Analysis

  • max time kernel
    121s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-12-2024 22:48

General

  • Target

    f615f9d96970538a6d3048705851761b_JaffaCakes118.html

  • Size

    242KB

  • MD5

    f615f9d96970538a6d3048705851761b

  • SHA1

    522b890cf5a819b141fec4f391736c9a3e0e2d89

  • SHA256

    702cfc9de412ef8eb56c6235c8324761754453fd480598a416ebf8eccc9401dc

  • SHA512

    a621ca8850cbb85c26126f3d95fc9d1ebcf81e48d1bcd060582fe85ae0c02f84bdd50b368fd3535674d02c8ed66e6719ea41bd83d6f20c632ee03eb6f809b5d2

  • SSDEEP

    3072:S/VBzRTMQgrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJj:Saz9VxLY7iAVLTBQJlj

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f615f9d96970538a6d3048705851761b_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1272
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1272 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2508
      • C:\Users\Admin\AppData\Local\Temp\ICD1.tmp\FP_AX_CAB_INSTALLER64.exe
        C:\Users\Admin\AppData\Local\Temp\ICD1.tmp\FP_AX_CAB_INSTALLER64.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1636
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" https://get3.adobe.com/flashplayer/update/activex
          4⤵
            PID:836
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2840
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
              PID:1916
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              4⤵
                PID:1704
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1272 CREDAT:209930 /prefetch:2
            2⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1940
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1272 CREDAT:603153 /prefetch:2
            2⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1832
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1272 CREDAT:6042628 /prefetch:2
            2⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1676

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

          Filesize

          914B

          MD5

          e4a68ac854ac5242460afd72481b2a44

          SHA1

          df3c24f9bfd666761b268073fe06d1cc8d4f82a4

          SHA256

          cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

          SHA512

          5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          1KB

          MD5

          a266bb7dcc38a562631361bbf61dd11b

          SHA1

          3b1efd3a66ea28b16697394703a72ca340a05bd5

          SHA256

          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

          SHA512

          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

          Filesize

          252B

          MD5

          524a37145911c2c0dd27d49961d2df07

          SHA1

          b37127fc8cfc0d2a8b73520e92cacd3789043ecc

          SHA256

          582ee2a882fdec8641639ad4c337c4d033af922fa55138d8eaef66511b101d71

          SHA512

          2e10e35cecf1f7f59422ceae7640b8dff207e8baef166b54c9cbf555e0b43e11438c9862a5708f142bf10b0a5bf33c9b7d16c929d9c051df689048174dee4753

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          494fc2dbce60feebf3dcc5498c52c6b3

          SHA1

          89832f457da7907b696daa64c7a1e71ce91d2efa

          SHA256

          2964d6d0980283ed2d9b3a65118671f67d447bfd66bf870c1413de4389b59be4

          SHA512

          2a8917801d562e900a3c38bdcfa4e6fe9469db74f8dcd34661e2aced910f33a1a7b1e422d974769fa7ac241a1381b1bbb5adc95921c2486e18b53a488a79efea

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          1fb98f22a50c26db91464141d9a47b7c

          SHA1

          b0d122f82316280e3ca27b3e5bad98725a05ad07

          SHA256

          38bb1f26e698c7ca14f7212bba9ed1729edca68639bb4bff04695bbb1fa6c276

          SHA512

          71efbd97d378f5ae8923dfd7da23a205226992031800d1a03936524d8de02caa03454856c3959f4329e34a98350107533659f441c35d2c450555fdddb398dd1b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          bbe86c49dc30d77f569d55f9e260af48

          SHA1

          d6247bfb2173284fb006d28c8eb97dbc32b4de00

          SHA256

          661dc110a2841e14d50c10b0444cbbb77a4e7e0017b1865e31eb6e8b3a707ab1

          SHA512

          5397b3a9f390224266ee7ef8e68d956f8c6e7b9827594df08289c224560f9549604e4823941d9546d6e32501cfe0366a33825da366fd9f3bca9a94b1ca26a879

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a5d182ff61119c0ba36a2275573df35c

          SHA1

          d2ae4e1c1cf3f5561738986816c317e32f683c54

          SHA256

          404dc47093e4c381b929aa7831658c1c944c20b7db3c27bd83a2b78cb338bcbc

          SHA512

          cc84caa12402a5d59402f59f111767652d58975ecbbd1aa9c7357fed45c4d6776711ab458be0b6a55285f2c024e13795e54781c3ac800bf6d3289d6cd6b9d03c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          6422bf3b72fa635a7e497f152f4a0198

          SHA1

          c3c601a744c866b184e7444805e555e064014716

          SHA256

          a11d16787ed5c7349433b7f4dd7ae140f8f63e67a63a9de78c09936140c0e583

          SHA512

          fc9844d7a4a4c6c520cfb8517c3665919eda51a5fe91c6068b0c44cd66b8fc35bb7478ebfff6a6e683e3e515c55c4363a72619e58c94f3f7861ef308d503a346

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4749c9759793dd062b0bd6e4746ff487

