Analysis

  • max time kernel
    140s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 06:13

General

  • Target

    a17a035ed5ee44d4285c94e3ad68ff44_JaffaCakes118.exe

  • Size

    6.6MB

  • MD5

    a17a035ed5ee44d4285c94e3ad68ff44

  • SHA1

    edddb57d3133dec313fe6c27b016cd10129e45fd

  • SHA256

    1b2797044f8c0f3a91d10e1e168f439611f95a6309290ce63518462cb39b37fd

  • SHA512

    cabf14f8f485a094412b367b7cc4c657bf8bb7971778cc1d6c757eb8d06ab50b785a95638acdfff75159f7a027330710fde8f21baf0186578feea0947f882338

  • SSDEEP

    196608:4prgRGjqMEnMgvs/s7veVySIgN8yQ/7wJj9g+wgKaA:4aRJMUMgveszeVzImJd

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a17a035ed5ee44d4285c94e3ad68ff44_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a17a035ed5ee44d4285c94e3ad68ff44_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Temp\evelyn.lin.asian.angels.wmv"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1872
    • C:\WINDOWS\SysWOW64\sysport.exe
      "C:\WINDOWS\system32\sysport.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3060
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      open http://df.mf321.info/web.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2228
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2228 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Temp\evelyn.lin.asian.angels.wmv

    Filesize

    6.5MB

    MD5

    8b49d8f967627d88df26bd3c5298198a

    SHA1

    70d88ffe9ba37a2f78eaecf3e68d3a14cdba64e5

    SHA256

    f9061c920baa8017bbfae011d44acea5a24f3bf3bb8c367d3e463667723fa320

    SHA512

    251b6faf9210039e5811e2b9fd81bc184206815516c46a2e1b76edd967c366683bbbe386c248d8323f4cf5eb9143e62adde2441292d7878f71786cfef9ba3c4b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f9b74a33ae45908e321a4b0ce2fa388d

    SHA1

    00f98f7d4f4fc357f1644b79fb012d47027ac113

    SHA256

    8ec36d4feb84f2779cec6338aeb27b71a927b4d349e8e8fe6102d8bd9dfd2bef

    SHA512

    a94053e24ef765a4983215ef5ae0ea14e6fc5554d67d0a28569d317a5f69656cbac01ad264b953bac9fa847e64be30c38edbbfecdb82af0496383bad5febf503

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    40abdb94d58c5615e2a9e9debff93377

    SHA1

    506219b98f7eac7d50181fe629f50e4f5cc98ece

    SHA256

    7ae061492e1565d8b4235c4352d72eccb9f656a4771a589267c4514972dee84d

    SHA512

    78486e7717a869e8ad63cc6463c8efe1980f41db86530e5523151e6f542bff6963250e9089d502d6df7d79f6a811cb54d554878c1549e5ec291507d5a5468add

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    463cf0a788a2735d627aec44046a7e6f

    SHA1

    a1dc0d8ce6d2b08ae2524fafc7008ecd7744fbc7

    SHA256

    e18b2f3b637e62684c6ebaf76e7d94d194ccec4103c69acd1c49a35e53c61e5d

    SHA512

    66d99e80c635b16b65dcdd154d75ffae57d9f337cdca79d7b04763d434029eefb61557a59a308ec7b09dc7751c15108644ed8c34fcc122f7f94d5134a3a12926

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    41824abf26b0a839f3d7f287f6781437

    SHA1

    963a576e74bdcb29ac43153135cbdf745c3688e4

    SHA256

    9875c95e73ba9dd3d36878cf40f900b102f3b39164749c3cb2ab78f700414b63

    SHA512

    7d6f7f4cc8702de7db55c784c819af313ed53e8c5259ab7f823c511a88b79d2e0d441f1c276ee41d7680a662c7246f8c8e2e3d0cabe2ce77f241592abdbc9a6c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    19cdf78f13907558baf4bd37641eeb25

    SHA1

    38f3fc8ffd56bcc2b584b39cb5b2233f4013f219

    SHA256

    b862fa2f27e809f121930b4ceec08f1268d35c7b05b849f5374585d9c0d57c6b

    SHA512

    f6433e782e3eb719165b0240e74844a9657edf0d5fc85817777ea45e3c50f3886769f48b05456d59bd0d131e7213b3c9b49712dcde7c944347aa66ff336b9d6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a3830baed23d731e401638e3b49689c9

    SHA1

    a773d70cb7261267f84d4c019a723fe2d88485e6

    SHA256

    3f79bcf09bdf3ef01f155d32691ae3ba21abdc7516b93bf1dfcf54e7b7cd74b7

    SHA512

    026052ab476a907b52cba3b40925693114ee044b0d4474502f477702c6882aac95d7d121c21a767895403323b154b237e43b08de6f41f5888ff6a72dfefb3769

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a11fb590568e4f45fa15c4c1e87faa5

    SHA1

    8db8d5c932d5af0af354ca143e9b7e29d8dc8d20

    SHA256

    2685b615bf3738b84b39cec25c5ee3f2d62e1005ebd291c1cedd4cc925ceee0c

    SHA512

    1fcd477c4e6e76cb070e824261347c7b16b2b21988e7bf8c1ad6ecc79df3b8ded29e40d872f121d4b8e9f0d0d3f989c2e9001e18019bf67007685a628fcb270f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b243d020cccc958c5ea0bee8cbd2a3e

    SHA1

    5e8b95ad93282754e24c111011e5b8cfe5dcd84c

    SHA256

    739b9dd64eaba2974d8591f9d7113b922a98f5fd5d3d2af18691cb59414a6fda

    SHA512

    110cb867f1738b1700f335783d7134e87e4b46bfe81e0379a166c5bd849dba2499ede1506748d1bcd7f6c7d159070c73dedd5e03a444a9e0e66f23088ebfee47

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    41e8343b616d599a6d6cd525fbddd9c5

    SHA1

    d72b87925bfb12e4a143868f63e16450a8620be5

    SHA256

    965c80637c6d7ba8c5a5d0ee491883db522bc2580587a390192c033fc085073e

    SHA512

    15e0e19384fb21a7c62485711571d2581c65a9d766389363f555143211e25f888a21710e1c370801d2ce2b8755a243a6dfe5a514858b21d96f20fb0e33a258af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a2a3bf1cf816cd696406c4dfc0d57496

    SHA1

    ea071e42b720cb4968956cb0d0ba99b5872a0ddb

    SHA256

    edbc471d20dc975e0e08f7435265244ad4a3fffb92ec8e1d844120b0fe8d3705

    SHA512

    0071922b559264c4b1553c893660f8cf5bdf6f433a78a8fe08ad4cf530eecbc429b58345d8babf7ae489aae2e722e36ea12ef9ca496d76119a004a3e99d1b6b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f06422d9889a55440706e99cb4ff4cfe

    SHA1

    630fd42671d375c42bb61871cb415726016c4573

    SHA256

    da88c0258ca25416a636d4883f90b123c81c2f674b729c9ea29cb1da22d29f8e

    SHA512

    e68fa11537e6f3e989060514f542321400a62d76c4da1a690faf716fdd968a2e2402386258256e57578a7ee22f3e7bb88d3f53aa49f4acb5ebd6f9b8f9c17026

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    79b1b1a947e2c24260c7a242258b1f70

    SHA1

    231bd400a859c8b16cf6a90950ac25c3d12f934e

    SHA256

    9c2323fdb2a8afeda58a627107094989f3fa78a562596d91ba2c5303542fd51e

    SHA512

    c20f66e69cafdc81596bb34ca085477d744aa9f701fc80bdac947fec18b1dec2343410dff53b437ccd08cbec3448aee96139d1722b4e9c88685bc9783667bf9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    71bd29c749857ca13d418e56e5ec02ee

    SHA1

    f8ba484574be84757540f9db32c93854a953afe2

    SHA256

    c27d9d3c707a09aa410ddac924e682acc5443d2d8d56800a90637690040f9862

    SHA512

    2cb3b3aca4639796d1c61b447c9b43b444f2875ca4983bfa5ad9edfc891e3eb0558c6b08cdb35b6a3b0cbf519729a0bf10c77236078fc1d1464f9c8d02df33d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    79f562c175055e65ce926d7b640a58a6

    SHA1

    dab0cef4c18f098cf3e693cc063f4991453a52c6

    SHA256

    f01d6a9906f362403b69a8fcfa89c24f5c7449d2fbc258902917900d1d3db63f

    SHA512

    dd8124cccdf65d5f15632a9bd623ee751a628f8c2316a96e88e45f76545e619d4f97228c0ef4f4ac17976f5461ef2d3317fabcc6769d9af0a14e9e6fc130344a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f8c88ea63face844bf804b9f6cdafa3

    SHA1

    98f7bee77cd6ea98c6089638d5af8ba660376cc4

    SHA256

    d34de8179e0c78ff327ae1df60b0a3d58f0ad5530bd44df77fe5d2fdec52c47d

    SHA512

    c5fe95e1dd5dcd6e1bb18b2b285fee0c5bf487e4c3943c09b3cd91b8118c181bf8cd9ea7952cd12255310696595d4667ecf6e959d431d9365f63bad1c91fb5ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b2f31a8f6d32fa6899f36caa9d2c8cc8

    SHA1

    b8597b2cb2f11948a1b1c245b60fd551b0e57d57

    SHA256

    4884fffd4dea73354f16e85e4481fb3ad671dcd7c96de571ac665378828013b2

    SHA512

    eba7d4cd1ef735246df613b9fcbf8547e6cc00aade1645a2fae68cccca346731553d483fa4263ebe2027763c730fa2f9de3cd25c9ee3a544e1f6fbbb654498ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d4e80257f076d24ff5bbdc0751050f2

    SHA1

    15406c385a1a17274d0cb0460110eedc803438c9

    SHA256

    ea7d627c5d2704b7b594f79b8864f48a2ae7e8c361c5d7d6b047b3959be29bee

    SHA512

    f5d897601a173967a2861de8812cf990a4809cc9254b7d39c6e5e95fdc08440fefe78cd797008044f1dae5ad5d840c924e69d4c7eadf60f66a761c3102bd10fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff186a4dd041baf2268ebaf02363a86f

    SHA1

    941e2dd47bbef970b8a29109f8376d327848c186

    SHA256

    36a536b7d31d45e060d1fb6c5b624a988ca42d15001423986c2b6059d000585f

    SHA512

    9347d12e5117fcd56ef73594633de2d863404b3c7b884d38a9ed8179361eb1801d0c9f4389bd847c5f9b8e856b51d5990f7e0dea9a19ae76f6dc33ed9440fa61

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    522d2ea1fdcdba8f89376729ff088249

    SHA1

    d983624f0afaf98e5f506765c86be8b834372fdd

    SHA256

    2d1b7584757c42c15adb6647338810e3c35e2e5f5835d79facb3b91fa95a3397

    SHA512

    dd7161c8937000bec1743557d85c30244af97dbc364764a4f24e45889056b603ceefe3b22a3f2bfeca7cbdd01145d72699d5389ee55c9983a9a3f21d454655ae

  • C:\Users\Admin\AppData\Local\Temp\CabA02.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA63.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\SysWOW64\sysport.exe

    Filesize

    50KB

    MD5

    ef12e6b6986b394656028a213409d901

    SHA1

    f81dba798082153eba5e29722b3d5457010c8983

    SHA256

    3d7bfaf1c34c4df0b232753768ee89392f3396d5affdfbb915b0436148e07398

    SHA512

    650a650b498e2d8b56b96f57dfa50aec7570b7ee6599c3e83a36743c1ace10b2285b68d7193f53e4253ab3febb024b2579ff34881c8657c9fb7ed49f8cb37f57

  • memory/1872-42-0x000007FEF4B30000-0x000007FEF4B97000-memory.dmp

    Filesize

    412KB

  • memory/1872-62-0x000007FEF1F60000-0x000007FEF1F74000-memory.dmp

    Filesize

    80KB

  • memory/1872-31-0x000007FEF4CB0000-0x000007FEF4EBB000-memory.dmp

    Filesize

    2.0MB

  • memory/1872-44-0x000007FEF4A90000-0x000007FEF4AA1000-memory.dmp

    Filesize

    68KB

  • memory/1872-45-0x000007FEF4A30000-0x000007FEF4A87000-memory.dmp

    Filesize

    348KB

  • memory/1872-46-0x000007FEF4A00000-0x000007FEF4A28000-memory.dmp

    Filesize

    160KB

  • memory/1872-47-0x000007FEF49D0000-0x000007FEF49F4000-memory.dmp

    Filesize

    144KB

  • memory/1872-48-0x000007FEF49B0000-0x000007FEF49C8000-memory.dmp

    Filesize

    96KB

  • memory/1872-49-0x000007FEF4980000-0x000007FEF49A3000-memory.dmp

    Filesize

    140KB

  • memory/1872-50-0x000007FEF4960000-0x000007FEF4971000-memory.dmp

    Filesize

    68KB

  • memory/1872-51-0x000007FEF4940000-0x000007FEF4952000-memory.dmp

    Filesize

    72KB

  • memory/1872-52-0x000007FEF3F20000-0x000007FEF3F31000-memory.dmp

    Filesize

    68KB

  • memory/1872-53-0x000007FEF3E20000-0x000007FEF3E31000-memory.dmp

    Filesize

    68KB

  • memory/1872-54-0x000007FEF2160000-0x000007FEF2171000-memory.dmp

    Filesize

    68KB

  • memory/1872-55-0x000007FEF2100000-0x000007FEF2157000-memory.dmp

    Filesize

    348KB

  • memory/1872-56-0x000007FEF20D0000-0x000007FEF20FF000-memory.dmp

    Filesize

    188KB

  • memory/1872-57-0x000007FEF20B0000-0x000007FEF20C3000-memory.dmp

    Filesize

    76KB

  • memory/1872-67-0x000007FEEF8D0000-0x000007FEEFAD6000-memory.dmp

    Filesize

    2.0MB

  • memory/1872-69-0x000007FEF1BF0000-0x000007FEF1C32000-memory.dmp

    Filesize

    264KB

  • memory/1872-68-0x000007FEF1C40000-0x000007FEF1C52000-memory.dmp

    Filesize

    72KB

  • memory/1872-66-0x000007FEF1EE0000-0x000007FEF1EF7000-memory.dmp

    Filesize

    92KB

  • memory/1872-65-0x000007FEF1F00000-0x000007FEF1F1E000-memory.dmp

    Filesize

    120KB

  • memory/1872-60-0x000007FEF1FA0000-0x000007FEF1FB3000-memory.dmp

    Filesize

    76KB

  • memory/1872-64-0x000007FEF1F20000-0x000007FEF1F34000-memory.dmp

    Filesize

    80KB

  • memory/1872-63-0x000007FEF1F40000-0x000007FEF1F52000-memory.dmp

    Filesize

    72KB

  • memory/1872-43-0x000007FEF4AB0000-0x000007FEF4B2C000-memory.dmp

    Filesize

    496KB

  • memory/1872-61-0x000007FEF1F80000-0x000007FEF1F91000-memory.dmp

    Filesize

    68KB

  • memory/1872-59-0x000007FEF1FC0000-0x000007FEF2085000-memory.dmp

    Filesize

    788KB

  • memory/1872-58-0x000007FEF2090000-0x000007FEF20A1000-memory.dmp

    Filesize

    68KB

  • memory/1872-32-0x000007FEF65D0000-0x000007FEF6611000-memory.dmp

    Filesize

    260KB

  • memory/1872-33-0x000007FEF65A0000-0x000007FEF65C1000-memory.dmp

    Filesize

    132KB

  • memory/1872-34-0x000007FEF4C90000-0x000007FEF4CA8000-memory.dmp

    Filesize

    96KB

  • memory/1872-35-0x000007FEF4C70000-0x000007FEF4C81000-memory.dmp

    Filesize

    68KB

  • memory/1872-36-0x000007FEF4C50000-0x000007FEF4C61000-memory.dmp

    Filesize

    68KB

  • memory/1872-37-0x000007FEF4C30000-0x000007FEF4C41000-memory.dmp

    Filesize

    68KB

  • memory/1872-41-0x000007FEF4BA0000-0x000007FEF4BD0000-memory.dmp

    Filesize

    192KB

  • memory/1872-38-0x000007FEF4C10000-0x000007FEF4C2B000-memory.dmp

    Filesize

    108KB

  • memory/1872-39-0x000007FEF4BF0000-0x000007FEF4C01000-memory.dmp

    Filesize

    68KB

  • memory/1872-30-0x000007FEF4EC0000-0x000007FEF5F70000-memory.dmp

    Filesize

    16.7MB

  • memory/1872-40-0x000007FEF4BD0000-0x000007FEF4BE8000-memory.dmp

    Filesize

    96KB

  • memory/1872-23-0x000007FEFB6C0000-0x000007FEFB6D8000-memory.dmp

    Filesize

    96KB

  • memory/1872-22-0x000007FEF5F70000-0x000007FEF6226000-memory.dmp

    Filesize

    2.7MB

  • memory/1872-24-0x000007FEF7AA0000-0x000007FEF7AB7000-memory.dmp

    Filesize

    92KB

  • memory/1872-25-0x000007FEF71A0000-0x000007FEF71B1000-memory.dmp

    Filesize

    68KB

  • memory/1872-27-0x000007FEF6BC0000-0x000007FEF6BD1000-memory.dmp

    Filesize

    68KB

  • memory/1872-28-0x000007FEF6640000-0x000007FEF665D000-memory.dmp

    Filesize

    116KB

  • memory/1872-29-0x000007FEF6620000-0x000007FEF6631000-memory.dmp

    Filesize

    68KB

  • memory/1872-26-0x000007FEF7180000-0x000007FEF7197000-memory.dmp

    Filesize

    92KB

  • memory/1872-21-0x000007FEF7750000-0x000007FEF7784000-memory.dmp

    Filesize

    208KB

  • memory/1872-20-0x000000013FB90000-0x000000013FC88000-memory.dmp

    Filesize

    992KB