827677ab0e2f17d94d6667cb1312162545904ecd55a

    SHA512

    bb4cc1e457849ed5630a19580fd267589c18306ad399281283ec559eb10d3b10f8d1628e246cacdba5af1bf6df426c4fc29d218e90e4657ed3448b83d4e69b2b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    501b28efb1f3c84e79ab30aca8f4297a

    SHA1

    15469a1afd349b5d8536f2bb37ed399d3e2bb14d

    SHA256

    85762b42656c313e811368446b73f6e3780e0f108a7fa1b699e6ce9db71a0689

    SHA512

    f926edb9bb06af9744a8bb3afe64497d239a33473bbdc2e1c7a12f2acf7743dad0d6e92bc4ea22c9ba1efab642c66f8754f5a61d11cf917e83d0d18f2a35ec83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c2260cd9c428a31d0845d6923b8ebdf0

    SHA1

    c342a2374505a61117864ae23381ff6c5d75cee2

    SHA256

    45cbdd6ae26bcedc65ef1e05b6b4abce5ff3d68dda100ff17f205116a849cb38

    SHA512

    9a62e3c96951756ec9ff17fc21c4cc89ed4cbda99e2102010577ca393f5b2f718a0bb8a98ac44fb2c772f0359be97ca61a7707cf83e47c5da89bc03f8b9d3cd2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9801807350da486394cc825669d71e3c

    SHA1

    e35614d6799257367892bf34c3527bbd43f9824f

    SHA256

    9121ecaa6e7e02a14ed5e966c1c6160e7d81f3cb4bb81631e6c74bd538c003be

    SHA512

    9e6fa045a4f172121872680a8ab7a47df8553d456b8f4e45a736a8a1158ceccbc57e73159314d04387977da16344385933d0c456958866367cd4079b6e3c3243

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f9b71aaf2e1b4d97f9b5a0a4b6b1658a

    SHA1

    da9548fceda410dbe473381b681989b958361525

    SHA256

    275b79bac9b3a2ef2920de6d069d6d7758a347cfecfb0693151d38f5d0064dfe

    SHA512

    c156a31e8f15b88b83be99fda83a0d74f7089178e8f6a4d9cee2f7aca371cf7eda72c8f577b02e7b637ee64e51b555b920091fbe05c2ac050fd628ed9cb56eb3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bda746c31abfb802c7cc9b10ab51065d

    SHA1

    2699d5a1e42f7022b160b1cf39229772bde5f0c9

    SHA256

    14698992e9fc69e1a95b06cd17c92fb3964fdf239ad1ff5bb2d1e88fe8f1984a

    SHA512

    dfe476b3c6ffa424fa00fe12c52ee705c085f9cdd6c08ac873ffc19753384604ba95d0ca96a731536602a9ec60223498d32eff75865267699bc1a26384a025fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c9b4d1b34b286f860446a05e576436aa

    SHA1

    892dd59a728e91c1b99298f6e216aebf65272417

    SHA256

    850b0e89d65892d0a0b800e23a694c53d82d7630fcbedc815817576274cdbd0d

    SHA512

    df06e1a49ce8618c1acdf19158552233a7726cd3b29120aa8f79d9400611db8376daab1a4aa289c43d5881b81e0754449a0471dab8dabeb5d68abc7209c3fdd2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3e8706c214ebc426638052ec2a2156a9

    SHA1

    e419e97311c2516cbcb6cd803eade2bfa0d9eaf4

    SHA256

    30a8e5704e99dfb379aab21623779bb42436b8c566cad49afb6af6bb8f0b3609

    SHA512

    94094fc4abcbd440b3372720ee3de113aece140a2f23be867d6a6b670ebfe41fac49fe47704f7a1bc88bc75dab0d79be54f675ed18a9bf51c46f11865fdf32b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3a4e6b7ab9c4b2c2c3b12bc2b66b6c26

    SHA1

    4903147b49730aa9b205f6035e17a0b999891fc2

    SHA256

    61877b95afa8182a570cbe6e237e442b7bada1f7817a3b4e0ea1e7ee996e5dcf

    SHA512

    ccbc8e31365d3813f853e7d955744d0ecf0a136642e570247aa6897539b92eae97e247a12c8c58c89906e709a83ba4ec71dcf4facebe1b1e26b294ea12a8a93a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ecc32f6114ac7555eab3bc292780a3b3

    SHA1

    a0efc404724332b61f7bbdfcd41ba3f6f6d855d0

    SHA256

    fa8b2d9cc8fd758e026a0fea2d1c11f28c46fb436e7c0e9b94c5929c6209cf5c

    SHA512

    7fc81eccb01d35274b6f233cfcbf2234c03387f00d2b9a703cc5882568761e2c502203ca2efc870082ff8e96c3e6688c1173c5ec199eb4a8fa5179d438f76115

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    2dfbfc52c10ea9fea6183573c201ea9e

    SHA1

    b909471b8dd92979f2ec04dafc915482c99f6985

    SHA256

    4133eefa178fadf6e96cdfac31f265ebaaf4e008362036b60c4af719f3ec98da

    SHA512

    76d4460c9784cb3c983586665bbc6306305ae8a63a187971bdae275baae39c8d0e164db9d7ecfea494c9438a04f938958bd92a3341a59a696f41339cdd023294

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    62a473be18074de5c212b9aa782b0a5b

    SHA1

    e38b6a1b3402108d677ef737081ff51255eec080

    SHA256

    c28df5adb08d52d8182b4e0d69f9642fe000e552decaaf03908069f593948355

    SHA512

    c2473e493b89d0c7dd1a26e0da9a136d1b6b1382d8f3a1c5b9fcb424aec1d053804f7f52e5e26781077e9a41813f7905d5caa30f23b731b16b8c0d66c62ad2e9

  • C:\Users\Admin\AppData\Local\Temp\Cab7060.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar7100.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\Tar7193.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\XIOSUKY4EOZHK5JPKIST.temp

    Filesize

    3KB

    MD5

    d99120442c9fc6a02aac7f8e3b5c5d28

    SHA1

    b3cb4103fd1af3f78f8568b32e34fb0301c0b0cd

    SHA256

    83b96bd90999d24b29e75874cbc0e4fe485fc4f7438eec03ff7a06ab79a21b68

    SHA512

    fcf31d7dfccfba97d7a5d36a8693072f6cee32354263023ce64f26759d56c4cd34841db503363f31f0849cc77817c759426cfc18f82270e7d24f5237d026da49

  • memory/2408-1-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/2408-38-0x0000000003700000-0x0000000003702000-memory.dmp

    Filesize

    8KB