          SHA1

          351a743568b659872f9a926eb05bfdd4e9311542

          SHA256

          645f8431fb03243d5d5d94ba2f8610563d64299a452d3797fc65113b5a84ef72

          SHA512

          c9b455b1e0e18cf5a5e88856a9061f51453bd1c93ac9253b8d1345ee9188215909044a3495815f94988bfbd23b97332c03aa9b8ef232f0838cef1ce4a44477b9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2a460d276f8b2e2fb2a21ac440ae575a

          SHA1

          09a22e810f37429d9f0d66c09e12645b8958c0a1

          SHA256

          a988d90377ae69b4661b98e54acc86c362385ef1d724e22c49d0bb0c83c21448

          SHA512

          f1a02214bbdf5e6f1644628d39d0797226adc620b248ce069e21998f2023be2f7ec6be8f1b5c537c8e6aee49c60077fcae1c6f945d769dac5020a02682338777

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          1c1156cc7daa9a6789ab71fdd5633e78

          SHA1

          b4aec1599c94b8195c05feb1e9a0e1218941a368

          SHA256

          e65dd4f00bae15069ef628ddba563d070cff5c6731f3096205c6b7023a92aa03

          SHA512

          2cbe037842924645f9dfdde868c942e6b36161e0caaa8ba1584541837823faee873a85b98e69dcf9cdbd83f570399afcbb4656cb7d0eb2f86721ca799d99f663

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          0c922211e33149b065505f2b9a9d413f

          SHA1

          210d14b99690abf7675b6a701206e6c8da38b121

          SHA256

          f92460f436403e6ebcded7d8d07da47fec3ea9cf80fa0ed0c12f11c3b5c59b3b

          SHA512

          236dec0e3b6732895b4c1a48d005c5e140895e5cce0f2bcafd9525faaaf0a80c5524e5dd5816b3e6a8336c92bfa55f5d6018c28fa9f536cef5ba8bbf646c9271

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2ace7ed6544be6208c4e60a862bcf3d0

          SHA1

          6742b27724d848e629b559416fabf3e85288491f

          SHA256

          bcdd29bfca2da2bd00108a90e8f60e8b87139f9a6394842f098c3ad09275d6eb

          SHA512

          34056a8e5ababc31459d7a47c29a3dfcf3ba1bbbb0f905ac894da1d156c5866de7d276bb3128215ee6bd0600f3b52164d3d8c7a83fc1c4a87aef83ca8ec9d984

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a9bd5262a86f8342164ca834776a6769

          SHA1

          ff3f73cf60584888864aab8a861ef2359b9980c3

          SHA256

          44ccf17b1ca2858400e0297ac8485fcd8d2df06d009b2b0273925da62269cc02

          SHA512

          9e31714f1e6275ee24b29d02a2fb5c1d8b755e6f1b4d6b137f2a48c6cb881192a11c66e78c8fc03b3f3043e351e82dda36ee7a2e42bd34839bf0e736585a015e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          30784f2ae5df08b433d878afc8796538

          SHA1

          9bc23f9969526752349a7d727fc3f18c878b5d17

          SHA256

          07938509834b7d1843876486fddbcc318ff832a5636feeb8643b0c427e351280

          SHA512

          b030d1f8ecc4f3f9b4ba7812969a1cf306a159065a52e66ede2291f8f7cd42d448089a1a7796b291fd8014f76052375b08384a1164782eba2b791027380f6e5e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          7ea667b07a223664767dbfe3bfff0ef8

          SHA1

          c91c36fb5da4dae214a483c3b76bc661dd1837ef

          SHA256

          db2b4eef0d61b79f9f573e1d82fed29e6861317b18f3c3fde5143153254fd209

          SHA512

          b097b2f976e9a7366fb832f9219cb657a86b37621032c92469e0460abedbd5e300a6e2e3fa620a5cde48ce4e1bb24c94c188dd8d051a891c72bd60623b8422a9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          f2e44ff848e5e0944e338680891006b2

          SHA1

          8440dee9448ed4c8f0036f5cdd913937c0065540

          SHA256

          380156a40b82ac6818c03161102327e623ee6d4c27556ed2be65f964cb75b62a

          SHA512

          0e3be26feeb1c4cf9159aa3270ee0c47eb19a9ab6a52e4d0e5877a173ce7d7ac1f919a2fb02f8d57ad5e94b4e6fa55d670a91ef3919409c758de484fc77475f0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          87b72f60b7030d7d180ded4b28011b21

          SHA1

          c739174964d0901f7e4d0fda20c735ec9b20d722

          SHA256

          2518af2dac5104b94809a8af375fc0e437c68c0990660290c8428efecc028ebf

          SHA512

          85a61b1b681cc45df480ab9eecea985f3154ce8a6628a044be370ff6bfb517e3e388469c35047ea6a2d71311f536eaa9279b9f16f6921714da9545d2eddc79f0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          8ea09a58c4e1f299f197f9141e6ff4be

