Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2024 20:38

General

  • Target

    27b34893f16a8d49650621dd320468abc3050a2d7c49144428fb7da9d07c486a.exe

  • Size

    516KB

  • MD5

    c5be10b6e6fb9f60cfbbd5cee5648f9c

  • SHA1

    90fb886f0dee7f7341092ef77cc42195df3dfeea

  • SHA256

    27b34893f16a8d49650621dd320468abc3050a2d7c49144428fb7da9d07c486a

  • SHA512

    10a1928866297461bc26ae937cba157372408015a14823b049a526e81e2281a5e78821a2e383c2c65086965d76eaffc90e7acbe61a2009dd2afa9d6d65736731

  • SSDEEP

    6144:d/urFQUUZM24vXpEvtZNXEcORzKld9830UAhqzaX3pGMKLYjjeZ4GpeV4Lz5GbR4:+LUZM9purdK0q+IYxj4o9Q7OGeNUFx

Malware Config

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Gozi family
  • Deletes itself 1 IoCs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Discovers systems in the same network 1 TTPs 1 IoCs
  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Deletes itself
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1120
    • C:\Users\Admin\AppData\Local\Temp\27b34893f16a8d49650621dd320468abc3050a2d7c49144428fb7da9d07c486a.exe
      "C:\Users\Admin\AppData\Local\Temp\27b34893f16a8d49650621dd320468abc3050a2d7c49144428fb7da9d07c486a.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2084
      • C:\Users\Admin\AppData\Local\Temp\27b34893f16a8d49650621dd320468abc3050a2d7c49144428fb7da9d07c486a.exe
        "C:\Users\Admin\AppData\Local\Temp\27b34893f16a8d49650621dd320468abc3050a2d7c49144428fb7da9d07c486a.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2696
        • C:\Windows\explorer.exe
          C:\Windows\explorer.exe
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:2804
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe" -Function
      2⤵
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • outlook_office_path
      • outlook_win_path
      PID:2724
    • C:\Windows\system32\cmd.exe
      cmd /C "systeminfo.exe > C:\Users\Admin\AppData\Local\Temp\2FD2.bin1"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2988
      • C:\Windows\system32\systeminfo.exe
        systeminfo.exe
        3⤵
        • Gathers system information
        PID:2828
    • C:\Windows\system32\cmd.exe
      cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\2FD2.bin1"
      2⤵
        PID:1360
      • C:\Windows\system32\cmd.exe
        cmd /C "net view >> C:\Users\Admin\AppData\Local\Temp\2FD2.bin1"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1736
        • C:\Windows\system32\net.exe
          net view
          3⤵
          • Discovers systems in the same network
          PID:1696
      • C:\Windows\system32\makecab.exe
        makecab.exe /F "C:\Users\Admin\AppData\Local\Temp\2CF9.bin"
        2⤵
          PID:1608
        • C:\Windows\system32\cmd.exe
          cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\2FD2.bin1"
          2⤵
            PID:2392
          • C:\Windows\system32\cmd.exe
            cmd /C "nslookup 127.0.0.1 >> C:\Users\Admin\AppData\Local\Temp\2FD2.bin1"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2936
            • C:\Windows\system32\nslookup.exe
              nslookup 127.0.0.1
              3⤵
                PID:3040
            • C:\Windows\system32\cmd.exe
              cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\2FD2.bin1"
              2⤵
                PID:408
              • C:\Windows\system32\cmd.exe
                cmd /C "tasklist.exe /SVC >> C:\Users\Admin\AppData\Local\Temp\2FD2.bin1"
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:2180
                • C:\Windows\system32\tasklist.exe
                  tasklist.exe /SVC
                  3⤵
                  • Enumerates processes with tasklist
                  • Suspicious use of AdjustPrivilegeToken
                  PID:824
              • C:\Windows\system32\cmd.exe
                cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\2FD2.bin1"
                2⤵
                  PID:1308
                • C:\Windows\system32\cmd.exe
                  cmd /C "driverquery.exe >> C:\Users\Admin\AppData\Local\Temp\2FD2.bin1"
                  2⤵
                    PID:2468
                    • C:\Windows\system32\driverquery.exe
                      driverquery.exe
                      3⤵
                        PID:1652
                    • C:\Windows\system32\cmd.exe
                      cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\2FD2.bin1"
                      2⤵
                        PID:1740
                      • C:\Windows\system32\cmd.exe
                        cmd /C "reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s >> C:\Users\Admin\AppData\Local\Temp\2FD2.bin1"
                        2⤵
                          PID:1880
                          • C:\Windows\system32\reg.exe
                            reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s
                            3⤵
                              PID:2456
                          • C:\Windows\system32\cmd.exe
                            cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\2FD2.bin1"
                            2⤵
                              PID:3044
                            • C:\Windows\system32\cmd.exe
                              cmd /C "reg.exe query "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall" /s >> C:\Users\Admin\AppData\Local\Temp\2FD2.bin1"
                              2⤵
                                PID:1704
                                • C:\Windows\system32\reg.exe
                                  reg.exe query "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall" /s
                                  3⤵
                                    PID:2220
                                • C:\Windows\system32\cmd.exe
                                  cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\2FD2.bin1"
                                  2⤵
                                    PID:1980
                                  • C:\Windows\system32\cmd.exe
                                    cmd /U /C "type C:\Users\Admin\AppData\Local\Temp\2FD2.bin1 > C:\Users\Admin\AppData\Local\Temp\2FD2.bin & del C:\Users\Admin\AppData\Local\Temp\2FD2.bin1"
                                    2⤵
                                      PID:2480
                                    • C:\Windows\system32\makecab.exe
                                      makecab.exe /F "C:\Users\Admin\AppData\Local\Temp\36E8.bin"
                                      2⤵
                                        PID:2196

