Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 13:15

General

  • Target

    0e35d1aa1cd581494bccb286d0c9adff_JaffaCakes118.exe

  • Size

    920KB

  • MD5

    0e35d1aa1cd581494bccb286d0c9adff

  • SHA1

    1099d1119361c2a5f4867bcf16e2a25d4874db7b

  • SHA256

    69e885cae86457c4a4b21095555cd0906ff22dfc34b65b0b45b633aaae30dda7

  • SHA512

    00b0fddcb97dfead478d227f6d00334ce308ab6ad40ef1e5b90db8cebe121f059e2bfc649e819339e5b66b3effe458aef610df784d5f665fad6b912395ce93db

  • SSDEEP

    24576:KeFDHYvmR38IJS7kF6lDJqLGT4RSskUMFiHYrWMj3:7FbR547kQlDJqDzHsl

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 11 IoCs
  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 64 IoCs
  • Drops file in System32 directory 44 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e35d1aa1cd581494bccb286d0c9adff_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0e35d1aa1cd581494bccb286d0c9adff_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Windows\SysWOW64\svehost.exe
      C:\Windows\system32\svehost.exe 728 "C:\Users\Admin\AppData\Local\Temp\0e35d1aa1cd581494bccb286d0c9adff_JaffaCakes118.exe"
      2⤵
      • Drops file in Drivers directory
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Windows\SysWOW64\svehost.exe
        C:\Windows\system32\svehost.exe 752 "C:\Windows\SysWOW64\svehost.exe"
        3⤵
        • Drops file in Drivers directory
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • NTFS ADS
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2152
        • C:\Windows\SysWOW64\svehost.exe
          C:\Windows\system32\svehost.exe 748 "C:\Windows\SysWOW64\svehost.exe"
          4⤵
          • Drops file in Drivers directory
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies registry class
          • NTFS ADS
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2496
          • C:\Windows\SysWOW64\svehost.exe
            C:\Windows\system32\svehost.exe 760 "C:\Windows\SysWOW64\svehost.exe"
            5⤵
            • Drops file in Drivers directory
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Modifies registry class
            • NTFS ADS
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1720
            • C:\Windows\SysWOW64\svehost.exe
              C:\Windows\system32\svehost.exe 756 "C:\Windows\SysWOW64\svehost.exe"
              6⤵
              • Drops file in Drivers directory
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Modifies registry class
              • NTFS ADS
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:328
              • C:\Windows\SysWOW64\svehost.exe
                C:\Windows\system32\svehost.exe 768 "C:\Windows\SysWOW64\svehost.exe"
                7⤵
                • Drops file in Drivers directory
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Modifies registry class
                • NTFS ADS
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:904
                • C:\Windows\SysWOW64\svehost.exe
                  C:\Windows\system32\svehost.exe 776 "C:\Windows\SysWOW64\svehost.exe"
                  8⤵
                  • Drops file in Drivers directory
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • Modifies registry class
                  • NTFS ADS
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2412
                  • C:\Windows\SysWOW64\svehost.exe
                    C:\Windows\system32\svehost.exe 772 "C:\Windows\SysWOW64\svehost.exe"
                    9⤵
                    • Drops file in Drivers directory
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in System32 directory
                    • Modifies registry class
                    • NTFS ADS
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2916
                    • C:\Windows\SysWOW64\svehost.exe
                      C:\Windows\system32\svehost.exe 784 "C:\Windows\SysWOW64\svehost.exe"
                      10⤵
                      • Drops file in Drivers directory
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Drops file in System32 directory
                      • Modifies registry class
                      • NTFS ADS
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:3068
                      • C:\Windows\SysWOW64\svehost.exe
                        C:\Windows\system32\svehost.exe 792 "C:\Windows\SysWOW64\svehost.exe"
                        11⤵
                        • Drops file in Drivers directory
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Drops file in System32 directory
                        • Modifies registry class
                        • NTFS ADS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\TEMP:466F9D5D

    Filesize

    103B

    MD5

    2a1ea15428416b9a5fd2c49e3499e5e8

    SHA1

    5cd8da22a69f147560756e6da64b94e6e0cdac16

    SHA256

    3fb3564cc5504ddaa1e31742bcb27de6c08bf803c354d01db73acb3c74c25819

    SHA512

    6833244a517a014edb30fb9596d6316982d7e693edecb1ee397eba8ee07ebe15f0c5ceaf6f503134530e784ee9529a69069b9156c6e901e3aaffd042da35d5fc

  • C:\ProgramData\TEMP:466F9D5D

    Filesize

    103B

    MD5

    aeaaa06377d7a2e451011b045746386f

    SHA1

    524c5a4d2fd7f7a692c091490c9a4e650a16cd53

    SHA256

    b5140c9896d07a936ae6893fb9c18c9dc4009d83081802fd0250cc88540da5fb

    SHA512

    da0c61e69adf7ce17afdd60bf3cb4e54e392272ad9b32989aad07ae8e1bf3b3c0e625582e0bd07b75ff1f32f47fa0249816b214f9ce38e15a6c422069cd63ab4

  • C:\ProgramData\TEMP:466F9D5D

    Filesize

    103B

    MD5

    071c1b698f972270aaf2abbb0a10073a

    SHA1

    d769c7889b2df893fc159bc80c6c7d1e0b230151

    SHA256

    cb67d745bcba2ef735a85ace181c47a5a250ea69778d241d2d08addf724c1cce

    SHA512

    508ca67015f6181d986b90f572cb93d1b7b96372a75067e4f6fe9f4558c5557d35b3c31a3510be26e204c9375502d4597165d23e58c51e1e87eceea4aa383d7e

  • C:\ProgramData\TEMP:466F9D5D

    Filesize

    103B

    MD5

    eb35351dccf6d00ba4ba255183516902

    SHA1

    78e837c1c992a11e839507cc5a5c00771997597f

    SHA256

    7f2dec3fb66c2c1df956618599a0b0b99f79d96b91c0dc27e8abcbcd0f8ede81

    SHA512

    160f0c45f380526a6af7dd952a19f8bb40523b0644b96dba7d23ddd05709616b904ae985b417cbb30bd62778a0a39cc52d9ed81cd8b75d54750a54d580cf30f8

  • C:\ProgramData\TEMP:466F9D5D

    Filesize

    103B

    MD5

    b9852ddd2a4a9a6c5f09bddd88393d74

    SHA1

    9c38fb9d72e6939d3e4349c6a077ce095fe1c237

    SHA256

    2d9fa6ddb7e8a7442d383af93e30a4ad782fee0275a123b641c19fe6a277adc5

    SHA512

    1f8764a24de9e2a969db5591f068fe11ce8165be9dfcb0418cb920878bbe731939a759e55bced38868ca7acb49918b6e779580697772d84edcdff08e548eb70a

  • C:\ProgramData\TEMP:466F9D5D

    Filesize

    103B

    MD5

    7f592d209452a89dc93a0fe79dd64e86

    SHA1

    43e43d7c582e5b09fce1be3b5c6648b626c6e709

    SHA256

    eb8575864fa44612b96a202ccbd77801d48973a26a08409186b2349996c5d939

    SHA512

    c4820dedab2dac030f6d6c87edeb1fd5fd296db2f88dd1f3013f782b1e40a693498f456f40ac86cbe172ad2f192b491e9a87eda783296005e5f0ddb814d24e3b

  • C:\ProgramData\TEMP:466F9D5D

    Filesize

    103B

    MD5

    2b17a9837f8d18c3f03be5e2ca9086c5

    SHA1

    7a3cb62e0dae7b490d70dae13f604586e46510ba

    SHA256

    67adc9179dc95f72dc02f6fc867b487e77f7269e4ebd79228fc1260f1e2b5fdd

    SHA512

    99815cb0a49fb3e5c3719a0c6cda8db672abda5ecacf16d123f2b66db091f6040c861bf1dbafe9fcdfea23a29b843ebe5bb44f016234ef91458efa9671984753

  • C:\ProgramData\TEMP:466F9D5D

    Filesize

    103B

    MD5

    d9be19b1de6e0caade13ffb081dbbc8e

    SHA1

    3b15b66dfb99cd62acb3bc8d056e6b89c4eb2230

    SHA256

    0fc994690fd026d52867ca2cb0109ae4d6eede2ad3b33e7f748f4c9144c68727

    SHA512

    32339572743892686d4023278a4f90e821f7347530a85b034c8879719ed59111bf92ecd312897a7579b84b72d96ba795412eac5ace24ccb61cebced3272a1b46

  • C:\ProgramData\TEMP:466F9D5D

    Filesize

    103B

    MD5

    e602cb3b1645256cde550754553e8b4c

    SHA1

    2c7aa71610c0f0f58360bfb03f2f0e80604ca793

    SHA256

    80d60762becb195ea9d5b14bab6098b76ea720df64256252999dd681b93aac10

    SHA512

    1f4d8c20e0d5f7f3ea41f0108900bfe03caf42041817639a926ec21cb000d1e185a8ff46b02ed9f95f6aa0bbab6ac1be8a8aabf5ed1780d2ee5cea9d64b70fa8

  • \Windows\SysWOW64\drivers\npf.sys

    Filesize

    41KB

    MD5

    243126da7ba441d7c7c3262dcf435a9c

    SHA1

    42616f7034c0f12e3e4a2166ebe082eb3f08223a

    SHA256

    80d36efd5b3abb82c421149d423e5019c21f203f085ae2655429a44bb5a9f5c0

    SHA512

    f5539774d89e8f025da97e7b49d143b7224fcf899db967a34445de70f9228ea5e2d5daffe6444492ce82a3dfb2734786e09140277c208ec1e64580ad74883e68

  • \Windows\SysWOW64\packet.dll

    Filesize

    86KB

    MD5

    3eb0beb8e318646104362537570fc6bc

    SHA1

    3cb48ea9073fcca5835adad307e14ebf0cfe7279

    SHA256

    ab3f8c80b85aae70f89c8e7919d7dd147c2bc3ec68769e0bdb05fcc4083e3643

    SHA512

    db5fd16749641de6282d36af7b1921f908850ece3429ffe5ad33d990431bf4990f0314d28af082394af1f4d66516d9d89806a38e2801c34b4dd1ccb69bfafe47

  • \Windows\SysWOW64\svehost.exe

    Filesize

    920KB

    MD5

    0e35d1aa1cd581494bccb286d0c9adff

    SHA1

    1099d1119361c2a5f4867bcf16e2a25d4874db7b

    SHA256

    69e885cae86457c4a4b21095555cd0906ff22dfc34b65b0b45b633aaae30dda7

    SHA512

    00b0fddcb97dfead478d227f6d00334ce308ab6ad40ef1e5b90db8cebe121f059e2bfc649e819339e5b66b3effe458aef610df784d5f665fad6b912395ce93db

  • \Windows\SysWOW64\wpcap.dll

    Filesize

    234KB

    MD5

    cb0afba4f0fb6ca2b2ea0d2c3e86b588

    SHA1

    2459367892e012314b451e05de1f1162448a05fa

    SHA256

    1b0fe60175c88f7cd3f3765b2f0f3eb1530b2e5e5b51f89a83e0322de32bdcf7

    SHA512

    a4e2d66af68dee67be5883c4770c1339b6be4847a993619389404af6a7ec9763361d9a14c632ca6704f63d84b05483f4bea2ec035b466fdaf03ce68c5cbca128

  • memory/328-226-0x0000000003360000-0x0000000003532000-memory.dmp

    Filesize

    1.8MB

  • memory/328-228-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/328-214-0x00000000003F0000-0x00000000003F9000-memory.dmp

    Filesize

    36KB

  • memory/328-191-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/328-242-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/904-264-0x0000000003260000-0x0000000003432000-memory.dmp

    Filesize

    1.8MB

  • memory/904-257-0x00000000027A0000-0x00000000027A9000-memory.dmp

    Filesize

    36KB

  • memory/904-256-0x00000000027A0000-0x00000000027A9000-memory.dmp

    Filesize

    36KB

  • memory/904-265-0x0000000003260000-0x0000000003432000-memory.dmp

    Filesize

    1.8MB

  • memory/904-288-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/1720-213-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/1720-183-0x00000000009E0000-0x00000000009E9000-memory.dmp

    Filesize

    36KB

  • memory/1720-182-0x00000000009E0000-0x00000000009E9000-memory.dmp

    Filesize

    36KB

  • memory/1720-190-0x0000000003460000-0x0000000003632000-memory.dmp

    Filesize

    1.8MB

  • memory/1720-154-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/1720-220-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2032-31-0x0000000000970000-0x0000000000979000-memory.dmp

    Filesize

    36KB

  • memory/2032-68-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2032-58-0x00000000005E0000-0x0000000000675000-memory.dmp

    Filesize

    596KB

  • memory/2032-0-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2032-71-0x00000000005E0000-0x0000000000675000-memory.dmp

    Filesize

    596KB

  • memory/2032-38-0x00000000031A0000-0x0000000003372000-memory.dmp

    Filesize

    1.8MB

  • memory/2032-30-0x0000000000970000-0x0000000000979000-memory.dmp

    Filesize

    36KB

  • memory/2032-1-0x00000000005E0000-0x0000000000675000-memory.dmp

    Filesize

    596KB

  • memory/2032-6-0x00000000005E0000-0x0000000000675000-memory.dmp

    Filesize

    596KB

  • memory/2032-7-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2032-10-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2032-14-0x00000000005E0000-0x0000000000675000-memory.dmp

    Filesize

    596KB

  • memory/2032-13-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2032-12-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2032-21-0x00000000028A0000-0x00000000028B5000-memory.dmp

    Filesize

    84KB

  • memory/2032-11-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2032-8-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2152-105-0x00000000006C0000-0x00000000006C9000-memory.dmp

    Filesize

    36KB

  • memory/2152-95-0x00000000005E0000-0x0000000000675000-memory.dmp

    Filesize

    596KB

  • memory/2152-101-0x00000000006A0000-0x00000000006B5000-memory.dmp

    Filesize

    84KB

  • memory/2152-89-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2152-88-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2152-91-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2152-93-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2152-111-0x00000000005E0000-0x0000000000675000-memory.dmp

    Filesize

    596KB

  • memory/2152-112-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2152-106-0x00000000006C0000-0x00000000006C9000-memory.dmp

    Filesize

    36KB

  • memory/2152-92-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2152-94-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2152-121-0x00000000033E0000-0x00000000035B2000-memory.dmp

    Filesize

    1.8MB

  • memory/2152-85-0x00000000005E0000-0x0000000000675000-memory.dmp

    Filesize

    596KB

  • memory/2152-139-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2152-79-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2152-140-0x00000000005E0000-0x0000000000675000-memory.dmp

    Filesize

    596KB

  • memory/2412-292-0x0000000003450000-0x0000000003622000-memory.dmp

    Filesize

    1.8MB

  • memory/2412-271-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2412-315-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2412-293-0x0000000003450000-0x0000000003622000-memory.dmp

    Filesize

    1.8MB

  • memory/2496-153-0x00000000034F0000-0x00000000036C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2496-145-0x00000000021A0000-0x00000000021A9000-memory.dmp

    Filesize

    36KB

  • memory/2496-132-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2496-129-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2496-131-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2496-166-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2496-127-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2496-116-0x0000000000340000-0x00000000003D5000-memory.dmp

    Filesize

    596KB

  • memory/2496-130-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2496-126-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2496-122-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2704-53-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2704-56-0x0000000001FD0000-0x0000000002065000-memory.dmp

    Filesize

    596KB

  • memory/2704-107-0x0000000001FD0000-0x0000000002065000-memory.dmp

    Filesize

    596KB

  • memory/2704-104-0x0000000001FD0000-0x0000000002065000-memory.dmp

    Filesize

    596KB

  • memory/2704-78-0x00000000035D0000-0x00000000037A2000-memory.dmp

    Filesize

    1.8MB

  • memory/2704-74-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2704-72-0x0000000001FD0000-0x0000000002065000-memory.dmp

    Filesize

    596KB

  • memory/2704-64-0x0000000001E40000-0x0000000001E55000-memory.dmp

    Filesize

    84KB

  • memory/2704-69-0x00000000006C0000-0x00000000006C9000-memory.dmp

    Filesize

    36KB

  • memory/2704-70-0x00000000006C0000-0x00000000006C9000-memory.dmp

    Filesize

    36KB

  • memory/2704-49-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2704-54-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2704-55-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2704-109-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2704-50-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2704-52-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2704-46-0x0000000001FD0000-0x0000000002065000-memory.dmp

    Filesize

    596KB

  • memory/2704-40-0x0000000001FD0000-0x0000000002065000-memory.dmp

    Filesize

    596KB

  • memory/2848-347-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2848-369-0x0000000000750000-0x0000000000759000-memory.dmp

    Filesize

    36KB

  • memory/2916-294-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2916-316-0x0000000000660000-0x0000000000669000-memory.dmp

    Filesize

    36KB

  • memory/2916-320-0x0000000003340000-0x0000000003512000-memory.dmp

    Filesize

    1.8MB

  • memory/2916-342-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/3068-321-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB

  • memory/3068-346-0x00000000035D0000-0x00000000037A2000-memory.dmp

    Filesize

    1.8MB

  • memory/3068-367-0x0000000000400000-0x00000000005D2000-memory.dmp

    Filesize

    1.8MB