          SHA1

          9d3c5a0d4e8bda4efa70581e44e41039e124ddf7

          SHA256

          66ec6d4d5ca2d911cd3a7f1155b53ebe7c18811044243332692490543e1693cb

          SHA512

          9d90d85cf71cc8319c9f0982c8b7dc3b2cdfdfccad3d92f6290c787cf36f2ccc6cb74b9592b0c88e641d956e72afca527471ca627c2bebbb4890d86662a4f27b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2f81b238cad09200ddb906520b0cdee6

          SHA1

          f01396f8b5cff774971df7bb8a86cea0552f5c54

          SHA256

          b93461bc71f92b7c4e577018ee6adcad23428b558ea2d267d7c311c75b3951d6

          SHA512

          678b655863a5e595607d39d72476ef2661754f5fa20ae46209cc1687238a3814fc72f29863b1f8b5dd26cb4e9b53ebedd0856bf77bd20c33b11bed637a0bebb9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          da16de13694092919ef2cd993ebcac97

          SHA1

          4c61d10507984cdd03355f4243d244b9e669c22e

          SHA256

          e40d6d9670dbd0bfe996c4508c46670c8e1e58b297689739f59f81e094f1fb9e

          SHA512

          1e7f2704b81462497ffb7297dd6cd1848712fc648be402f203ea7a8dc5f1233ff05cf9005ae7df9d184a95f106378c09ea6e4e3776d7419f0ee55f3014b1699b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          242B

          MD5

          833b0ce326a11485c6e0489a6af48063

          SHA1

          0eb4cd91a33c58a2762f6bd7ff91dc11cfd73f2c

          SHA256

          6587f7500a2d63281a3d9807d52d70aff1da2ab68733012761d14e4a42c1bfb2

          SHA512

          e0e2ea3f976696a2a3e49557d015e9f7bab1fd3d69905d149ed3a5416bcd1291e3e105f079fdabdc1704c537131b20bda9b877f4328ec9119737128639641c6d

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y8UFEBH5\swflash[1].cab

          Filesize

          225KB

          MD5

          b3e138191eeca0adcc05cb90bb4c76ff

          SHA1

          2d83b50b5992540e2150dfcaddd10f7c67633d2c

          SHA256

          eea074db3f86fed73a36d9e6c734af8080a4d2364e817eecd5cb37cb9ec9dc0b

          SHA512

          82b4c76201697d7d25f2e4f454aa0dd8d548cdfd3ebfa0dd91845536f74f470e57d66a73750c56409510d787ee2483839f799fef5d5a77972cd4435a157a21a4

        • C:\Users\Admin\AppData\Local\Temp\CabB79E.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\ICD1.tmp\FP_AX_CAB_INSTALLER64.exe

          Filesize

          757KB

          MD5

          47f240e7f969bc507334f79b42b3b718

          SHA1

          8ec5c3294b3854a32636529d73a5f070d5bcf627

          SHA256

          c8c8cff5dc0a3f205e59f0bbfe30b6ade490c10b9ecc7043f264ec67ef9b6a11

          SHA512

          10999161970b874db326becd51d5917f17fece7021e27b2c2dfbee42cb4e992c4d5dbeac41093a345ad098c884f6937aa941ec76fb0c9587e9470405ecb67161

        • C:\Users\Admin\AppData\Local\Temp\ICD1.tmp\swflash64.inf

          Filesize

          218B

          MD5

          60c0b6143a14467a24e31e887954763f

          SHA1

          77644b4640740ac85fbb201dbc14e5dccdad33ed

          SHA256

          97ac49c33b06efc45061441a392a55f04548ee47dc48aa8a916de8d13dabec58

          SHA512

          7032669715c068de67d85d5d00f201ee84bb6edac895559b2a248509024d6ce07c0494835c8ee802dbdbe1bc0b1fb7f4a07417ef864c04ebfaa556663dfd7c7f

        • C:\Users\Admin\AppData\Local\Temp\TarB9C3.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • \Users\Admin\AppData\Local\Temp\svchost.exe

          Filesize

          105KB

          MD5

          dfb5daabb95dcfad1a5faf9ab1437076

          SHA1

          4a199569a9b52911bee7fb19ab80570cc5ff9ed1

          SHA256

          54282ec29d4993ed6e9972122cfbb70bba4898a21d527bd9e72a166d7ec2fdc0

          SHA512

          5d31c34403ab5f8db4a6d84f2b5579d4ea18673914b626d78e458a648ac20ddd8e342818e807331036d7bb064f596a02b9737acac42fbead29260343a30717e8

        • memory/2840-556-0x0000000000280000-0x0000000000281000-memory.dmp

          Filesize

          4KB

        • memory/2840-554-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB

        • memory/2840-551-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB

        • memory/2840-555-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB

        • memory/2840-557-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB

        • memory/2840-552-0x00000000001B0000-0x00000000001B1000-memory.dmp

          Filesize

          4KB

        • memory/2840-553-0x00000000001D0000-0x00000000001D1000-memory.dmp

          Filesize

          4KB

        • memory/2840-559-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB