Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 15:02
Static task
static1
Behavioral task
behavioral1
Sample
725b017f22918c02995ebf4c90ddc7ed_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
725b017f22918c02995ebf4c90ddc7ed_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
725b017f22918c02995ebf4c90ddc7ed_JaffaCakes118.html
-
Size
158KB
-
MD5
725b017f22918c02995ebf4c90ddc7ed
-
SHA1
4a23ea1803d99cc9beb664a37a8d92ae17a75969
-
SHA256
70084ec8b3c7b0bc77f0ac48e6d243bd7bd2a5bfc30d2045cef12350871fe7aa
-
SHA512
71e77fda77d5c2b57103c99c726144263ad3985b882a121c71e4ed96e2bbb009f08f5f2a53174385acc17ca8b30b40d0b34c6731f0353268b75dd6018da763dd
-
SSDEEP
3072:ilouCrPEQgyyfkMY+BES09JXAnyrZalI+YQ:iWhgQg3sMYod+X3oI+YQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
svchost.exeDesktopLayer.exepid process 1632 svchost.exe 2872 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
Processes:
IEXPLORE.EXEsvchost.exepid process 2064 IEXPLORE.EXE 1632 svchost.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\svchost.exe upx behavioral1/memory/1632-434-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1632-438-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1632-437-0x0000000000230000-0x000000000023F000-memory.dmp upx behavioral1/memory/2872-448-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\pxFC2A.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000000c4bffc861990eecccd11ef316a91bf884fae38047aadf444a4de332f64d6248000000000e8000000002000020000000b70d8339f2d014644a8a6c8d3f0faaa7e17daff547bfe404f969cf11c9b73be320000000f120e8bdae294809f94c1b5638c59f908144358d2cad91116f69446a8c936ba240000000ccbc89a9e4a3c2c9e14e445c0443376e2154054f8ccba76af2a4c55d80dcd488339ce44c5ab4d857b77fb9610e9527a843919f7edb4e79f2a425975a8ed39e9d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0F2B6F51-1AAA-11EF-9B88-D6B84878A518} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422812187" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e03ce42ab7aeda01 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
DesktopLayer.exepid process 2872 DesktopLayer.exe 2872 DesktopLayer.exe 2872 DesktopLayer.exe 2872 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exepid process 2296 iexplore.exe 2296 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 2296 iexplore.exe 2296 iexplore.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2296 iexplore.exe 2296 iexplore.exe 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
iexplore.exeIEXPLORE.EXEsvchost.exeDesktopLayer.exedescription pid process target process PID 2296 wrote to memory of 2064 2296 iexplore.exe IEXPLORE.EXE PID 2296 wrote to memory of 2064 2296 iexplore.exe IEXPLORE.EXE PID 2296 wrote to memory of 2064 2296 iexplore.exe IEXPLORE.EXE PID 2296 wrote to memory of 2064 2296 iexplore.exe IEXPLORE.EXE PID 2064 wrote to memory of 1632 2064 IEXPLORE.EXE svchost.exe PID 2064 wrote to memory of 1632 2064 IEXPLORE.EXE svchost.exe PID 2064 wrote to memory of 1632 2064 IEXPLORE.EXE svchost.exe PID 2064 wrote to memory of 1632 2064 IEXPLORE.EXE svchost.exe PID 1632 wrote to memory of 2872 1632 svchost.exe DesktopLayer.exe PID 1632 wrote to memory of 2872 1632 svchost.exe DesktopLayer.exe PID 1632 wrote to memory of 2872 1632 svchost.exe DesktopLayer.exe PID 1632 wrote to memory of 2872 1632 svchost.exe DesktopLayer.exe PID 2872 wrote to memory of 2292 2872 DesktopLayer.exe iexplore.exe PID 2872 wrote to memory of 2292 2872 DesktopLayer.exe iexplore.exe PID 2872 wrote to memory of 2292 2872 DesktopLayer.exe iexplore.exe PID 2872 wrote to memory of 2292 2872 DesktopLayer.exe iexplore.exe PID 2296 wrote to memory of 1708 2296 iexplore.exe IEXPLORE.EXE PID 2296 wrote to memory of 1708 2296 iexplore.exe IEXPLORE.EXE PID 2296 wrote to memory of 1708 2296 iexplore.exe IEXPLORE.EXE PID 2296 wrote to memory of 1708 2296 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\725b017f22918c02995ebf4c90ddc7ed_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275477 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5bafb74674aa52034f9c06cd60e0f487f
SHA11ad561bc9219bbd8fca591addd6123699590bb35
