Analysis

  • max time kernel
    118s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20/05/2024, 16:28

General

  • Target

    6010186650c6bc5d5b44a25a0c2be27d_JaffaCakes118.html

  • Size

    351KB

  • MD5

    6010186650c6bc5d5b44a25a0c2be27d

  • SHA1

    ce58ab6bc27a7acb961bd217bf09916e8caf9957

  • SHA256

    6aa59d328323ec58dcb8ac037e8df1ba988306aa0ffda48953da6774e2a93811

  • SHA512

    0cb6efce6cc996740574fedad6490107b8e14314fa621aa934fd1e00db7632664138b9ee5dc5f04080788d10222b39937489f4a7ae51e2b842b9f147c65577fe

  • SSDEEP

    6144:Skeo67hB7nS2B/YY0odmJsMYod+X3oI+YRGDe1sMYod+X3oI+YRGDev:peo67hB7nS2B/YY0odmV5d+X3vGDG5d2

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 47 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\wininit.exe
    wininit.exe
    1⤵
      PID:388
      • C:\Windows\system32\services.exe
        C:\Windows\system32\services.exe
        2⤵
          PID:480
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k DcomLaunch
            3⤵
              PID:600
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                4⤵
                  PID:1856
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k RPCSS
                3⤵
                  PID:676
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                  3⤵
                    PID:752
                  • C:\Windows\System32\svchost.exe
                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
                    3⤵
                      PID:816
                      • C:\Windows\system32\Dwm.exe
                        "C:\Windows\system32\Dwm.exe"
                        4⤵
                          PID:1060
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs
                        3⤵
                          PID:844
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService
                          3⤵
                            PID:968
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k NetworkService
                            3⤵
                              PID:240
                            • C:\Windows\system32\taskhost.exe
                              "taskhost.exe"
                              3⤵
                                PID:1080
                              • C:\Windows\System32\spoolsv.exe
                                C:\Windows\System32\spoolsv.exe
                                3⤵
                                  PID:1088
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
                                  3⤵
                                    PID:1168
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
                                    3⤵
                                      PID:2104
                                    • C:\Windows\system32\sppsvc.exe
                                      C:\Windows\system32\sppsvc.exe
                                      3⤵
                                        PID:2960
                                    • C:\Windows\system32\lsass.exe
                                      C:\Windows\system32\lsass.exe
                                      2⤵
                                        PID:496
                                      • C:\Windows\system32\lsm.exe
                                        C:\Windows\system32\lsm.exe
                                        2⤵
                                          PID:504
                                      • C:\Windows\system32\csrss.exe
                                        %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
                                        1⤵
                                          PID:400
                                        • C:\Windows\system32\winlogon.exe
                                          winlogon.exe
                                          1⤵
                                            PID:436
                                          • C:\Windows\Explorer.EXE
                                            C:\Windows\Explorer.EXE
                                            1⤵
                                              PID:1152
                                              • C:\Program Files\Internet Explorer\iexplore.exe
                                                "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6010186650c6bc5d5b44a25a0c2be27d_JaffaCakes118.html
                                                2⤵
                                                • Modifies Internet Explorer settings
                                                • Suspicious use of FindShellTrayWindow
                                                • Suspicious use of SetWindowsHookEx
                                                • Suspicious use of WriteProcessMemory
                                                PID:2088
                                                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:2
                                                  3⤵
                                                  • Loads dropped DLL
                                                  • Modifies Internet Explorer settings
                                                  • Suspicious use of SetWindowsHookEx
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:2500
                                                  • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • Drops file in Program Files directory
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious behavior: MapViewOfSection
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:2216
                                                  • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Drops file in Program Files directory
                                                    PID:2432
                                                    • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
                                                      "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious behavior: MapViewOfSection
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2664

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              68KB

                                              MD5

                                              29f65ba8e88c063813cc50a4ea544e93

                                              SHA1

                                              05a7040d5c127e68c25d81cc51271ffb8bef3568

                                              SHA256

                                              1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

                                              SHA512

                                              e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              8eb4bc9b208c69b45bff6226c4adbfb8

