Analysis

  • max time kernel
    104s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 10:13

General

  • Target

    3f43b9396551277894edec9387907d50_JaffaCakes118.exe

  • Size

    231KB

  • MD5

    3f43b9396551277894edec9387907d50

  • SHA1

    34e98b4f6d80ca68a4abae365524f8c9c64f8cce

  • SHA256

    6b0a9042919243dbd7e2f81c2ba38f1a5f3dfc5fbbecf9e3d5a0c21244893e62

  • SHA512

    0f2fadf026c23d96263a18c5237b9f9d4ac3fb3ff2ae0db4df7e0a7d11f5220d8e4b6bec42697b53177aedaa14eced1352efa56d544e432dd0affa3dcb601636

  • SSDEEP

    3072:AcKmbKLz5qdjmoLO0rzUd7OmGvXjW6BWHo6X6mnfWWI+PuWdpnWpo1d3/1975llM:AcKmbKLleA5LW697FswfdTyjV1

Malware Config

Signatures

  • Modifies boot configuration data using bcdedit 1 TTPs 1 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Possible privilege escalation attempt 18 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies file permissions 1 TTPs 18 IoCs
  • File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f43b9396551277894edec9387907d50_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3f43b9396551277894edec9387907d50_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:1820
    • C:\Windows\system32\cmd.exe
      "cmd.exe" /c taskkill /f /im explorer.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2972
      • C:\Windows\system32\taskkill.exe
        taskkill /f /im explorer.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2948
    • C:\Windows\system32\cmd.exe
      "cmd.exe" /c start /w /min %WINDIR%\MBR\sfix slmgr.vbs x86
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:828
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /K C:\Windows\MBR\sfix slmgr.vbs x86
        3⤵
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:2892
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo.slmgr.vbs x86"
          4⤵
            PID:2724
          • C:\Windows\system32\find.exe
            find "?"
            4⤵
              PID:2720
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo.slmgr.vbs"
              4⤵
                PID:2740
              • C:\Windows\system32\find.exe
                find /i "\syswow64"
                4⤵
                  PID:2784
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo.x86"
                  4⤵
                    PID:2768
                  • C:\Windows\system32\find.exe
                    find "64"
                    4⤵
                      PID:760
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo.x86"
                      4⤵
                        PID:2804
                      • C:\Windows\system32\find.exe
                        find "32"
                        4⤵
                          PID:2896
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" echo.x86"
                          4⤵
                            PID:2544
                          • C:\Windows\system32\find.exe
                            find "86"
                            4⤵
                              PID:2460
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c dir /s /b "C:\Windows\winsxs\slmgr.vbs"|find /i "86_microsoft"
                              4⤵
                              • Suspicious use of WriteProcessMemory
                              PID:2776
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /S /D /c" dir /s /b "C:\Windows\winsxs\slmgr.vbs""
                                5⤵
                                  PID:2092
                                • C:\Windows\system32\find.exe
                                  find /i "86_microsoft"
                                  5⤵
                                    PID:2224
                                • C:\Windows\system32\icacls.exe
                                  icacls "C:\Windows\SysWOW64\slmgr.vbs" /save "C:\Users\Admin\AppData\Local\Temp\f1449231836.acl"
                                  4⤵
                                  • Possible privilege escalation attempt
                                  • Modifies file permissions
                                  PID:288
                                • C:\Windows\system32\takeown.exe
                                  takeown /f "C:\Windows\SysWOW64\slmgr.vbs"
                                  4⤵
                                  • Possible privilege escalation attempt
                                  • Modifies file permissions
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1668
                                • C:\Windows\system32\icacls.exe
                                  icacls "C:\Windows\SysWOW64\slmgr.vbs" /grant *s-1-1-0:f
                                  4⤵
                                  • Possible privilege escalation attempt
                                  • Modifies file permissions
                                  PID:1660
                                • C:\Windows\system32\icacls.exe
                                  icacls "C:\Windows\SysWOW64" /restore "C:\Users\Admin\AppData\Local\Temp\f1449231836.acl"
                                  4⤵
                                  • Possible privilege escalation attempt
                                  • Modifies file permissions
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1996
                            • C:\Windows\system32\cmd.exe
                              "cmd.exe" /c start /w /min %WINDIR%\MBR\sfix slmgr.vbs x64
                              2⤵
                                PID:2824
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /K C:\Windows\MBR\sfix slmgr.vbs x64
                                  3⤵
                                  • Drops file in System32 directory
                                  PID:884
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /S /D /c" echo.slmgr.vbs x64"
                                    4⤵
                                      PID:2660
                                    • C:\Windows\system32\find.exe
                                      find "?"
                                      4⤵
                                        PID:2764
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /S /D /c" echo.slmgr.vbs"
                                        4⤵
                                          PID:2828
                                        • C:\Windows\system32\find.exe
                                          find /i "\syswow64"
                                          4⤵
                                            PID:1264
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /S /D /c" echo.x64"
                                            4⤵
                                              PID:1384
                                            • C:\Windows\system32\find.exe
                                              find "64"
                                              4⤵
                                                PID:1160
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /S /D /c" echo.x64"
                                                4⤵
                                                  PID:3052
                                                • C:\Windows\system32\find.exe
                                                  find "32"
                                                  4⤵
                                                    PID:2304
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /S /D /c" echo.x64"
                                                    4⤵
                                                      PID:2240
                                                    • C:\Windows\system32\find.exe
                                                      find "86"
                                                      4⤵
                                                        PID:2128
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c dir /s /b "C:\Windows\winsxs\slmgr.vbs"|find /i "64_microsoft"
                                                        4⤵
                                                          PID:2160
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /S /D /c" dir /s /b "C:\Windows\winsxs\slmgr.vbs""
                                                            5⤵
                                                              PID:2584
                                                            • C:\Windows\system32\find.exe
                                                              find /i "64_microsoft"
                                                              5⤵
                                                                PID:2604
                                                            • C:\Windows\system32\icacls.exe
                                                              icacls "C:\Windows\System32\slmgr.vbs" /save "C:\Users\Admin\AppData\Local\Temp\f1459026608.acl"
                                                              4⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              PID:2612
                                                            • C:\Windows\system32\takeown.exe
                                                              takeown /f "C:\Windows\System32\slmgr.vbs"
                                                              4⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:2192
                                                            • C:\Windows\system32\icacls.exe
                                                              icacls "C:\Windows\System32\slmgr.vbs" /grant *s-1-1-0:f
                                                              4⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              PID:1340
                                                            • C:\Windows\system32\icacls.exe
                                                              icacls "C:\Windows\System32" /restore "C:\Users\Admin\AppData\Local\Temp\f1459026608.acl"
                                                              4⤵
                                                              • Possible privilege escalation attempt
                                                              • Modifies file permissions
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:2360
                                                        • C:\Windows\system32\cmd.exe
                                                          "cmd.exe" /c IF EXIST %WINDIR%\System32\Wat\WatAdminSvc.exe START %WINDIR%\System32\Wat\WatAdminSvc.exe /run
                                                          2⤵
                                                            PID:1036
                                                          • C:\Windows\system32\cmd.exe
                                                            "cmd.exe" /c IF EXIST %WINDIR%\System32\DRIVERS\ETC\HOSTS*.* ATTRIB +A -H -R -S %WINDIR%\System32\DRIVERS\ETC\HOSTS*.*
                                                            2⤵
                                                              PID:2400
                                                              • C:\Windows\system32\attrib.exe
                                                                ATTRIB +A -H -R -S C:\Windows\System32\DRIVERS\ETC\HOSTS*.*
                                                                3⤵
                                                                • Drops file in Drivers directory
                                                                • Views/modifies file attributes
                                                                PID:2212
                                                            • C:\Windows\system32\cmd.exe
                                                              "cmd.exe" /c IF EXIST %WINDIR%\System32\DRIVERS\ETC\HOSTS.OLD DEL %WINDIR%\System32\DRIVERS\ETC\HOSTS.OLD
                                                              2⤵
                                                                PID:888
                                                              • C:\Windows\system32\cmd.exe
                                                                "cmd.exe" /c IF EXIST %WINDIR%\System32\DRIVERS\ETC\HOSTS REN %WINDIR%\System32\DRIVERS\ETC\HOSTS HOSTS.OLD
                                                                2⤵
                                                                  PID:3028
                                                                • C:\Windows\system32\cmd.exe
                                                                  "cmd.exe" /c IF EXIST %WINDIR%\System32\DRIVERS\ETC\NUL COPY /Y %WINDIR%\MBR\HOSTS %WINDIR%\System32\DRIVERS\ETC
                                                                  2⤵
                                                                  • Drops file in Drivers directory
                                                                  PID:2320
                                                                • C:\Windows\system32\cmd.exe
                                                                  "cmd.exe" /c %WINDIR%\MBR\bootsect.exe /nt60 SYS /mbr /force
                                                                  2⤵
                                                                    PID:2044
                                                                    • C:\Windows\MBR\bootsect.exe
                                                                      C:\Windows\MBR\bootsect.exe /nt60 SYS /mbr /force
                                                                      3⤵
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                      PID:2204
                                                                  • C:\Windows\system32\cmd.exe
                                                                    "cmd.exe" /c cscript %WINDIR%\System32\slmgr.vbs -ipk D4F6K-QK3RD-TMVMJ-BBMRX-3MBMV
                                                                    2⤵
                                                                      PID:2640
                                                                      • C:\Windows\system32\cscript.exe
                                                                        cscript C:\Windows\System32\slmgr.vbs -ipk D4F6K-QK3RD-TMVMJ-BBMRX-3MBMV
                                                                        3⤵
                                                                          PID:2156
                                                                      • C:\Windows\system32\cmd.exe
                                                                        "cmd.exe" /c %WINDIR%\System32\bcdedit -set testsigning off
                                                                        2⤵
                                                                          PID:616
                                                                          • C:\Windows\System32\bcdedit.exe
                                                                            C:\Windows\System32\bcdedit -set testsigning off
                                                                            3⤵
                                                                            • Modifies boot configuration data using bcdedit
                                                                            PID:940
                                                                        • C:\Windows\system32\cmd.exe
                                                                          "cmd.exe" /c rundll32 slc.dll,SLReArmWindows
                                                                          2⤵
                                                                            PID:2620
                                                                            • C:\Windows\system32\rundll32.exe
                                                                              rundll32 slc.dll,SLReArmWindows
                                                                              3⤵
                                                                                PID:1792
                                                                            • C:\Windows\system32\cmd.exe
                                                                              "cmd.exe" /c cscript %WINDIR%\System32\slmgr.vbs -rearm
                                                                              2⤵
                                                                                PID:1868
                                                                                • C:\Windows\system32\cscript.exe
                                                                                  cscript C:\Windows\System32\slmgr.vbs -rearm
                                                                                  3⤵
                                                                                    PID:400
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  "cmd.exe" /c icacls %WINDIR%\System32\sppcext.dll /grant *S-1-1-0:F
                                                                                  2⤵
                                                                                    PID:2244
                                                                                    • C:\Windows\system32\icacls.exe
                                                                                      icacls C:\Windows\System32\sppcext.dll /grant *S-1-1-0:F
                                                                                      3⤵
                                                                                      • Possible privilege escalation attempt
                                                                                      • Modifies file permissions
                                                                                      PID:1548
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    "cmd.exe" /c icacls %WINDIR%\System32\sppcomapi.dll /grant *S-1-1-0:F
                                                                                    2⤵
                                                                                      PID:1556
                                                                                      • C:\Windows\system32\icacls.exe
                                                                                        icacls C:\Windows\System32\sppcomapi.dll /grant *S-1-1-0:F
                                                                                        3⤵
                                                                                        • Possible privilege escalation attempt
                                                                                        • Modifies file permissions
                                                                                        PID:1704
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      "cmd.exe" /c icacls %WINDIR%\System32\sppcommdlg.dll /grant *S-1-1-0:F
