Analysis

  • max time kernel
    148s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 22:52

General

  • Target

    1ccf45c4f29f340012377bcfe6479fee_JaffaCakes118.exe

  • Size

    777KB

  • MD5

    1ccf45c4f29f340012377bcfe6479fee

  • SHA1

    fb1b183193d4395924aa9c3570c5fd30b1b8e321

  • SHA256

    fd117e431e71ee7ed92e5cde68591e39114ed733c181e6701dd47ec1f7821493

  • SHA512

    7b819340cbefb1b8ca9c82b521381adf32ba5d32f47cbcebcff220bf6135bbdb5adf5ec0086beeb2757616172183cdae3c222a1f9074cc8a685d8d21a1faec68

  • SSDEEP

    12288:soGaxSoMVIQ10VyhvXoZ4JF3Z4mxxT6hss9+ChYR1DNj19tVskM:TGgb4hvXosQmXT+ssMEOJjPs1

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 4 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 3 IoCs
  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 17 IoCs
  • UPX packed file 31 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks for any installed AV software in registry 1 TTPs 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 11 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 22 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 64 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: LoadsDriver 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ccf45c4f29f340012377bcfe6479fee_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1ccf45c4f29f340012377bcfe6479fee_JaffaCakes118.exe"
    1⤵
    • Event Triggered Execution: Image File Execution Options Injection
    • Loads dropped DLL
    • Adds Run key to start application
    • Checks for any installed AV software in registry
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c echo ok
      2⤵
        PID:1672
      • C:\Windows\SysWOW64\cacls.exe
        "C:\Windows\System32\cacls.exe" C:\Windows\system32\com /e /t /g Admin:F
        2⤵
          PID:2300
        • C:\Windows\SysWOW64\cacls.exe
          "C:\Windows\System32\cacls.exe" C:\Windows\system32\com /e /t /g Everyone:F
          2⤵
            PID:2140
          • \??\c:\users\admin\appdata\local\temp\1ccf45c4f29f340012377bcfe6479fee_jaffacakes118.exe.log
            "c:\users\admin\appdata\local\temp\1ccf45c4f29f340012377bcfe6479fee_jaffacakes118.exe.log"
            2⤵
            • Event Triggered Execution: Image File Execution Options Injection
            • Executes dropped EXE
            • Loads dropped DLL
            • Checks for any installed AV software in registry
            • Checks whether UAC is enabled
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2920
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /c echo ok
              3⤵
                PID:2544
              • C:\Windows\SysWOW64\cacls.exe
                "C:\Windows\System32\cacls.exe" C:\Windows\system32\com /e /t /g Admin:F
                3⤵
                  PID:2752
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" C:\Windows\system32\com /e /t /g Everyone:F
                  3⤵
                    PID:2724
                  • C:\Windows\SysWOW64\cacls.exe
                    "C:\Windows\System32\cacls.exe" C:\Windows\system32\com\smss.exe /e /t /g Admin:F
                    3⤵
                      PID:2676
                    • C:\Windows\SysWOW64\cacls.exe
                      "C:\Windows\System32\cacls.exe" C:\Windows\system32\com\smss.exe /e /t /g Everyone:F
                      3⤵
                        PID:2240
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd.exe /c rd /s /q "C:\Windows\system32\com\smss.exe"
                        3⤵
                          PID:2580
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd.exe /c del /F /Q "C:\Windows\system32\com\lsass.exe"
                          3⤵
                            PID:1864
                          • C:\Windows\SysWOW64\com\lsass.exe
                            "C:\Windows\system32\com\lsass.exe"
                            3⤵
                            • Event Triggered Execution: Image File Execution Options Injection
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Checks for any installed AV software in registry
                            • Checks whether UAC is enabled
                            • Enumerates connected drives
                            • Drops autorun.inf file
                            • Drops file in System32 directory
                            • Modifies Internet Explorer settings
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:2844
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd.exe /c echo ok
                              4⤵
                                PID:2880
                              • C:\Windows\SysWOW64\cacls.exe
                                "C:\Windows\System32\cacls.exe" C:\Windows\system32\com /e /t /g Admin:F
                                4⤵
                                  PID:1832
                                • C:\Windows\SysWOW64\cacls.exe
                                  "C:\Windows\System32\cacls.exe" C:\Windows\system32\com /e /t /g Everyone:F
                                  4⤵
                                    PID:576
                                  • C:\Windows\SysWOW64\cacls.exe
                                    "C:\Windows\System32\cacls.exe" C:\Windows\system32\com\lsass.exe /e /t /g Admin:F
                                    4⤵
                                      PID:600
                                    • C:\Windows\SysWOW64\cacls.exe
                                      "C:\Windows\System32\cacls.exe" C:\Windows\system32\com\lsass.exe /e /t /g Everyone:F
                                      4⤵
                                        PID:264
                                      • C:\Windows\SysWOW64\cacls.exe
                                        "C:\Windows\System32\cacls.exe" C:\Windows\system32\com\smss.exe /e /t /g Admin:F
                                        4⤵
                                          PID:700
                                        • C:\Windows\SysWOW64\cacls.exe
                                          "C:\Windows\System32\cacls.exe" C:\Windows\system32\com\smss.exe /e /t /g Everyone:F
                                          4⤵
                                            PID:604
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd.exe /c rd /s /q "C:\Windows\system32\com\smss.exe"
                                            4⤵
                                              PID:272
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd.exe /c rd /s /q "C:\Windows\system32\com\lsass.exe"
                                              4⤵
                                                PID:2928
                                              • C:\Windows\SysWOW64\regsvr32.exe
                                                "C:\Windows\System32\regsvr32.exe" C:\Windows\system32\com\netcfg.dll /s
                                                4⤵
                                                • Loads dropped DLL
                                                • Modifies registry class
                                                PID:108
                                              • C:\Windows\SysWOW64\com\smss.exe
                                                C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\~.exe
                                                4⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                PID:1788
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd.exe /c rd /s /q "C:\Windows\system32\dnsq.dll"
                                                4⤵
                                                  PID:2164
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd.exe /c rd /s /q "C:\Windows\system32\com\bak"
                                                  4⤵
                                                    PID:2972
                                                  • C:\Windows\SysWOW64\ping.exe
                                                    ping.exe -f -n 1 www.baidu.com
                                                    4⤵
                                                    • Runs ping.exe
                                                    PID:2204
                                                • C:\Users\Admin\appdata\local\temp\1ccf45c4f29f340012377bcfe6479fee_jaffacakes118.exe
                                                  "C:\Users\Admin\appdata\local\temp\1ccf45c4f29f340012377bcfe6479fee_jaffacakes118.exe"
                                                  3⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Enumerates connected drives
                                                  • Drops autorun.inf file
                                                  • Drops file in Program Files directory
                                                  PID:1288
                                                  • C:\Program Files\Common Files\Microsoft Shared\MSINFO\NTOETECT.exe
                                                    "C:\Program Files\Common Files\Microsoft Shared\MSINFO\NTOETECT.exe"
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Drops file in Windows directory
                                                    PID:2152
                                                    • C:\program files\internet explorer\IEXPLORE.EXE
                                                      "C:\program files\internet explorer\IEXPLORE.EXE"
                                                      5⤵
                                                        PID:300
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 312
                                                        5⤵
                                                        • Loads dropped DLL
                                                        • Program crash
                                                        PID:1812
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      cmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\ReDelBat.bat""
                                                      4⤵
                                                      • Deletes itself
                                                      PID:2012
                                                  • C:\Windows\SysWOW64\com\lsass.exe
                                                    ^c:\users\admin\appdata\local\temp\1ccf45c4f29f340012377bcfe6479fee_jaffacakes118.exe.log
                                                    3⤵
                                                    • Executes dropped EXE
                                                    • Checks whether UAC is enabled
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1952
                                              • C:\Windows\system32\AUDIODG.EXE
                                                C:\Windows\system32\AUDIODG.EXE 0x560
                                                1⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2548

                                              Network

                                              MITRE ATT&CK Matrix ATT&CK v13

                                              Initial Access

                                              Replication Through Removable Media

                                              1
                                              T1091

                                              Persistence

                                              Event Triggered Execution

                                              1
                                              T1546

                                              Image File Execution Options Injection

                                              1
                                              T1546.012

                                              Boot or Logon Autostart Execution

                                              1
                                              T1547

                                              Registry Run Keys / Startup Folder

                                              1
                                              T1547.001

                                              Privilege Escalation

                                              Event Triggered Execution

                                              1
                                              T1546

                                              Image File Execution Options Injection

                                              1
                                              T1546.012

                                              Boot or Logon Autostart Execution

                                              1
                                              T1547

                                              Registry Run Keys / Startup Folder

                                              1
                                              T1547.001

                                              Defense Evasion

                                              Modify Registry

                                              2
                                              T1112

                                              Discovery

                                              Software Discovery

                                              1
                                              T1518

                                              Security Software Discovery

                                              1
                                              T1518.001

                                              System Information Discovery

                                              3
                                              T1082

                                              Query Registry

                                              1
                                              T1012

                                              Peripheral Device Discovery

                                              1
                                              T1120

                                              Remote System Discovery

                                              1
                                              T1018

                                              Lateral Movement

                                              Replication Through Removable Media

                                              1
                                              T1091

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\NetApi000.sys
                                                Filesize

                                                4KB

                                                MD5

                                                f5d93e609591b09430d56625e71ca827

                                                SHA1

                                                3343645770f10997f089f3cc394ff56b5bcc1e9e

                                                SHA256

                                                110b409802aefb25ec924691682144300f8fce3f6e481a0c34e717ee8a38d406

                                                SHA512

                                                38877b1d461bc9b9aebf473296a5640ba4ae95315d29ea422460b94c02a5ca03e085d927091f4b6cc04d5134eaf8c9beb2570cb482eaf9a049de45779b116421

                                              • C:\Program Files\Common Files\Microsoft Shared\MSInfo\ReDelBat.bat
                                                Filesize

                                                212B

                                                MD5

                                                9f7c70b14240c3922a2afa899dbc76fd

                                                SHA1

                                                afa86aa4246adcd7fdd949b61dd1efb4461a2dab

                                                SHA256

                                                b5887b358dc6c4343520d66e92b62a83a9e13d74307149d688e99e43b0c5a7ea

                                                SHA512

                                                4c9f1cc5505d0f75efb3573e346af6b4e626474fab63b0ca7a013384ca906e49a27585519f70aa0b33a070526cbb476bcb40bcf5f16688a19948f432e1e278c5

                                              • C:\Users\Admin\AppData\Local\Temp\1ccf45c4f29f340012377bcfe6479fee_JaffaCakes118.exe
                                                Filesize

                                                594KB

                                                MD5

                                                a679ca78533d1f0b23cf67e941cb227a

                                                SHA1

                                                62422414a11d64d1e3a6346b75e6d6294b34aa98

                                                SHA256

                                                43b8c6dbe50248f3fd541d3200516771f9467dc8b4ba6d8d2f6e9d692dc6f8de

                                                SHA512

                                                fd6914d8837331e3cad8ecbbd9ec035bdc0b93f58dace66634e7a2df980de318e565792a3edabb350a61fe2930b39f4cab39dea8b367405f7fea803b773e0ac8

                                              • C:\Windows\SysWOW64\com\netcfg.000
                                                Filesize

                                                16KB

                                                MD5

                                                d1f6b9273cbb2e23aeed11346d0072c5

                                                SHA1

                                                0d012a7c7b37082dcbd5e1688f72eeade705f825

                                                SHA256

                                                dfb2d7cdc6ea056948d09fe139255af2dcc58f3581f4a50f4e5ee0f5a03c39fc

                                                SHA512

                                                4c3ab878131ad38a54d04cf0d268430ab98a67df474a18ee7858c62561d90ec14c34ed63dd973fdf24115ebf17ef65a6a9fc9ac612c247903e881e584dc3b77e

                                              • C:\Windows\SysWOW64\com\smss.exe
                                                Filesize

                                                40KB

                                                MD5

                                                ae1cd1d740c265b7f18f827f9e37afab

                                                SHA1

                                                6b976bc56e4021e7237b3cd4dbe412b6949fb0a0

                                                SHA256

                                                a961e4f09ebcf11e1e384361d20d4ac031b3c159b9e6d50e3b4612102bef2a11

                                                SHA512

                                                c8f973cbece698f0701171be501c5c24fb77345c05c136ba992b97f74b81c0487e4039c5bb9b43176cc3815e8f2181377811a8a4d8fb08f741fa304767b50571

                                              • C:\autorun.inf
                                                Filesize

                                                90B

                                                MD5

                                                a97437c414e0b98553e335d71b8a63e6

                                                SHA1

                                                4aff3625b6cf4d7bf472fdeb7a0adf359a11e01d

                                                SHA256

                                                2435319b72375c630978dad94f1d660a1ae257ac630016b0e4e322722a2e9827

                                                SHA512

                                                fc8f785f7e9b433ed3ab6fe4fd408ffb0fd19faae6d8456b168ad43e1adb9d8a000d6280a1c9b2862805607da2346384c1269dfb7c2e45f8ce8038ebccf3e223

                                              • \??\f:\NTOETECT.exe
                                                Filesize

                                                777KB

                                                MD5

                                                2421bfc7040ac601948e17d0a3752bb0

                                                SHA1

                                                a531ec27d6b863b9ca16e501e722f98fd7aa1660

                                                SHA256

                                                5c108ba204299be838a95ac660f27363ab19f5b3f14a1321baeadba30651bc9a

                                                SHA512

                                                31516f8792c3eed714d10ef05e7a3977108e5762551476f015e93fced7375de5b1cd8ae6b7218f8a22a163e1c2fcab65afecb510ce4b07f175aed554d68a3165

                                              • \Users\Admin\AppData\Local\Temp\1ccf45c4f29f340012377bcfe6479fee_jaffacakes118.exe.log
                                                Filesize

                                                777KB

                                                MD5

                                                1ccf45c4f29f340012377bcfe6479fee

                                                SHA1

                                                fb1b183193d4395924aa9c3570c5fd30b1b8e321

                                                SHA256

                                                fd117e431e71ee7ed92e5cde68591e39114ed733c181e6701dd47ec1f7821493

                                                SHA512

                                                7b819340cbefb1b8ca9c82b521381adf32ba5d32f47cbcebcff220bf6135bbdb5adf5ec0086beeb2757616172183cdae3c222a1f9074cc8a685d8d21a1faec68

                                              • \Windows\SysWOW64\com\lsass.exe
                                                Filesize

                                                91KB

                                                MD5

                                                176a9ca3454ba4b209f79f26598a1cae

                                                SHA1

                                                573aac32ed2611c40a2cf11f0be2f665e6d1492f

                                                SHA256

                                                23a84ab941e99fa0ff83d0cad6777f097fa4683aa389cbb40e39ad284b261fd7

                                                SHA512

                                                dc7084e1db6ac6e76baf42616527cd775a5b31316052e925c6606e8256e9ee3eeaee5ff64c214a6f3a88ec0fb1f45ef941397106105b297d60e8a3197cf31fbe

                                              • \Windows\SysWOW64\dnsq.dll
                                                Filesize

                                                31KB

                                                MD5

                                                43afc709415b0dfb297dab1209d993b4

                                                SHA1

                                                41c01847c7533aa848ae3f1b82535385857693ed

                                                SHA256

                                                70a6d9489cbb1d3384780f0529c9b32e537e24bdf13c315d7b8e6b3d9d14fc8f

                                                SHA512

                                                a84cade3177e0d1b0672082faebca2a728f69f97750b080bd43a1567307e3b253b48e102adb7fb20ca48d882cb7094a8e1a7a0f816def1acca6072f3a21aaa91

                                              • memory/1288-120-0x0000000004370000-0x00000000044CE000-memory.dmp
                                                Filesize

                                                1.4MB

                                              • memory/1288-69-0x0000000000400000-0x000000000055E000-memory.dmp
                                                Filesize

                                                1.4MB

                                              • memory/1288-62-0x0000000000400000-0x000000000055E000-memory.dmp
                                                Filesize

                                                1.4MB

                                              • memory/1288-119-0x0000000004370000-0x00000000044CE000-memory.dmp
                                                Filesize

                                                1.4MB

                                              • memory/1288-138-0x0000000000400000-0x000000000055E000-memory.dmp
                                                Filesize

                                                1.4MB

                                              • memory/1716-0-0x0000000000400000-0x000000000042B000-memory.dmp
                                                Filesize

                                                172KB

                                              • memory/1716-15-0x0000000000400000-0x000000000042B000-memory.dmp
                                                Filesize

                                                172KB

                                              • memory/1716-13-0x0000000002DE0000-0x0000000002E0B000-memory.dmp
                                                Filesize

                                                172KB

                                              • memory/1788-111-0x0000000010000000-0x0000000010018000-memory.dmp
                                                Filesize

                                                96KB

                                              • memory/1952-59-0x0000000000400000-0x000000000042B000-memory.dmp
                                                Filesize

                                                172KB

                                              • memory/1952-68-0x0000000000400000-0x000000000042B000-memory.dmp
                                                Filesize

                                                172KB

                                              • memory/2152-121-0x0000000000400000-0x000000000055E000-memory.dmp
                                                Filesize

                                                1.4MB

                                              • memory/2152-152-0x0000000010000000-0x0000000010018000-memory.dmp
                                                Filesize

                                                96KB

                                              • memory/2152-150-0x0000000000400000-0x000000000055E000-memory.dmp
                                                Filesize

                                                1.4MB

                                              • memory/2152-129-0x0000000010000000-0x0000000010018000-memory.dmp
                                                Filesize

                                                96KB

                                              • memory/2152-122-0x0000000000400000-0x000000000055E000-memory.dmp
                                                Filesize

                                                1.4MB

                                              • memory/2844-169-0x0000000000400000-0x000000000042B000-memory.dmp
                                                Filesize

                                                172KB

                                              • memory/2844-172-0x0000000000400000-0x000000000042B000-memory.dmp
                                                Filesize

                                                172KB

                                              • memory/2844-198-0x0000000000400000-0x000000000042B000-memory.dmp
                                                Filesize

                                                172KB

                                              • memory/2844-195-0x0000000000400000-0x000000000042B000-memory.dmp
                                                Filesize

                                                172KB

                                              • memory/2844-41-0x0000000000400000-0x000000000042B000-memory.dmp
                                                Filesize

                                                172KB

                                              • memory/2844-187-0x0000000000400000-0x000000000042B000-memory.dmp
                                                Filesize

                                                172KB

                                              • memory/2844-184-0x0000000000400000-0x000000000042B000-memory.dmp
                                                Filesize

                                                172KB

                                              • memory/2844-106-0x0000000010000000-0x0000000010018000-memory.dmp
                                                Filesize

                                                96KB

                                              • memory/2844-181-0x0000000000400000-0x000000000042B000-memory.dmp
                                                Filesize

                                                172KB

                                              • memory/2844-153-0x0000000000400000-0x000000000042B000-memory.dmp
                                                Filesize

                                                172KB

                                              • memory/2844-154-0x0000000000400000-0x000000000042B000-memory.dmp
                                                Filesize

                                                172KB

                                              • memory/2844-157-0x0000000000400000-0x000000000042B000-memory.dmp
                                                Filesize

                                                172KB

                                              • memory/2844-160-0x0000000000400000-0x000000000042B000-memory.dmp
                                                Filesize

                                                172KB

                                              • memory/2844-163-0x0000000000400000-0x000000000042B000-memory.dmp
                                                Filesize

                                                172KB

                                              • memory/2844-166-0x0000000000400000-0x000000000042B000-memory.dmp
                                                Filesize

                                                172KB

                                              • memory/2844-178-0x0000000000400000-0x000000000042B000-memory.dmp
                                                Filesize

                                                172KB

                                              • memory/2844-175-0x0000000000400000-0x000000000042B000-memory.dmp
                                                Filesize

                                                172KB

                                              • memory/2920-40-0x0000000002F30000-0x0000000002F5B000-memory.dmp
                                                Filesize

                                                172KB

                                              • memory/2920-56-0x0000000002F30000-0x000000000308E000-memory.dmp
                                                Filesize

                                                1.4MB

                                              • memory/2920-57-0x0000000002F30000-0x0000000002F5B000-memory.dmp
                                                Filesize

                                                172KB

                                              • memory/2920-17-0x0000000000400000-0x000000000042B000-memory.dmp
                                                Filesize

                                                172KB

                                              • memory/2920-39-0x0000000002F30000-0x0000000002F5B000-memory.dmp
                                                Filesize

                                                172KB

                                              • memory/2920-58-0x0000000002F30000-0x0000000002F5B000-memory.dmp
                                                Filesize

                                                172KB

                                              • memory/2920-60-0x0000000000400000-0x000000000042B000-memory.dmp
                                                Filesize

                                                172KB