                                              SHA1

                                              5e6d65a33995d7c7108be7e164725ca16706e619

                                              SHA256

                                              84c0ffc8f0dff97232092a696121978c066d9c637371f9f54c600fce770ec79a

                                              SHA512

                                              8f5ae5c8413942639ea3da051f94ccd09c9ae6b3e5c1069760d80424094aea1a173c2fd3c105e76084ea1a31f06ce0e65f6acfd838cc2d7a30a39b7e87c04445

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              4590d25f63456204ccfa2d3123082c9e

                                              SHA1

                                              2e96fd13c6cb2dad301ab5f388765d805c45ceb2

                                              SHA256

                                              9e28d2de1254df313d9417a0a5fc82915d341c354500dd9640a064a24651db64

                                              SHA512

                                              678f652b84167b6e0f70b627ae64db38b8facad1f98018737a683f07793cda9dc5e659396db1142e09d22dac9e012bccf70fe808f79b1420dde628266b8921d1

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              ce26fa888f443c7ff56cedc0880e8522

                                              SHA1

                                              de7798fdfd825fac913e0f19898cbde6ba054594

                                              SHA256

                                              25e800d44c77518e9fae9804c825a12b617e4f195770625b4e158c176ebf1123

                                              SHA512

                                              0bc883af35f325a27174bd8d0395001a38cad7558185fea9fca5d5a2cc2535276cb3e2a3655bd337e14832dbe9e25acbe282894d4beb8399c8094041600bb3c7

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              7fb0986fd12f812d459434c27db9d972

                                              SHA1

                                              2c5672ccf6e39d8dd6aa9ffc23b587814060e360

                                              SHA256

                                              8ea6e3750498f410297acbd3babfc6cf2047241e32d761acff88e12fdb290f95

                                              SHA512

                                              b57aa7cd9fe230d40de2150a47422311eb99d3510e90e0fc61a722b8c1e66f5048254959a48a23edaedcf33ed2b1c9c72e0d010dc9b30681fe32d2236568a849

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              7932d6357bb39983b028a572bed4f4c4

                                              SHA1

                                              5291fdc3316f67e44b3603cbd9991c13680b4eee

                                              SHA256

                                              7e8b1cca50b16484eaa46e2d253d337a789c42a226f4ea793482314a1545f1a9

                                              SHA512

                                              4e592446ac03ec1d355ba350bd18e02727c7274a412a9480704897264f965a0bd22bd686246dec4533bac87ff2a417aaff0b43ec93d876c5b6f380ab1eba106e

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              28bf2d4ae173cd8a1c16dfc0983df921

                                              SHA1

                                              a2f22aae62189db2ad31ca3ff872058a1b55af55

                                              SHA256

                                              ae285411452fd63af412178bb75ea1ef3deba8efdd24f0a0d3d7f6c58df9708f

                                              SHA512

                                              2cd89f6d33f604c49ca26b92395882f21e37efd8a128ed408c106259fd501cb6f88ba6c729e90250bfb1eba3d2cae0d43d92626cb34719e73682ef36d1ba450a

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              69d8aaa791e481dcf7e69f4af07d45fb

                                              SHA1

                                              cd1aa2c2b48f49004e40a3f519bc406ba1168a0b

                                              SHA256

                                              55d6d5ec8a4d03f17b012fd95d7f79e7af3dda884dc59a8f3ef612de64b4a250

                                              SHA512

                                              675665d911cf76cff710d7e1a00f8fe8b11e70d43bc11ee3ed79adad3870fa942e922638cc835a595d974f8da73d143a3f4a0604aa4e12e59739f6603e690098

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              055247c53c610c39389513e9e9a967ee

                                              SHA1

                                              bb22c78e76d92b3a7cbc65b173ec10c09e7e081a

                                              SHA256

                                              f61183b991b71db71ce648f5517ad44ea377cd740221864c3f57a69e250ade9b

                                              SHA512

                                              40ef91fcea003a2662df50732462ee808fae5b348cb763759c7ab1f66ef9df062849ba215f7b10ffa5b1ffbdb2e799188914435e687452f48f0cf0106154308f

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              5c77755fcb2d82d4184ba5dd3694dd14

                                              SHA1

                                              99e46987ca4bfdd91a5648710218c94bd50512e1

                                              SHA256

                                              d2dc891b7732f50d30262b2fe79e6ce82b123879e54e7212771df1ef8e69250c

                                              SHA512

                                              64cd2ee5beefe5ee9c3c272ce1af50d3396b92ffcade970aa54a6c270f667d1f5fd37798296bc5e30ed5f7e0958576bc2fe57e7459df087a071c5cfbb0a7f89b

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              623dad1c43351722207a7830e29f33bb

                                              SHA1

                                              6018d9deffee83035c18f691298fa60e5a0e892f

                                              SHA256

                                              b66179627e85e53ad547224f29ff0cbe90bbd2754eef6b6616d3520e687f5a29

                                              SHA512

                                              6564f0b289862ec53f7faac03e316e6a5417b5b12a05ae5be9308b655f8c2863b816f0f529cf744fa3ca7416baed7d617cba4d7984373155b0192bb4384f3833

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              c5ab06cbb67a84a10717a44e7cf3fe10

                                              SHA1

                                              621b1a1415a7b502289d17458feb86a9e10cf5fa

                                              SHA256

                                              db25c015324acdef13cfd402f4243282c21a525a8f44e30430b6c9aa0aca4706

                                              SHA512

                                              a3c958d547ccc9d04a36a6ec7105abe61059b9b5628414b8039d6ed48429bec8d112233e2f686c4018f01f2e5c767b8916ce5be8cff1c69833088958b0dd88ed

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              8af8e194df3054bd501cb78c5ef34969

                                              SHA1

                                              ee4faaaf548902129e299c26ea9167acf570fd86

                                              SHA256

                                              c542560b46dd745a3fa53477ab4d743a7167c107b5d5db4b555fb53540678929

                                              SHA512

                                              b8e2826d40b0f8c65b5f3af948f2534ad5fb115ed9e83c7a0a0883cadd1a812928d1257577cbfab30002364f529018ef3ece2e14d7349aba76ee34ce28535685

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              daa1455b1c36a3f1ef0996e09ff73b2e

                                              SHA1

                                              cb82a6844400f1768e2c2e8516adddce3e652060

                                              SHA256

                                              0a40c854dac320dd65154dc7ccb04fb0d93a5e91f3c5015779acb876d2989e95

                                              SHA512

                                              838869070b49168104eb2d0551609620e9e23e032a32c36d3087f5f497e79bb3732c4aac73880f00c24702930824c3af9db13a582388d82096d813d0ed0e4fd5

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              b141a3d17c2df7f22546f9e344c8a683

                                              SHA1

                                              ef1b18c6c202a73142067090c2868b9320fbd8d4

                                              SHA256

                                              8e75862d1a5881177264fc56a74bf9142502670d824b66c5d5d9a5a592cf0ee1

                                              SHA512

                                              f937e5076fe5d04aac5bcb4419e185a3775c7729df2de78271879840fd3ce134704e72ae092004acadd28d09441783a528abbe45e102f791785f9d0175093343

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              dec8c52918f5d0b85a4ad27331cee9e2

                                              SHA1

                                              766c76eff9fa827cf692d416b71f8f5989fa3d8d

                                              SHA256

                                              a034330d06e2be540f22073193869242ef120a350b2ecd34557f70b8997ba0d7

                                              SHA512

                                              378446d8422b4d15b55ff179978d19a59094e67a1712b5e0dae943e82e74f10f7a196ff7d403bf191f04a54fd5f09bcd481e607876deaa6fa8044f6c7adecded

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              db305b79396553a889a53168c4eedbf7

                                              SHA1

                                              3b13da519b643f72d1439c1a40795bdeaeecd613

                                              SHA256

                                              2cf9545049061fd87bc88126f28581fdcc9679b875cf10311f2054c3c932bd3d

                                              SHA512

                                              92f94fbb4f4299b44361d5c6d155553830e7763530e5666a8767fbe6fa692f32d34499b75c3c11036bd57c34da0445db0882c74559a3ce00c3900514c605e0ff

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              13ad11e7241a105c678479e8ad418818

                                              SHA1

                                              0be8039f22e57b32232e934ffd028c108da914ef

                                              SHA256

                                              06cb645b5374190dbc9aa2fa2cdb1ddc4a281bf89d82066dabc9f790dda458a7

                                              SHA512

                                              c5cbe4650b5f97ab4b8c5ddec9ac4de6b4d9b53c5947cbeeec844c9ee1a62750275eba047fa5603f50d314508b94c78007eb29ecda7182a1c88cc96b833cdf71

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              82c5332f5b18cfa3100efc9cf18e4b87

                                              SHA1

                                              b2977fca4695498c108302a747c74b282451a217

                                              SHA256

                                              c3f8aa50bdeac2156fa712b5a0c7deca05b389866c79fe2316b2fae0be3c8841

                                              SHA512

                                              85c973ec5468b24948e79896045529f87e05b4864095e72cf8f198fc614b1f7426ddce295adae12df1e4ad56583b57541ad172ae8b853dddea8f908e7a4769f9

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              90ecae67b88bd7268e3e4271385428e4

                                              SHA1

                                              f43c10fc73a6966cbfd042328ea389c2484812bf

                                              SHA256

                                              7b6ff54d81647221bfdc71118fddab853718542f96736e88bb24dce9bf428612

                                              SHA512

                                              bcd54e6205955f3936a6634a80d752acc953edc18c28a1053f4f415b98a648c75cd3d57c039431ff39ee1751fbe90e4a18407392201d1f989921023cb90bc0f0

                                            • C:\Users\Admin\AppData\Local\Temp\CabD52C.tmp

                                              Filesize

                                              65KB

                                              MD5

                                              ac05d27423a85adc1622c714f2cb6184

                                              SHA1

                                              b0fe2b1abddb97837ea0195be70ab2ff14d43198

                                              SHA256

                                              c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                                              SHA512

                                              6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                                            • C:\Users\Admin\AppData\Local\Temp\TarD61E.tmp

                                              Filesize

                                              177KB

                                              MD5

                                              435a9ac180383f9fa094131b173a2f7b

                                              SHA1

                                              76944ea657a9db94f9a4bef38f88c46ed4166983

                                              SHA256

                                              67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

                                              SHA512

                                              1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

                                            • \Users\Admin\AppData\Local\Temp\svchost.exe

                                              Filesize

                                              84KB

                                              MD5

                                              03451dfbff127a5643a1ed613796621d

                                              SHA1

                                              b385005e32bae7c53277783681b3b3e1ac908ec7

                                              SHA256

                                              60c6c49b3a025dbf26a1f4540921908a7ea88367ffc3258caab780b74a09d4fb

                                              SHA512

                                              db7d026781943404b59a3d766cd4c63e0fa3b2abd417c0b283c7bcd9909a8dad75501bd5a5ff8d0f8e5aa803931fc19c66dcaf7f1a5450966511bdaa75df8a89

                                            • memory/2216-22-0x00000000002A0000-0x00000000002A1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/2216-24-0x0000000000400000-0x0000000000436000-memory.dmp

                                              Filesize

                                              216KB

                                            • memory/2216-10-0x0000000000400000-0x0000000000436000-memory.dmp

                                              Filesize

                                              216KB

                                            • memory/2432-20-0x000000007EFA0000-0x000000007EFAC000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/2432-14-0x0000000000230000-0x000000000023F000-memory.dmp

                                              Filesize

                                              60KB

                                            • memory/2432-13-0x0000000000400000-0x0000000000436000-memory.dmp

                                              Filesize

                                              216KB

                                            • memory/2664-26-0x0000000000400000-0x0000000000436000-memory.dmp

                                              Filesize

                                              216KB

                                            • memory/2664-27-0x0000000000260000-0x0000000000261000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/2664-29-0x0000000000400000-0x0000000000436000-memory.dmp

                                              Filesize

                                              216KB