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Temp\2CF9.bin

                                      Filesize

                                      153B

                                      MD5

                                      fbc50f6b63626961f7ea9d880328b03a

                                      SHA1

                                      963fd7971fdc548cefd0d6f9eb58fab8ab01c0fe

                                      SHA256

                                      f4c94e7b506b93d7ea58e2edfde22646caac321789edf85d0e4c0e9bb162b6d9

                                      SHA512

                                      58793a5af68d59a3ef9e338563cd08b48f2a4ef411f9056401d5f4e653721842851d351e9508e931980e4560496a92c3d32abc6fda4ffb04b571efbaa741c13d

                                    • C:\Users\Admin\AppData\Local\Temp\2FD2.bin1

                                      Filesize

                                      2KB

                                      MD5

                                      d2f0d1921cd910d56b92d9a6656e47cf

                                      SHA1

                                      fbe7f2f7f3e1533351b3a86e39ebd89b268f6315

                                      SHA256

                                      17258a03ec655e0b2e174a1ad855682277977ce185e922cbd627988359c0efbe

                                      SHA512

                                      08016a9b604ab22fa75626e9056aedf22be202289b4c6d796b5df4f567f7e09d64689ee17201819b1f5b91d15dfaed55ac323732034a573c3cc5f91170e27206

                                    • C:\Users\Admin\AppData\Local\Temp\2FD2.bin1

                                      Filesize

                                      2KB

                                      MD5

                                      0612162bf1f798f543f832f3b34de587

                                      SHA1

                                      a9f91eb7f11ba7e1482170f2d39dbc019210cc26

                                      SHA256

                                      930a6996bdfd8fdd83d728a1f91b68b06303ea26dd8d3bbe8ba9b7ab0816a26e

                                      SHA512

                                      e81a2e91abd571ee785f65f33de8dc69b068f98b0038c3547ad6134e64d6cc49b56310b9c8ed7a5c5861496808469ef18f5dbd91b98a016f7c56f3b65f57c24e

                                    • C:\Users\Admin\AppData\Local\Temp\2FD2.bin1

                                      Filesize

                                      5KB

                                      MD5

                                      395bf1332f677bd16718dcfcd152fb14

                                      SHA1

                                      e1bdf7a4b003e54027f9f45b50098e9cf104c390

                                      SHA256

                                      2fdefc75b1eaa445a1bbc7ce9fe187f9d722fe3cfbee35b295b929833df46333

                                      SHA512

                                      046b3704211f586da213d7ff31c131823cfec2e68b952578607203c8b3334236e532f3a63ebbd1b21e637e15203db0f18e9242314898816951d14b1d53578faf