                                                                                      2⤵
                                                                                        PID:1652
                                                                                        • C:\Windows\system32\icacls.exe
                                                                                          icacls C:\Windows\System32\sppcommdlg.dll /grant *S-1-1-0:F
                                                                                          3⤵
                                                                                          • Possible privilege escalation attempt
                                                                                          • Modifies file permissions
                                                                                          PID:2024
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        "cmd.exe" /c icacls %WINDIR%\System32\sppcext.dll /grant *S-1-1-0:F
                                                                                        2⤵
                                                                                          PID:2628
                                                                                          • C:\Windows\system32\icacls.exe
                                                                                            icacls C:\Windows\System32\sppcext.dll /grant *S-1-1-0:F
                                                                                            3⤵
                                                                                            • Possible privilege escalation attempt
                                                                                            • Modifies file permissions
                                                                                            PID:1044
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          "cmd.exe" /c icacls %WINDIR%\System32\slui.exe /grant *S-1-1-0:F
                                                                                          2⤵
                                                                                            PID:1248
                                                                                            • C:\Windows\system32\icacls.exe
                                                                                              icacls C:\Windows\System32\slui.exe /grant *S-1-1-0:F
                                                                                              3⤵
                                                                                              • Possible privilege escalation attempt
                                                                                              • Modifies file permissions
                                                                                              PID:1092
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            "cmd.exe" /c icacls %WINDIR%\System32\Wat\npWatWeb.dll /grant *S-1-1-0:F
                                                                                            2⤵
                                                                                              PID:2484
                                                                                              • C:\Windows\system32\icacls.exe
                                                                                                icacls C:\Windows\System32\Wat\npWatWeb.dll /grant *S-1-1-0:F
                                                                                                3⤵
                                                                                                • Possible privilege escalation attempt
                                                                                                • Modifies file permissions
                                                                                                PID:1048
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              "cmd.exe" /c icacls %WINDIR%\System32\Wat\WatAdminSvc.exe /grant *S-1-1-0:F
                                                                                              2⤵
                                                                                                PID:1480
                                                                                                • C:\Windows\system32\icacls.exe
                                                                                                  icacls C:\Windows\System32\Wat\WatAdminSvc.exe /grant *S-1-1-0:F
                                                                                                  3⤵
                                                                                                  • Possible privilege escalation attempt
                                                                                                  • Modifies file permissions
                                                                                                  PID:1552
                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                "cmd.exe" /c icacls %WINDIR%\System32\Wat\WatUX.exe /grant *S-1-1-0:F
                                                                                                2⤵
                                                                                                  PID:1740
                                                                                                  • C:\Windows\system32\icacls.exe
                                                                                                    icacls C:\Windows\System32\Wat\WatUX.exe /grant *S-1-1-0:F
                                                                                                    3⤵
                                                                                                    • Possible privilege escalation attempt
                                                                                                    • Modifies file permissions
                                                                                                    PID:2260
                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                  "cmd.exe" /c icacls %WINDIR%\System32\Wat\WatWeb.dll /grant *S-1-1-0:F
                                                                                                  2⤵
                                                                                                    PID:2532
                                                                                                    • C:\Windows\system32\icacls.exe
                                                                                                      icacls C:\Windows\System32\Wat\WatWeb.dll /grant *S-1-1-0:F
                                                                                                      3⤵
                                                                                                      • Possible privilege escalation attempt
                                                                                                      • Modifies file permissions
                                                                                                      PID:2340
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    "cmd.exe" /c icacls %WINDIR%\System32\Wat\WatAdminSvc.exe /grant *S-1-1-0:F
                                                                                                    2⤵
                                                                                                      PID:1512
                                                                                                      • C:\Windows\system32\icacls.exe
                                                                                                        icacls C:\Windows\System32\Wat\WatAdminSvc.exe /grant *S-1-1-0:F
                                                                                                        3⤵
                                                                                                        • Possible privilege escalation attempt
                                                                                                        • Modifies file permissions
                                                                                                        PID:1872
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      "cmd.exe" /c start /wait /min sfc /scannow
                                                                                                      2⤵
                                                                                                        PID:2288
                                                                                                        • C:\Windows\system32\sfc.exe
                                                                                                          sfc /scannow
                                                                                                          3⤵
                                                                                                            PID:1580

                                                                                                      Network

                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                            Replay Monitor

                                                                                                            Loading Replay Monitor...

                                                                                                            Downloads

                                                                                                            • C:\Users\Admin\AppData\Local\Temp\f1449231836.acl

                                                                                                              Filesize

                                                                                                              296B

                                                                                                              MD5

                                                                                                              7a3b8ec21ac9956ed258f5b397d281ab

                                                                                                              SHA1

                                                                                                              63cc8f5ca73640fa5fae2d20e69ce393a07a873d

                                                                                                              SHA256

                                                                                                              bc1f553ca66a548e98f53caf25cebe0fb08f29704549b45095f61893f0113683

                                                                                                              SHA512

                                                                                                              ae19429864fe8c2473857538c8d52c95801ecdb269e11aed8ba700f43c3d6c6363cd8678178db67ffeb31f4ac47f37335643c392914226079da4b998e9edb40c

                                                                                                            • C:\Windows\MBR\HOSTS

                                                                                                              Filesize

                                                                                                              824B

                                                                                                              MD5

                                                                                                              3688374325b992def12793500307566d

                                                                                                              SHA1

                                                                                                              4bed0823746a2a8577ab08ac8711b79770e48274

                                                                                                              SHA256

                                                                                                              2d6bdfb341be3a6234b24742377f93aa7c7cfb0d9fd64efa9282c87852e57085

                                                                                                              SHA512

                                                                                                              59119e66f5945029f8652c5981589d95cace534adc6780ccea736b7e776615caa0b567c14d161271d6066f57d9bab0d4055850162f5a046c0456264b7b9e7508

                                                                                                            • C:\Windows\MBR\bootsect.exe

                                                                                                              Filesize

                                                                                                              95KB

                                                                                                              MD5

                                                                                                              034ab2b9c684d57770e8115426d63278

                                                                                                              SHA1

                                                                                                              9f5d9c197411b18ccd9c3f9fd6c071cdb6791beb

                                                                                                              SHA256

                                                                                                              b2d7e45c20489ed7d8b111a2097352af4c3f5d8e3059e000c23273086cd4396e

                                                                                                              SHA512

                                                                                                              107937198574356ac6512402d4c870605c378eb507442a0b6580a1cfc3b5cef1267f32f8ae3ab702841cc9febf73de9447338b5fdaa2f0cf96443793dfa91c06

                                                                                                            • C:\Windows\MBR\sfix.cmd

                                                                                                              Filesize

                                                                                                              3KB

                                                                                                              MD5

                                                                                                              0f00bdfa3d784cc57bbd7121ac9a5ac1

                                                                                                              SHA1

                                                                                                              9df56ad2d3c8798bccaaa906f1ec8acc6c157524

                                                                                                              SHA256

                                                                                                              7a4cf93010fc72ea41b7a0bad5800aa0d9e575c50b5b7b7816b534abf2a43488

                                                                                                              SHA512

                                                                                                              6cf135c2ccd570c3f33c58ebd070f74dbf0ac64c355980690cc1babab4bbc66322a1991c08ce9a545000a7ffceeec3999ac34e0b18d97c32e8f0d138838d76a1

                                                                                                            • C:\Windows\SysWOW64\slmgr.vbs

                                                                                                              Filesize

                                                                                                              110KB

                                                                                                              MD5

                                                                                                              38482a5013d8ab40df0fb15eae022c57

                                                                                                              SHA1

                                                                                                              5a4a7f261307721656c11b5cc097cde1cf791073

                                                                                                              SHA256

                                                                                                              ac5c46b97345465a96e9ae1edaff44b191a39bf3d03dc1128090b8ffa92a16f8

                                                                                                              SHA512

                                                                                                              29c1348014ac448fb9c1a72bfd0ab16cdd62b628dc64827b02965b96ba851e9265c4426007181d2aa08f8fb7853142cc01fc6e4d89bec8fc25f3d340d3857331

                                                                                                            • memory/1820-5-0x000007FEF6730000-0x000007FEF70CD000-memory.dmp

                                                                                                              Filesize

                                                                                                              9.6MB

                                                                                                            • memory/1820-0-0x000007FEF69EE000-0x000007FEF69EF000-memory.dmp

                                                                                                              Filesize

                                                                                                              4KB

                                                                                                            • memory/1820-10-0x000007FEF6730000-0x000007FEF70CD000-memory.dmp

                                                                                                              Filesize

                                                                                                              9.6MB

                                                                                                            • memory/1820-11-0x000007FEF6730000-0x000007FEF70CD000-memory.dmp

                                                                                                              Filesize

                                                                                                              9.6MB

                                                                                                            • memory/1820-12-0x000007FEF6730000-0x000007FEF70CD000-memory.dmp

                                                                                                              Filesize

                                                                                                              9.6MB

                                                                                                            • memory/1820-6-0x000007FEF6730000-0x000007FEF70CD000-memory.dmp

                                                                                                              Filesize

                                                                                                              9.6MB

                                                                                                            • memory/1820-4-0x000007FEF6730000-0x000007FEF70CD000-memory.dmp

                                                                                                              Filesize

                                                                                                              9.6MB

                                                                                                            • memory/1820-3-0x000007FEF6730000-0x000007FEF70CD000-memory.dmp

                                                                                                              Filesize

                                                                                                              9.6MB

                                                                                                            • memory/1820-2-0x000007FEF6730000-0x000007FEF70CD000-memory.dmp

                                                                                                              Filesize

                                                                                                              9.6MB

                                                                                                            • memory/1820-1-0x0000000000D10000-0x0000000000D78000-memory.dmp

                                                                                                              Filesize

                                                                                                              416KB