SHA256d83a62327cb9b466e27043ffaaed2da8b7a99ecaa91a2f4078132e753e1f2106
SHA512f2d628126a34e0415a1b31a137d9c89b97ae74ead810ea45c478e83dd19a4aa1d5e6f6079dc17c444dc528bc26c534679d3916921c542ff6750e4ed69e0d2e36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD555756f073f9273338f6746debf3535a9
SHA114ce2e5baca1fbe6e0fa22f337ca1b141835d7f0
SHA256247c6b4f6edc572c5f8db7722d18634cdde06afd103336d063e5c7181bebdfdc
SHA51265c6affa2cf7b8ba2bbd1dc4ea3935cc7248ccb69ee95bae73a0fbc702c9f9b5b00ae876003ce35e08037de8b4dae1738e1dda751ffe50b65a2e9cd57e2e7c6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57cc071fa63f7b301023146cba3fe42dc
SHA1f302783bbb2484871c812fc491d9c73ab18f9163
SHA256c8574b31219d05e22578c6f7dcb180639dd5cdac2c8ec42504b3a595f9386739
SHA512bc96ca166e02c38a30dc295e9f131eb7b31202c35e97a9167f16859eabb05e85626b89e3b74e38d9713d788e3923919b27b6855feb4f0e77f5ff720eb3498eb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d8e3e35d76ae4e5f6470fc3a85082d66
SHA1c48cfbf9aaa75e3afcb0c068cf668b7ac0e22cd8
SHA256d6c8ed725b459c55d53af7f7c897d7091016929d2b712b9adf746528be3f8107
SHA512f1558fc4af53b29bcf50bcdebecffcc44350dadee37879d9695b1bac05bc5d0ccab1766fef3aea65302a638fcf8aed4e75e77d8b56ef693b9486ecac36827d01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56f877ad69aac9ff169c3eac78097b5a1
SHA17ac96730f9602e6036f2f94537be462d6b551d7d
SHA25625de6af86cec20aa1d502075952a8188a675638a9dcd30fee4f559b832603493
SHA512c8a1da56d3d6edd96416e621fba0f39a2752fe1cfb4cc3a02a5f741f0ede52dc76ff369a945ec914c523c9f76e96be3890ab4a4c519cffc2e36f50df43b2b957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55e63101c1ab63f646337f10593aa6fc1
SHA1f536c479afec57b40408e4dd10fd57880d533dfd
SHA256ff8d5f6b35fd0173aca2411e0ac195362d3fbf66c9fa8e28c732776b94fb226c
SHA5128a4a3811c33cdbdaed44e5b962588d404b5a52243c95c794b2b5507b08a643319d557f8ad152c0c932870da34b3fd888649c208e3e5809bfc1ba6ad208242e1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b5f3eaaae89424879e40e9d9420b6eeb
SHA1c1cede26e867f4b676a898263ba64d0bd7fe5574
SHA2563956d70fc65509da1f1402d936968dfab04ea91e6b2b501aeffd6bf3296c2108
SHA512cfb571a3639e916faa8bf56c7606cdfcb9f181070d4db05424d505b878451c97e4633ced6bbc2fc25d55eb82bf9da2ddab4d8bbc0c749b483928b22df283085d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD558fd5a037fe5365d8cf0a5acedcf6540
SHA13e2449b31c3ca2acf536ce56c968812bd6c3d67a
SHA256bc849be02217009c4e9e006d16dd48bdc837696ac71a55a92611b6ce072ee297
SHA512ccbca037073c1a1362e573b90efeb1b2b44ffc7145d6d5cfa58169b6f3fedb054011b60f30340f807db3a6f07392a7d10b5e0c347c358587c305768f8294a4b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD578885dcaecebd3a854deb4aed32bf3d9
SHA18243ed3dc5f515f57bee2394a8b4d52f1e082324
SHA2569ab51828ae1bb8fd34865e1b05d977889f2ddbe90b61ad3065c94813e8f51050
SHA512ef4e11a354059f6a906e1ae608d1dab614987f9b4af1bf61ca8daa32f4a2ee4bf31fcb8fb0701bd111658ebd4efa6c0ea6cf480104f268002b55eb9110e4ad52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54d36913212eb3cb83d9c3fa2297bd441
SHA1843748187f75dc2ad4b69b1a1510fbd590e3ce7c
SHA256ae2fd9437c17b491de5a5ddb3d10215dd3d4bcd13860db6682b0dafdef7855a7
SHA512388ad0592604d4ea219f7db21e15d1be862983477e1b2b41cc01dbaf10bf5d3928ecf5472920089128540dec4842d667752e4a64081d45d054a882a2c94f1fc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53b53b9adab7c68bb44f016b3426356e6
SHA1a6ff001416785def88a00bd8a36c307a8ee70783
SHA2566fcd30281a8fc29f5e1af9e3e18a8c18c7cd77fb4be9ed5f9edda9504506616e
SHA51232a6f91a39f7d8ff0f88b1f30087ce9df15586c23ec55bf9f138bc28ef4db3217b3702deccae36b0382f528a65a1c7f669c6258e6837ebf112607f6119a8f550
-
C:\Users\Admin\AppData\Local\Temp\Cab26C3.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar2725.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
memory/1632-442-0x0000000000240000-0x000000000026E000-memory.dmpFilesize
184KB
-
memory/1632-434-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1632-438-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1632-437-0x0000000000230000-0x000000000023F000-memory.dmpFilesize
60KB
-
memory/2872-446-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/2872-448-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB