Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/09/2024, 04:30

General

  • Target

    d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe

  • Size

    172KB

  • MD5

    d1140e289b7e5d451755ad2a1b9da893

  • SHA1

    50cbd0bf239bfa0ce1c19f87fe3450668802facd

  • SHA256

    2f86b1e22a769e648fcc221a0e567528d27c2ac2932f90a82587ff78b07429ea

  • SHA512

    e52d729ee50e57a5767e967b8e7b53ebe863a4745d5705335fb0d8edd40d8a9a7a578744519a78e9eb8c2286b45587a2d834092368a8db944961cbb30622c30e

  • SSDEEP

    3072:raKqmTqA7VYoeSR/WBqNgZlUYZTi8E/H3b0LVeWkUOjSpqc54kjefmK3HtnMVj0:ZBTjYSR//Nsti5/XGVeRUjqlkdQR

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 40 IoCs
  • Drops file in System32 directory 3 IoCs
  • Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 47 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4052
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c attrib -h "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1760
        • C:\Windows\SysWOW64\attrib.exe
          attrib -h "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:2588
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c copy /Y "C:\Users\Admin\AppData\Local\Temp\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe" "C:\Windows\system32\"
        3⤵
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:1528
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c attrib +h "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Hide Artifacts: Hidden Files and Directories
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4440
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
          4⤵
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:1552
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:1932
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:4236
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:4288
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:4488
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:3572
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:1548
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:4476
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:3540
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:4036
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:4780
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:4228
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:876
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:3192
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:4740
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:4816
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:5000
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:2440
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:3548
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:3224
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:2124
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:4792
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:1632
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:808
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:4292
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:3476
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:4620
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:1804
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:2448
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:1036
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:4264
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:4412
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:3064
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:764
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:4428
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:1784
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:1648
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:4724
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:1268
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:1528
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:2092
      • C:\Windows\SysWOW64\reg.exe
        C:\Windows\system32\reg.exe add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /t REG_SZ /f /v mssysbr /d "C:\Windows\system32\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe"
        3⤵
          PID:2072
    • C:\Windows\system32\WerFault.exe
      "C:\Windows\system32\WerFault.exe" -k -lc NDIS NDIS-20240907-0432.dmp
      1⤵
        PID:4968

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\d1140e289b7e5d451755ad2a1b9da893_JaffaCakes118.exe

        Filesize

        172KB

        MD5

        bc04341ea9c3c583e1a81a91ff03ffb9

        SHA1

        9bfdefbfc4270f93ffe6fa0c25367beb82cff883

        SHA256

        3dcd6bd8004e3b521f5199d07ecce160b40f8851c272fc552786ebbad16ba7ee

        SHA512

        d794b850ba3fcc26a39ab8e9d5e6c125e8b852d068200d07a30b44dc3f5c23493687f9d38638e39525a8f75dcdbb58d1c8162a20599592e3309d7fd1c4e32db1

      • memory/1696-0-0x0000000013140000-0x000000001314A000-memory.dmp

        Filesize

        40KB

      • memory/4052-3-0x0000000000D50000-0x0000000000D51000-memory.dmp

        Filesize

        4KB

      • memory/4052-15-0x00000000016A0000-0x00000000016A1000-memory.dmp

        Filesize

        4KB

      • memory/4052-16-0x0000000020010000-0x0000000020066000-memory.dmp

        Filesize

        344KB

      • memory/4052-17-0x0000000020010000-0x0000000020066000-memory.dmp

        Filesize

        344KB

      • memory/4052-24-0x0000000020010000-0x0000000020066000-memory.dmp

        Filesize

        344KB

      • memory/4052-31-0x0000000020010000-0x0000000020066000-memory.dmp

        Filesize

        344KB