                                    • C:\Users\Admin\AppData\Local\Temp\2FD2.bin1

                                      Filesize

                                      22KB

                                      MD5

                                      ff4c458ed2f594081f258236274a456c

                                      SHA1

                                      5756230cb03c1e2d4960cf9ded7665de6c5f280c

                                      SHA256

                                      6ca63d2125b3ba8197214d97c79e06ebe344fd95ef75d8da76f47808198d9334

                                      SHA512

                                      5808986c578a9c8366287f589aacaf7793a1a8808fb0667c99fcea92e9888c905bd5549d5ffb4af05e07ffcb39b6ab428248f401a9e9f20e4fc62aab2f19d67e

                                    • C:\Users\Admin\AppData\Local\Temp\2FD2.bin1

                                      Filesize

                                      53KB

                                      MD5

                                      83e60a988f710af4430326a6c9777e0b

                                      SHA1

                                      0f4c9fad254080745fd26a73b80164268e9e9128

                                      SHA256

                                      3abe24de358cf289a3f313a768705d853d900dc29f007ea672653c13d69e4ab3

                                      SHA512

                                      aa0a0dab5a6e072773b5d090686ff6fa0264cd4dd0ae6e667076c41caf357c7aaf30c27fad7f5e9372d7771a12cff9fce8f62fd1f97b5a1ca7342ca847961fbe

                                    • C:\Users\Admin\AppData\Local\Temp\2FD2.bin1

                                      Filesize

                                      53KB

                                      MD5

                                      d43386cc0b54821cb95426b0611fb549

                                      SHA1

                                      0817b118cacbe498eeeb7c102591f52deae0bbea

                                      SHA256

                                      05ad68f3d44891bbdc9f06333e95ee25729a4d2a9edd2b139c792622ff841b80

                                      SHA512

                                      0c2f04eb113f5c57d16686699400784fe6be2295f4042a089f291db01cfaef9e11009a53b9642921d13d1fbc1176a45bc4e018328aa11dded0659560bf3c01f4

                                    • C:\Users\Admin\AppData\Local\Temp\2FD2.bin1

                                      Filesize

                                      106KB

                                      MD5

                                      8d17f60bab9b5bd88ef7d8902458c369

                                      SHA1

                                      1b1a89d136a5affbd09c9eda06ea343a9a24bb39

                                      SHA256

                                      89f99b56cd83c1ead638afdcc0961352113feb33ca6591bb222675f72c82942e

                                      SHA512

                                      8102b24764f6a407289acb9243c93c21a33cd8042955d16a7e29abaf420fa689a901277a1e734a166ffbeeec08b4014920f35fb8e1f2a90904e6074ed48a7250

                                    • C:\Users\Admin\AppData\Local\Temp\2FD2.bin1

                                      Filesize

                                      1KB

                                      MD5

                                      a16b958dcdfe2cc6b21755c0768279cc

                                      SHA1

                                      1b0577155ff14ba841552e9ddcfda7456fd9eb10

                                      SHA256

                                      e093a2fe015e0c07089138646bab38b898589e3433d0612f20847b3222facea5

                                      SHA512

                                      cdbb613f20c89045baf56b1e251cc3daec3e09a06784f778b39d30608aff9056761b33cff9601250e76ee5ad1f55d44e6802e222a45746834db688392e2c601b

                                    • C:\Users\Admin\AppData\Local\Temp\2FD2.bin1

                                      Filesize

                                      2KB

                                      MD5

                                      539918e2ced4dd8506b7fff2ecbcf1a8

                                      SHA1

                                      039ccbfc68c140de9b04a0d1677ba5a4219bd30f

                                      SHA256

                                      4f820755c7f7cbec35478080ddc0543a8fd44d1da70ac618e4fc5bab3aebfa72

                                      SHA512

                                      d13610d5128c797504a22c6455dd57be377ab8d27271f77203ec6fd90491509438068b571f7771a628a9abadc392aab52b8c2c8a4b8aad23c7b60d8238518368

                                    • C:\Users\Admin\AppData\Local\Temp\359D.bin

                                      Filesize

                                      306B

                                      MD5

                                      6b87017ee809bb635dfe4d518beb2ae4

                                      SHA1

                                      c5e67d51d1a666501c2a78705f663e0db3948019

                                      SHA256

                                      586c59128ff62f7aeef3efa77d7ce196fce37782d2a38234d35357c5045bcb77

                                      SHA512

                                      78300e4b10390b399746050f916af81f5b18b250e91ff799b2b169fb8cbb6fb0034b1156380ef90ecfc073e0c08aafc3ebc6466fe12fca46b33acf619777682c

                                    • C:\Users\Admin\AppData\Local\Temp\36E8.bin

                                      Filesize

                                      153B

                                      MD5

                                      622fc0c8efc442a90184b58fbbb8aedb

                                      SHA1

                                      d91bf02eb797d04bf5b7f05a70963ab305ba84ca

                                      SHA256

                                      f3440a3a5ecbf8d45a1dedb7ff7b4271c7cc06685707e3820315fa447476a618

                                      SHA512

                                      3c7f79ebc1dde45b6cbb80e938cc200133a39aa170b0baf1a000b8279a0c1b17a30cd0e68e8e9b2434e0b2a7206384c89a4560330965386b490e46d29e5acbe3

                                    • C:\Users\Admin\AppData\Local\Temp\3F8C.bin

                                      Filesize

                                      12KB

                                      MD5

                                      f63f8f0b7e335accdddbc73308490cb6

                                      SHA1

                                      08f4b0da3454a53e9f4b81441eaf750426edb648

                                      SHA256

                                      24e6f7f2f2217d31bfe1b51b311746c430b5e37dd908258e300f7683e9a451b7

                                      SHA512

                                      e8bff0011123b5f69be5c95bc0724b124f9f7fb7e38a1a15c89b2a346630b4f9c5ce2ae1654c50d7e8520bde7acc9656494447d9864bb702d1f157683dc2d5fe

                                    • C:\Users\Admin\AppData\Local\Temp\setup.inf

                                      Filesize

                                      940B

                                      MD5

                                      cff3b259993a0068c22272801811e0c0

                                      SHA1

                                      81726521ae9ab70bf34d924c7f66a5e3f2d24581

                                      SHA256

                                      85240a71425e069c4a7c8349223d6fafc5802875285c0e13ae2d0cefcae1c86d

                                      SHA512

                                      d2b4833015ede31b12a455e013674ecb5042b71cd2a0a5366b6bf416a2d171a774d623c5838b312d09ca3b2610f304eb3bda9a0be30227a89ad16064398c538f

                                    • C:\Users\Admin\AppData\Local\Temp\setup.rpt

                                      Filesize

                                      283B

                                      MD5

                                      cf861e8dc8cfc0715a21c558db48f7c7

                                      SHA1

                                      6ff3f1098e3f4704218bf36672f290a65db36f9e

                                      SHA256

                                      04c21f4e5a1b0cd565ef5851412ab495adbfd85c59abb91bf2fa642e1feb1ab7

                                      SHA512

                                      49b6cae70fdaf9dd7537e728b2f1b0f256d680620a6aec3d3d3e43cc2fc67ab07d7db3f8c9e7bff4badb24d64d3dacfe37aa1e23109ebdb3c552316eb09c299e

                                    • C:\Users\Admin\AppData\Roaming\MICROS~1\{6D168~1\01DB5643D14CE26009

                                      Filesize

                                      585B

                                      MD5

                                      5b80054e7d587e29ace907da270a1b32

                                      SHA1

                                      a89ef1ac2e2841d0583f220f2b33789c10f3c16b

                                      SHA256

                                      3b65a327f5248301ac063a881b8f4049e27593b4320dba3b8c61c112489ff821

                                      SHA512

                                      5330fe7393e7a98c638471723ffebfbd7c4f6dfb2304fafad513825ed87f1107bc01c5d8de245daf95312a9fcec6d525a1015f5845738ed9adf720a53f8ef77e

                                    • C:\Users\Admin\AppData\Roaming\MICROS~1\{6D168~1\setup.inf

                                      Filesize

                                      947B

                                      MD5

                                      2c78d1ca091412088463ff5233907537

                                      SHA1

                                      cd02659094e3e31f005f71c2b9849e9f59f4963c

                                      SHA256

                                      fb13cf923ecdece877e39b42aeaf31a88a7114cacf664f70333d4b3b47761a48

                                      SHA512

                                      aaed2d96679da9b52b36eb66c63c19eebe5ede20fefa8daf556b2762c59cc709acda5353de6a86a4fdd5d7285ace156cfca1b47b03c73e2c3522470780c55ec6

                                    • C:\Users\Admin\AppData\Roaming\MICROS~1\{6D168~1\setup.rpt

                                      Filesize

                                      283B

                                      MD5

                                      d1e0d26356f86938db223589b390800d

                                      SHA1

                                      523f57168d662ecb6c3b9e3a08864127b1a72925

                                      SHA256

                                      e2051255bfacb4aaff39e6f800b91418872350abf3346433600d5610f0091a70

                                      SHA512

                                      10da9d8db26695d3cbff771934fd730f328d649b9ff148e763751a308d3d004fdfcfd31c6b5cfe1a1672e78d3e2d698988545f7e80837794c0221638634b741a

                                    • memory/1120-49-0x00000000067B0000-0x00000000068E7000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1120-67-0x00000000067B0000-0x00000000068E7000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1120-44-0x00000000067B0000-0x00000000068E7000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1120-43-0x00000000067B0000-0x00000000068E7000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1120-42-0x00000000067B0000-0x00000000068E7000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1120-41-0x00000000067B0000-0x00000000068E7000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1120-40-0x00000000067B0000-0x00000000068E7000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1120-39-0x00000000067B0000-0x00000000068E7000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1120-38-0x00000000067B0000-0x00000000068E7000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1120-37-0x00000000024B0000-0x00000000024B1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1120-153-0x00000000067B0000-0x00000000068E7000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1120-47-0x00000000067B0000-0x00000000068E7000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1120-97-0x00000000067B0000-0x00000000068E7000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1120-32-0x00000000067B0000-0x00000000068E7000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1120-68-0x00000000067B0000-0x00000000068E7000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1120-45-0x00000000067B0000-0x00000000068E7000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1120-46-0x00000000067B0000-0x00000000068E7000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/1120-59-0x00000000067B0000-0x00000000068E7000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/2084-1-0x0000000000020000-0x0000000000021000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2696-21-0x0000000000400000-0x0000000000473000-memory.dmp

                                      Filesize

                                      460KB

                                    • memory/2696-8-0x0000000000400000-0x0000000000473000-memory.dmp

                                      Filesize

                                      460KB

                                    • memory/2696-6-0x0000000000400000-0x0000000000473000-memory.dmp

                                      Filesize

                                      460KB

                                    • memory/2696-16-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2696-14-0x0000000000400000-0x0000000000473000-memory.dmp

                                      Filesize

                                      460KB

                                    • memory/2696-2-0x0000000000400000-0x0000000000473000-memory.dmp

                                      Filesize

                                      460KB

                                    • memory/2696-12-0x0000000000400000-0x0000000000473000-memory.dmp

                                      Filesize

                                      460KB

                                    • memory/2696-4-0x0000000000400000-0x0000000000473000-memory.dmp

                                      Filesize

                                      460KB

                                    • memory/2696-29-0x0000000000400000-0x0000000000473000-memory.dmp

                                      Filesize

                                      460KB

                                    • memory/2696-18-0x0000000000400000-0x0000000000473000-memory.dmp

                                      Filesize

                                      460KB

                                    • memory/2696-10-0x0000000000400000-0x0000000000473000-memory.dmp

                                      Filesize

                                      460KB

                                    • memory/2696-20-0x0000000000400000-0x0000000000473000-memory.dmp

                                      Filesize

                                      460KB

                                    • memory/2724-48-0x000007FFFFFDF000-0x000007FFFFFE0000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2724-56-0x0000000001FA0000-0x00000000020D7000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/2724-50-0x0000000001FA0000-0x00000000020D7000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/2724-62-0x0000000001FA0000-0x00000000020D7000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/2724-54-0x00000000001A0000-0x00000000001A1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2724-55-0x0000000001FA0000-0x00000000020D7000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/2804-22-0x000007FFFFFD9000-0x000007FFFFFDA000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2804-36-0x0000000001F60000-0x0000000002097000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/2804-27-0x0000000001F60000-0x0000000002097000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/2804-26-0x0000000001F60000-0x0000000002097000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/2804-23-0x00000000002A0000-0x00000000002A1000-memory.dmp

                                      Filesize

                                      4KB