Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 04:56

General

  • Target

    a1457583100181705617dabaf927fc14_JaffaCakes118.exe

  • Size

    258KB

  • MD5

    a1457583100181705617dabaf927fc14

  • SHA1

    88cdfa7cd8f2f2122b37e8927ab9d7df769027bb

  • SHA256

    176e869fd27e7c0cc7fd792d3575963263e78ad778e79dbe3d5e2320ee57bd4d

  • SHA512

    3617a3fff7402cea4cb890a6d6b190fc347360a4d42011c03f75170b7f3ad1269018c06c27ebdc8cdfd5cb10afe42ec55b3454bf5aa212988111021e7487126d

  • SSDEEP

    6144:aAZwSS8IhmjRFbNSBg0nr6LyaEnr6Lya:aAZtS8RS9nrvnr

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftpperso.free.fr
  • Port:
    21
  • Username:
    msnpromo
  • Password:
    celine

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 47 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2832
    • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3068
        • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2076
          • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2036
            • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
              "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1148
              • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1288
                • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                  "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2344
                  • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                    "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                    9⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1044
                    • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                      "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                      10⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1124
                      • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                        "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                        11⤵
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1896
                        • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                          "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                          12⤵
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:2512
                          • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                            "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                            13⤵
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:2548
                            • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                              "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                              14⤵
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:2452
                              • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                15⤵
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of WriteProcessMemory
                                PID:2884
                                • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                  "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                  16⤵
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2976
                                  • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                    "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                    17⤵
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2612
                                    • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                      "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                      18⤵
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:524
                                      • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                        "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                        19⤵
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1604
                                        • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                          "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                          20⤵
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2872
                                          • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                            "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                            21⤵
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:596
                                            • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                              "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                              22⤵
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1660
                                              • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                                "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                                23⤵
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1692
                                                • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                                  24⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2124
                                                  • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                                    25⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1776
                                                    • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                                      26⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:932
                                                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                        dw20.exe -x -s 888
                                                        27⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2384
                                                      • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                                        27⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2512
                                                      • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                                        27⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1740
                                                      • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                                        27⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2788
                                                      • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                                        27⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2720
                                                      • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                                        27⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2976
                                                      • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                                        27⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2868
                                                      • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                                        27⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2800
                                                      • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                                        27⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1940
                                                      • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                                        27⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1956
                                                      • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                                        27⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2208
                                                      • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                                        27⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2204
                                                      • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                                        27⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1368
                                                      • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                                        27⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1948
                                                      • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                                        27⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1804
                                                      • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                                        27⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3052
                                                      • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                                        27⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1040
                                                      • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                                        27⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2852
                                                      • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                                        27⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2572
                                                      • C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\a1457583100181705617dabaf927fc14_JaffaCakes118.exe"
                                                        27⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\FMEDFXFE

    Filesize

    148B

    MD5

    9b9ecfad378b1b4cc9bf94daade10579

    SHA1

    379833b8901a29d80aa15ac4771197f1af767598

    SHA256

    e93320d2e68770cea70f56bc56e509c70596dfd0bc3e494bdbad196dd001f95d

    SHA512

    5134154725309db7d79752231ea37dce93f0f46432c225781a9c21be972e6fdf65cf9a966eb58effcbb1627c8972df51f444323734ec0b5a6159e29020bb084c

  • C:\Users\Admin\AppData\Local\Temp\FMEDFXFE

    Filesize

    148B

    MD5

    12b616a5801c18511d6c06e61b52a78a

    SHA1

    5eadc005b1bf8680b515737baf0e23cf7ff3182f

    SHA256

    43bbe6a07a9b01d77eef7b9a2e844631b92795065351f57c10283a0a0f5e10b9

    SHA512

    c8dde68e512b1ce9b15e2ee9217c76bcadb8cd9a368d672b0306d582528e5c57dbd9fbe52c4ab6d045b69ad2fa0309ca86436e59fa651a7836e6b505b7b29432

  • C:\Users\Admin\AppData\Local\Temp\FMEDFXFE

    Filesize

    148B

    MD5

    2e7b99d9dff5c200d6070323f93d94f2

    SHA1

    8e90e87f1ae03db8aab6bdf1629aaebf8436b6e3

    SHA256

    bf34c0d464f591324e5045f021c71f5c24f1dcdabad4c2e0b56e250cf6cb510d

    SHA512

    eb8eeb4eb479235d078d82d008267b5bcf531d2f0a4bedfb647baddca8ba0db6d30d818b3a54bf2d4b41c7d773e73c20548bfe45ff37ae1fa91b57da9da37f59

  • C:\Users\Admin\AppData\Local\Temp\FMEDFXFE

    Filesize

    148B

    MD5

    01fbb71eefbde8b803bd396d49181996

    SHA1

    04f41ac7c632b6af3582fd6ed1c973306906364e

    SHA256

    068ea1f674f1388a1c36dafc4a15a891f6776c361e4fc0e2cd0d2b966d17cca2

    SHA512

    d8d3c158e256cc02e3d6649bfc9ed64a12ca7f7c6fec7a4670d565be5774a1d8d3700925ac14376ca0d5bfe74951d17a98d7cb7d8a05f8c8a89f44faacf90b09

  • memory/2832-3-0x00000000740D0000-0x000000007467B000-memory.dmp

    Filesize

    5.7MB

  • memory/2832-4-0x00000000740D0000-0x000000007467B000-memory.dmp

    Filesize

    5.7MB

  • memory/2832-8-0x00000000740D0000-0x000000007467B000-memory.dmp

    Filesize

    5.7MB

  • memory/2976-0-0x00000000740D1000-0x00000000740D2000-memory.dmp

    Filesize

    4KB

  • memory/2976-1-0x00000000740D0000-0x000000007467B000-memory.dmp

    Filesize

    5.7MB

  • memory/2976-2-0x00000000740D0000-0x000000007467B000-memory.dmp

    Filesize

    5.7MB

  • memory/2976-10-0x00000000740D0000-0x000000007467B000-memory.dmp

    Filesize

    5.7MB