Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2024 20:35

General

  • Target

    27b34893f16a8d49650621dd320468abc3050a2d7c49144428fb7da9d07c486a.exe

  • Size

    516KB

  • MD5

    c5be10b6e6fb9f60cfbbd5cee5648f9c

  • SHA1

    90fb886f0dee7f7341092ef77cc42195df3dfeea

  • SHA256

    27b34893f16a8d49650621dd320468abc3050a2d7c49144428fb7da9d07c486a

  • SHA512

    10a1928866297461bc26ae937cba157372408015a14823b049a526e81e2281a5e78821a2e383c2c65086965d76eaffc90e7acbe61a2009dd2afa9d6d65736731

  • SSDEEP

    6144:d/urFQUUZM24vXpEvtZNXEcORzKld9830UAhqzaX3pGMKLYjjeZ4GpeV4Lz5GbR4:+LUZM9purdK0q+IYxj4o9Q7OGeNUFx

Malware Config

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Gozi family
  • Deletes itself 1 IoCs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Discovers systems in the same network 1 TTPs 1 IoCs
  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Deletes itself
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Users\Admin\AppData\Local\Temp\27b34893f16a8d49650621dd320468abc3050a2d7c49144428fb7da9d07c486a.exe
      "C:\Users\Admin\AppData\Local\Temp\27b34893f16a8d49650621dd320468abc3050a2d7c49144428fb7da9d07c486a.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2268
      • C:\Users\Admin\AppData\Local\Temp\27b34893f16a8d49650621dd320468abc3050a2d7c49144428fb7da9d07c486a.exe
        "C:\Users\Admin\AppData\Local\Temp\27b34893f16a8d49650621dd320468abc3050a2d7c49144428fb7da9d07c486a.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1116
        • C:\Windows\explorer.exe
          C:\Windows\explorer.exe
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:2200
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe" -Function
      2⤵
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • outlook_office_path
      • outlook_win_path
      PID:2824
    • C:\Windows\system32\cmd.exe
      cmd /C "systeminfo.exe > C:\Users\Admin\AppData\Local\Temp\3252.bin1"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2648
      • C:\Windows\system32\systeminfo.exe
        systeminfo.exe
        3⤵
        • Gathers system information
        PID:2052
    • C:\Windows\system32\cmd.exe
      cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\3252.bin1"
      2⤵
        PID:2840
      • C:\Windows\system32\cmd.exe
        cmd /C "net view >> C:\Users\Admin\AppData\Local\Temp\3252.bin1"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1712
        • C:\Windows\system32\net.exe
          net view
          3⤵
          • Discovers systems in the same network
          PID:2868
      • C:\Windows\system32\cmd.exe
        cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\3252.bin1"
        2⤵
          PID:1624
        • C:\Windows\system32\cmd.exe
          cmd /C "nslookup 127.0.0.1 >> C:\Users\Admin\AppData\Local\Temp\3252.bin1"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1752
          • C:\Windows\system32\nslookup.exe
            nslookup 127.0.0.1
            3⤵
              PID:2660
          • C:\Windows\system32\cmd.exe
            cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\3252.bin1"
            2⤵
              PID:2076
            • C:\Windows\system32\cmd.exe
              cmd /C "tasklist.exe /SVC >> C:\Users\Admin\AppData\Local\Temp\3252.bin1"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1044
              • C:\Windows\system32\tasklist.exe
                tasklist.exe /SVC
                3⤵
                • Enumerates processes with tasklist
                • Suspicious use of AdjustPrivilegeToken
                PID:2084
            • C:\Windows\system32\makecab.exe
              makecab.exe /F "C:\Users\Admin\AppData\Local\Temp\3A32.bin"
              2⤵
                PID:1332
              • C:\Windows\system32\cmd.exe
                cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\3252.bin1"
                2⤵
                  PID:528
                • C:\Windows\system32\cmd.exe
                  cmd /C "driverquery.exe >> C:\Users\Admin\AppData\Local\Temp\3252.bin1"
                  2⤵
                    PID:1520
                    • C:\Windows\system32\driverquery.exe
                      driverquery.exe
                      3⤵
                        PID:1184
                    • C:\Windows\system32\cmd.exe
                      cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\3252.bin1"
                      2⤵
                        PID:2856
                      • C:\Windows\system32\cmd.exe
                        cmd /C "reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s >> C:\Users\Admin\AppData\Local\Temp\3252.bin1"
                        2⤵
                          PID:824
                          • C:\Windows\system32\reg.exe
                            reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s
                            3⤵
                              PID:1788
                          • C:\Windows\system32\cmd.exe
                            cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\3252.bin1"
                            2⤵
                              PID:676
                            • C:\Windows\system32\cmd.exe
                              cmd /C "reg.exe query "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall" /s >> C:\Users\Admin\AppData\Local\Temp\3252.bin1"
                              2⤵
                                PID:572
                                • C:\Windows\system32\reg.exe
                                  reg.exe query "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall" /s
                                  3⤵
                                    PID:2040
                                • C:\Windows\system32\cmd.exe
                                  cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\3252.bin1"
                                  2⤵
                                    PID:2948
                                  • C:\Windows\system32\cmd.exe
                                    cmd /U /C "type C:\Users\Admin\AppData\Local\Temp\3252.bin1 > C:\Users\Admin\AppData\Local\Temp\3252.bin & del C:\Users\Admin\AppData\Local\Temp\3252.bin1"
                                    2⤵
                                      PID:2704
                                    • C:\Windows\system32\makecab.exe
                                      makecab.exe /F "C:\Users\Admin\AppData\Local\Temp\44FC.bin"
                                      2⤵
                                        PID:2500

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Temp\3252.bin1

                                      Filesize

                                      22KB

                                      MD5

                                      2d10ffa543d9eb8c12229e29fcbf8822

                                      SHA1

                                      aaaeabf9439d5ff54bf1f3bcb44cb32c74e32921

                                      SHA256

                                      17e2f50678c550923bd7660c0e6d9d6aa21c4a2e45f30f3642d1a92fd0a77a27

                                      SHA512

                                      e39b74f38f0bb352937da9545eb795b487d2a457d22bbcfcf9376825ecc410643bef5201d83d6ef13ac6d23b0ef728afb92a1338f96b19aa4fd4156b9ca2d3f3

                                    • C:\Users\Admin\AppData\Local\Temp\3252.bin1

                                      Filesize

                                      53KB

                                      MD5

                                      ee63531a17090269d51164c9977fa397

                                      SHA1

                                      ad2a2cd1e16f1324b2a3f22456b2f4ab8f937c86

                                      SHA256

                                      cfbc58430334e852d355d694b55e52ba1349902ab8807ddcaf95a25d92de28fc

                                      SHA512

                                      87a89c286b06d036b893404568b29946efe5d13f84f21e19f5abcca4d84ba9e97b51f1be73f89a190126f6523a323dc8edfaa961a53f71052a56da7a57823584

                                    • C:\Users\Admin\AppData\Local\Temp\3252.bin1

                                      Filesize

                                      53KB

                                      MD5

                                      f202b695ff140b4e04f6e197384da110

                                      SHA1

                                      a8c47675dc7158144d7376f246541689f9c27c61

                                      SHA256

                                      5edbf5beeb3cefb98bca2b13ac980bed2e07f0b74dec3a8805c4faf7a0c860f6

                                      SHA512

                                      90f5349a73d39820e36e3a2db95e550c449767bba5355b617b04885ef186f39f06b8490b1d702ad7d9111eaeffcddc6e42a685b5eed7da077e6282c1f76820df

                                    • C:\Users\Admin\AppData\Local\Temp\3252.bin1

                                      Filesize

                                      106KB

                                      MD5

                                      858c980fbec725c1a29d7aa9a504f34a

                                      SHA1

                                      5784e82e15a1d006b70cd71eefa75c780bcc6538

                                      SHA256

                                      a0e77b8d2255dcac1df13b51e19fdf58362934c27bc1bc8bcf90bdb0daa956f5

                                      SHA512

                                      10d4c55fc8055ccb33d1eba21f543ab757957df4475c60efe0d5e235c2dc83a71a315046cf29b84057fb6f7e9b7fba3a21ef7bf4afb9768fc7529f2d33d4cc4d

                                    • C:\Users\Admin\AppData\Local\Temp\3252.bin1

                                      Filesize

                                      1KB

                                      MD5

                                      d3f5bc1a2c2bc887c35b16510845886b

                                      SHA1

                                      bd688721c1562aa526d1ef1efd194128588c46c5

                                      SHA256

                                      ea0d818344fd83553cbd57c34e1188b54a82f57a29350ec596fe7494aace7873

                                      SHA512

                                      aaaf499b8955f03035dc2bd836357b9493e1bdaa90dbb539b2d894abeabc71717fceb7e004dc39754350be149a3e9acbbac8b9bd7551b6f2f90f2498f859ee34

                                    • C:\Users\Admin\AppData\Local\Temp\3252.bin1

                                      Filesize

                                      2KB

                                      MD5

                                      766ec4c93ebfe2ef2fcdc40fe0a38ce6

                                      SHA1

                                      61d9f9ecb2dad75d7f692eedc7847fff658bdea7

                                      SHA256

                                      cfe317f04b2a5dc26e0c72848d3a27e64d7cfbf41cac1266c361258b6c3a35ff

                                      SHA512

                                      3c0911ea73228b86e77ce508a1b41aae9b3091241a2e9863a6230d0a33c95f3bd096474dda1256b6cab2dc32499cbb6f45d9d792a3250db70e62b4a244f8470f

                                    • C:\Users\Admin\AppData\Local\Temp\3252.bin1

                                      Filesize

                                      2KB

                                      MD5

                                      78b34528cf5cd4031a35bd26d813105e

                                      SHA1

                                      245caee9fc03ebe6ba75eaa24dc7628ccdb81b58

                                      SHA256

                                      39750c8ee516c33c183cc61743baddb1dd1d1ba5c328c39dcc362607ff2e5261

                                      SHA512

                                      d112f7955167d3cd031914f074f4e0eea32573e2223081572aaebf6be2eb36272b1b30a578d8eeb6d8cdad7e48b3403b78497c46612467688581f476d48a0dda

                                    • C:\Users\Admin\AppData\Local\Temp\3252.bin1

                                      Filesize

                                      5KB

                                      MD5

                                      833d7f9ef0eabb56b77261e6501bbc9e

                                      SHA1

                                      bf158c53f2498b9e8366098618d0dd2ee6ece088

                                      SHA256

                                      d72e14cede87a08c28d639fd14fa6f592edfbf279443efa97d789d441160a8b7

                                      SHA512

                                      0d1c6ed09dee86a204c8137a2be7e224b2262845db80838650592173230e283f30f95b74579edfdb690ccacd8bd2749fe24903b5a6b4fdaecb2fec95e4b25400

                                    • C:\Users\Admin\AppData\Local\Temp\3A32.bin

                                      Filesize

                                      153B

                                      MD5

                                      088a021d7598ebbf439535545c732d0a

                                      SHA1

                                      7b46efdac2637844b6ffbbd4a2136c57ad359ebb

                                      SHA256

                                      b7225a7484c38b4c376ceb8ced352053a4bebc27a5d34230e37d182b034f3cab

                                      SHA512

                                      49f1974c7f65611b6fa79f7ba87d3bf45fead55081be2199910d877be4f72696c25e3788218e9b8f38c31d39c5cb67578ec7e5d0f4028c3ea273e86b18de908d

                                    • C:\Users\Admin\AppData\Local\Temp\42D6.bin

                                      Filesize

                                      306B

                                      MD5

                                      97af87b33500a08c515964b93b250670

                                      SHA1

                                      195721846af8ce0ad949d866804e70de039f4afc

                                      SHA256

                                      60f4e27cb46ca469051ddfa0446c8861d22c05b501127390744442e5c048da18

                                      SHA512

                                      33755013ce413bef30896571f8fce7cb1c7ae91866257743e07b4e8e736d876cad66542cb101339c78a08173979bde0f6a0e36c743dcd80eae06bf0c528069fb

                                    • C:\Users\Admin\AppData\Local\Temp\44FC.bin

                                      Filesize

                                      153B

                                      MD5

                                      e04e211eeb3a3e28ddb439b3f39f154b

                                      SHA1

                                      eddd2b4a7f1d684340cbf4c9f5ed9a24717b5460

                                      SHA256

                                      11a4422ad09172378b9d03a94f0158e7c3633ba2693923be7337a7d7f94e7d56

                                      SHA512

                                      8575cd98283163639eb9595bcc9c7e9661562431387ff6becd7c9a2d74e2c169d8d64d1a624c8fe5c186c4f42ebaadec3a0432320d1cce9113cc7399638b3056

                                    • C:\Users\Admin\AppData\Local\Temp\4DA0.bin

                                      Filesize

                                      13KB

                                      MD5

                                      dbb2d70c430e106ef1e87b33f8c53084

                                      SHA1

                                      66dfde42a2925a0c4383d6a1bce3b707755e29cc

                                      SHA256

                                      bbade9a152e64cf723672de673a7ebb03ab7ede3acfa9bd2fafa0a69d46a93c1

                                      SHA512

                                      c8d4af04ed8876ab01eb41e022d82d4b06f5ead162f88b79a288018c09b77e5244df8f97086b90e24b1198db19648b99bbfcd3af2b31e5c44d20339528dd7ca8

                                    • C:\Users\Admin\AppData\Local\Temp\setup.inf

                                      Filesize

                                      940B

                                      MD5

                                      71e17030558bd46564b36eeab1fb11d7

                                      SHA1

                                      875ed9ad4b810d3a2e342c76448f2293fb2c63af

                                      SHA256

                                      4a35a07f7c3091e278ff8d480786cea5197aa5252b06877430fba9ac20945b5a

                                      SHA512

                                      1ce99a593c678e3a201c9888c4cdf6f6a4254016fcd3600b1a2ef5f770bf6ba5e84e67cdedd33bfce377cce2d3412ba4edd6b7ecfbcf78782f89561f31d14dc1

                                    • C:\Users\Admin\AppData\Local\Temp\setup.rpt

                                      Filesize

                                      283B

                                      MD5

                                      7712a9038ec0e9be6f708dd32d893442

                                      SHA1

                                      fb0e495c2a64710294e7d7aa646786ba7c8c0fc3

                                      SHA256

                                      31356cf2fc8cdd313c94a2e4bc562b06ca73b672f25b0ea960041f024f1ab6a0

                                      SHA512

                                      c55262826fd52b09f6c8d72055c60764ef1e59ffc3898f6db53c0fafe113b6c7149a5c6334441fd9aebf67a926e52e0d25362d68bd920a57007f2c2ca43eca0f

                                    • C:\Users\Admin\AppData\Roaming\MICROS~1\{AFE26~1\01DB5643660EC09009

                                      Filesize

                                      585B

                                      MD5

                                      5b80054e7d587e29ace907da270a1b32

                                      SHA1

                                      a89ef1ac2e2841d0583f220f2b33789c10f3c16b

                                      SHA256

                                      3b65a327f5248301ac063a881b8f4049e27593b4320dba3b8c61c112489ff821

                                      SHA512

                                      5330fe7393e7a98c638471723ffebfbd7c4f6dfb2304fafad513825ed87f1107bc01c5d8de245daf95312a9fcec6d525a1015f5845738ed9adf720a53f8ef77e

                                    • C:\Users\Admin\AppData\Roaming\MICROS~1\{AFE26~1\setup.inf

                                      Filesize

                                      947B

                                      MD5

                                      bc282347e60099ab0571b4afd4817794

                                      SHA1

                                      25a4048adc2f29fa6120ce67d56613a87e702883

                                      SHA256

                                      413e2d50ac68d63bf9e1d549778f9c0a0d9db292c6d8313a3f2d9890cb3fb124

                                      SHA512

                                      145e24d1fcd0d54fd86c21d03411ee29263f416611830335323bf673e7c640c52e60af2bda97fa4a2dda64c4abc5023142a642a11d041f9297db748ab1f72291

                                    • C:\Users\Admin\AppData\Roaming\MICROS~1\{AFE26~1\setup.rpt

                                      Filesize

                                      283B

                                      MD5

                                      56c8d8b140d1b3b7ca4585195837c6e7

                                      SHA1

                                      8bd3b6c2fa5a2bd8ea4afd783f35287e30b578e2

                                      SHA256

                                      cbe8b8a5cf6274cf48fa4e75102eb1252aa85818b7626a1b9a781c604ec0b228

                                      SHA512

                                      f540f3712375bc1a855946df4d07d2667e3182827f15f47da50c5ae0bd114b614d8f05591c8d4a010d030e1e78fb74dbbbba86836db36d0fd9c7243fdd2221ea

                                    • memory/1116-8-0x0000000000400000-0x0000000000473000-memory.dmp

                                      Filesize

                                      460KB

                                    • memory/1116-25-0x0000000000400000-0x0000000000473000-memory.dmp

                                      Filesize

                                      460KB

                                    • memory/1116-4-0x0000000000400000-0x0000000000473000-memory.dmp

                                      Filesize

                                      460KB

                                    • memory/1116-10-0x0000000000400000-0x0000000000473000-memory.dmp

                                      Filesize

                                      460KB

                                    • memory/1116-2-0x0000000000400000-0x0000000000473000-memory.dmp

                                      Filesize

                                      460KB

                                    • memory/1116-6-0x0000000000400000-0x0000000000473000-memory.dmp

                                      Filesize

                                      460KB

                                    • memory/1116-12-0x0000000000400000-0x0000000000473000-memory.dmp

                                      Filesize

                                      460KB

                                    • memory/1116-14-0x0000000000400000-0x0000000000473000-memory.dmp

                                      Filesize

                                      460KB

                                    • memory/1116-16-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1116-21-0x0000000000400000-0x0000000000473000-memory.dmp

                                      Filesize

                                      460KB

                                    • memory/1116-18-0x0000000000400000-0x0000000000473000-memory.dmp

                                      Filesize

                                      460KB

                                    • memory/1116-20-0x0000000000400000-0x0000000000473000-memory.dmp

                                      Filesize

                                      460KB

                                    • memory/1388-47-0x0000000006EE0000-0x0000000007017000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1388-46-0x0000000006EE0000-0x0000000007017000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1388-153-0x0000000006EE0000-0x0000000007017000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1388-50-0x0000000006EE0000-0x0000000007017000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1388-32-0x0000000006EE0000-0x0000000007017000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1388-45-0x0000000006EE0000-0x0000000007017000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1388-44-0x0000000006EE0000-0x0000000007017000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1388-60-0x0000000006EE0000-0x0000000007017000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1388-43-0x0000000006EE0000-0x0000000007017000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1388-42-0x0000000006EE0000-0x0000000007017000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1388-37-0x0000000006EE0000-0x0000000007017000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1388-41-0x0000000006EE0000-0x0000000007017000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1388-75-0x0000000006EE0000-0x0000000007017000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1388-38-0x0000000002630000-0x0000000002631000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1388-39-0x0000000006EE0000-0x0000000007017000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1388-40-0x0000000006EE0000-0x0000000007017000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1388-109-0x0000000006EE0000-0x0000000007017000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/2200-36-0x0000000001CF0000-0x0000000001E27000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/2200-31-0x0000000001CF0000-0x0000000001E27000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/2200-27-0x0000000001CF0000-0x0000000001E27000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/2200-26-0x0000000000150000-0x0000000000151000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2200-22-0x000007FFFFFDE000-0x000007FFFFFDF000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2268-1-0x0000000000020000-0x0000000000021000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2824-63-0x0000000001D40000-0x0000000001E77000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/2824-59-0x0000000001D40000-0x0000000001E77000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/2824-53-0x0000000001D40000-0x0000000001E77000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/2824-52-0x0000000001D40000-0x0000000001E77000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/2824-49-0x000007FFFFFD6000-0x000007FFFFFD7000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2824-51-0x0000000000160000-0x0000000000161000-memory.dmp

                                      Filesize

                                      4KB