Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/02/2025, 21:17

General

  • Target

    2025-02-20_8add9474e9b9211261ace0fbbbbc25e0_mafia.exe

  • Size

    1.0MB

  • MD5

    8add9474e9b9211261ace0fbbbbc25e0

  • SHA1

    67a71ac5d8a8360b3d1e955d0bebbcfb838e3488

  • SHA256

    2dc66f9035a656a8fd6b7e7429637dc1db895b6cfe07ff4d4cbdbaeacc4acfca

  • SHA512

    e8221073538f6358928348209339898cc392232b7a8e0ca650e771f08997793bf1387e638543ad2df4bebdfe02942b088fd60734ee3e2669d62d2e4a5b823622

  • SSDEEP

    24576:uICr2UPu3ZBZApEgFDBDohZYTyn2pagiUvmIpxdPDJ2nHqcJ:ufIZBIEgxBDWZYT+2pbjv92nH

Malware Config

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Gozi family
  • Deletes itself 1 IoCs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Discovers systems in the same network 1 TTPs 1 IoCs
  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Deletes itself
    • Accesses Microsoft Outlook accounts
    • Accesses Microsoft Outlook profiles
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • outlook_office_path
    • outlook_win_path
    PID:1192
    • C:\Users\Admin\AppData\Local\Temp\2025-02-20_8add9474e9b9211261ace0fbbbbc25e0_mafia.exe
      "C:\Users\Admin\AppData\Local\Temp\2025-02-20_8add9474e9b9211261ace0fbbbbc25e0_mafia.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1568
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1476
    • C:\Windows\SysWOW64\explorer.exe
      C:\Windows\SysWOW64\explorer.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2832
    • C:\Windows\system32\cmd.exe
      cmd /C "systeminfo.exe > C:\Users\Admin\AppData\Local\Temp\11D7.bin1"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1940
      • C:\Windows\system32\systeminfo.exe
        systeminfo.exe
        3⤵
        • Gathers system information
        PID:1896
    • C:\Windows\system32\cmd.exe
      cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\11D7.bin1"
      2⤵
        PID:1308
      • C:\Windows\system32\cmd.exe
        cmd /C "net view >> C:\Users\Admin\AppData\Local\Temp\11D7.bin1"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1768
        • C:\Windows\system32\net.exe
          net view
          3⤵
          • Discovers systems in the same network
          PID:2644
      • C:\Windows\system32\cmd.exe
        cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\11D7.bin1"
        2⤵
          PID:2908
        • C:\Windows\system32\cmd.exe
          cmd /C "nslookup 127.0.0.1 >> C:\Users\Admin\AppData\Local\Temp\11D7.bin1"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2448
          • C:\Windows\system32\nslookup.exe
            nslookup 127.0.0.1
            3⤵
              PID:2820
          • C:\Windows\system32\cmd.exe
            cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\11D7.bin1"
            2⤵
              PID:2456
            • C:\Windows\system32\cmd.exe
              cmd /C "tasklist.exe /SVC >> C:\Users\Admin\AppData\Local\Temp\11D7.bin1"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1096
              • C:\Windows\system32\tasklist.exe
                tasklist.exe /SVC
                3⤵
                • Enumerates processes with tasklist
                • Suspicious use of AdjustPrivilegeToken
                PID:2176
            • C:\Windows\system32\cmd.exe
              cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\11D7.bin1"
              2⤵
                PID:2472
              • C:\Windows\system32\cmd.exe
                cmd /C "driverquery.exe >> C:\Users\Admin\AppData\Local\Temp\11D7.bin1"
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:956
                • C:\Windows\system32\driverquery.exe
                  driverquery.exe
                  3⤵
                    PID:1368
                • C:\Windows\system32\cmd.exe
                  cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\11D7.bin1"
                  2⤵
                    PID:1796
                  • C:\Windows\system32\cmd.exe
                    cmd /C "reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s >> C:\Users\Admin\AppData\Local\Temp\11D7.bin1"
                    2⤵
                      PID:2000
                      • C:\Windows\system32\reg.exe
                        reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s
                        3⤵
                          PID:832
                      • C:\Windows\system32\cmd.exe
                        cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\11D7.bin1"
                        2⤵
                          PID:2328
                        • C:\Windows\system32\cmd.exe
                          cmd /C "reg.exe query "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall" /s >> C:\Users\Admin\AppData\Local\Temp\11D7.bin1"
                          2⤵
                            PID:1316
                            • C:\Windows\system32\reg.exe
                              reg.exe query "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall" /s
                              3⤵
                                PID:1756
                            • C:\Windows\system32\makecab.exe
                              makecab.exe /F "C:\Users\Admin\AppData\Local\Temp\1880.bin"
                              2⤵
                                PID:292
                              • C:\Windows\system32\cmd.exe
                                cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\11D7.bin1"
                                2⤵
                                  PID:2112
                                • C:\Windows\system32\cmd.exe
                                  cmd /U /C "type C:\Users\Admin\AppData\Local\Temp\11D7.bin1 > C:\Users\Admin\AppData\Local\Temp\11D7.bin & del C:\Users\Admin\AppData\Local\Temp\11D7.bin1"
                                  2⤵
                                    PID:972
                                  • C:\Windows\system32\makecab.exe
                                    makecab.exe /F "C:\Users\Admin\AppData\Local\Temp\18FC.bin"
                                    2⤵
                                      PID:2276

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Temp\11D7.bin

                                    Filesize

                                    212KB

                                    MD5

                                    25e80873d3c69c42f3788fdb66b90271

                                    SHA1

                                    0d15dff6cc56fe5b0362ba4031035649b0e83a40

                                    SHA256

                                    e0d67dfe81faab94200951936f8e83e33db19cf3716bd5752c66d0c95cc78de1

                                    SHA512

                                    37310cbd2e92f4547d47915b8493590758ed3e1a45c2cf38be60d9235af55935e0f1c380930e9d83767bc2f8a82d2b866bbc88baa5533560732cddd9c9ad4e06

                                  • C:\Users\Admin\AppData\Local\Temp\11D7.bin1

                                    Filesize

                                    1KB

                                    MD5

                                    81bc2f02cd59ca68d28b21048e40425f

                                    SHA1

                                    ea79ca187759f9a117d7a5de66232075740ebc62

                                    SHA256

                                    04754ef244d41f4a9cb6390fe59cde0383e488db97730f079d53eeaa56d4127f

                                    SHA512

                                    391895e9b6e78158abc1d78e36b9be4734f25cf05e0cf9e603d5bb8e12a2bad2aee62323f6bf46c3c24557821cb3512e2e3d1d951303abbf8ecb64a21916e015

                                  • C:\Users\Admin\AppData\Local\Temp\11D7.bin1

                                    Filesize

                                    2KB

                                    MD5

                                    275ecbdf7becbc01435f1c7d30b55494

                                    SHA1

                                    871ace972f877353a572672ef938e98cb10aaeb3

                                    SHA256

                                    ac5e2a049ed848f2fd1fca6458e6f63f89d47f083d29aa89a6db9a3b5f48857c

                                    SHA512

                                    45e403bcf9e2e7997c8d2fe314422d8f24681c9089f32b4d4782ba568a40f28cc17ebd963ebd4fbfa9d6595edbb2e26c496eca44fec7e5ebdfe6c6d2cf7f584c

                                  • C:\Users\Admin\AppData\Local\Temp\11D7.bin1

                                    Filesize

                                    2KB

                                    MD5

                                    3d841fdb44fdd2edebe5cb0e0051b9d2

                                    SHA1

                                    1b686e1ae0225440f99b2ba8f1acfff6418f4448

                                    SHA256

                                    e9647dd26d9401893a5a917bf4849bd5044cb8f94ebd701c0f0710b6379efcb9

                                    SHA512

                                    66a488cba801ae9c9c485537da898d1b977021ac1326ad5ff8b1d340611efada8be13b945bd7feaca3ac4935db2a1774d498a71af4f8db117a5ede467cf54672

                                  • C:\Users\Admin\AppData\Local\Temp\11D7.bin1

                                    Filesize

                                    2KB

                                    MD5

                                    f3be86ba1c3dc3e4557d118b0aa845a6

                                    SHA1

                                    effa0142593b6bcb78c8c21360ea86a6916f3b47

                                    SHA256

                                    ecc32db2f4492df6914e681ce7424db45ce5c123e72b073196b40aa268f29e60

                                    SHA512

                                    5f9f3bde82fd9a32941e753256dffe2b1c641394398c2e6815c1f03839430f44d100deac4cb39daca4c160621e0114a6f6a469fead3152eece4cbe84b82ba89a

                                  • C:\Users\Admin\AppData\Local\Temp\11D7.bin1

                                    Filesize

                                    5KB

                                    MD5

                                    00b6fb3181a8688b546ad63b7c1efd21

                                    SHA1

                                    3a3388c007abcb19001dc39d5b8054341bde9e0e

                                    SHA256

                                    bda3fdfd87cc074e79542630368fa2f73b72ed65bd4a5318004ba9c280d0365b

                                    SHA512

                                    d9e4c8e3b5f66393f4f8e4d0123df293f2c2850d9017e1f7fb690e2dab09e1cf22c42573378863353ef7f183a92aca49e4f89df759bb8c5071e24f03e5353891

                                  • C:\Users\Admin\AppData\Local\Temp\11D7.bin1

                                    Filesize

                                    22KB

                                    MD5

                                    1a902f6e27e292c9a2c15c1e8aacbf46

                                    SHA1

                                    622f9223da78f562598ad8cfe17ad3fbd4007f89

                                    SHA256

                                    0a8fe899a14d6fd07ddd531b55aba413cbbfa6a2eda4a617bfa53c9c03291b97

                                    SHA512

                                    f22c94ca9f3cb2f375c0aaeb20db5b204616cf5b3fef70e5628bddf1dcd540cfe702983e0bf1f6250e1133a2cd021d7424dbea9dd50e8dc78c9e066ba9f2f0c0

                                  • C:\Users\Admin\AppData\Local\Temp\11D7.bin1

                                    Filesize

                                    53KB

                                    MD5

                                    c707b14f9707c04d18a5a58400502e5f

                                    SHA1

                                    6bf6c9ca7a640c35878fb99534decc5f7213cb34

                                    SHA256

                                    516fd07f4cc17cff7593b4bf6f8366b1a38d517e25e384777ab181a5314080f3

                                    SHA512

                                    87d78b8757231af1152ae8b607b90152d463558c5108b74b70b14acf6ea88a988ab0115cbd45e3f39fb89f07e6f5ce7f6af16c3277ac0e5e354df05f562e469a

                                  • C:\Users\Admin\AppData\Local\Temp\11D7.bin1

                                    Filesize

                                    53KB

                                    MD5

                                    40507876dec314f4402cf984e2bb6cd2

                                    SHA1

                                    89e63118dfd170e91016e99c95e1ab3287018ebf

                                    SHA256

                                    f44b1a487640a9d9d1dc76f06f4f9f30624dc2105185e1927602fabb0aceaaf2

                                    SHA512

                                    1cd33eef89e8015b139d6d3c1f636ed9575f1cb50bc9e79038b612398ddfa68f41a57eaf5b59c1bfb831f233eaa7f6803bb7d0207ad6200fc6bd6f50467b9c71

                                  • C:\Users\Admin\AppData\Local\Temp\11D7.bin1

                                    Filesize

                                    106KB

                                    MD5

                                    ea6b8fcc3976e19024bddfb77bf19b82

                                    SHA1

                                    6e8c051cab75ac1b3970c64816fbed60aba5c5bc

                                    SHA256

                                    b163381b22efac17d3a67e015285d986cd5eb5f34bcae226ea42811fa87341c2

                                    SHA512

                                    f5da7da2de03f02f79049f8e213210f2bb66a2f79cd54270827aa778592a871b7ac39ca07c554826cce487e4d4862d5f63a8f4722ec6bff877a02c39c78f866e

                                  • C:\Users\Admin\AppData\Local\Temp\1880.bin

                                    Filesize

                                    153B

                                    MD5

                                    44acac9a72dc0b4dfad80e672791d104

                                    SHA1

                                    ea152a075b52252ee208b05f26a4784fa93ecbd9

                                    SHA256

                                    061209b2b08e099cee9edf0a8d60c45eebf8e4e8a933b0f254f10215cf295b03

                                    SHA512

                                    6726f012daaf2ac4267e58e4a9c81be19dbac7e9740360bf1200f0e5df17aafd85b8a4c138d2a6dd87a8d84118190337d99f4e2ef3ab2974878278b6929d7766

                                  • C:\Users\Admin\AppData\Local\Temp\18FC.bin

                                    Filesize

                                    153B

                                    MD5

                                    3ca0019487b3d7e952afa97773fc76c2

                                    SHA1

                                    7cdf5a61adce5955a3f32da9ee0b393f66133a59

                                    SHA256

                                    6435fdb3a5cdb70f4684ffa2c66c983d1967f0113f2df292ffc41c330b00b5c8

                                    SHA512

                                    b87aba5a831b53cb507028698182e8e5ffa38423299a941445d7d3a8fcdb506922353f1d80cf150289bccea4c742ddceec55c38212221ac9b25fa9d45c6053a5

                                  • C:\Users\Admin\AppData\Local\Temp\2124.bin

                                    Filesize

                                    250B

                                    MD5

                                    971e7cd57084ffce6e3fe00e23425c23

                                    SHA1

                                    139932933f1306d22337a0849eddfe9990215d3d

                                    SHA256

                                    e90555f95484ce70b2c796c3d1a5ccb461a0c081257aa0546a700d8321671901

                                    SHA512

                                    41ee1299a03a69d95f67abab123a2a52eb6e8195da44754a3678f2ea87c446547cda42a83ff4f1693f107d4ac72528baaa62ec34c5deffafd6030720e6f9cd90

                                  • C:\Users\Admin\AppData\Local\Temp\21A0.bin

                                    Filesize

                                    12KB

                                    MD5

                                    12b7972ee73e62356aab2ad175ba1212

                                    SHA1

                                    2fcfdd425edc5c94ae407672686c9419a9a16bad

                                    SHA256

                                    2b3701850de033bcf671a21a331e286453838508d22f7e9180993557719149b4

                                    SHA512

                                    d5ab58a2e6afb821b195dae5cf75d0dde25b7c3318f578050aa26d621221f3af015c0e882f99f5742f1cfdbbaddf7bf01531f63d7a67e6cc79d45cc252942006

                                  • C:\Users\Admin\AppData\Local\Temp\setup.inf

                                    Filesize

                                    940B

                                    MD5

                                    72dfef054c77ef52c7332eae8df94ef0

                                    SHA1

                                    fc73255496f4560def9cab89ab4f4917b447a9be

                                    SHA256

                                    140f7099b72a3ce017553b4f4baad49cbb6f45c51d0bb2f313e8ed6b2f406b93

                                    SHA512

                                    d97f08904ab2111117dbb502913c578ca74ccf840c0ddea1116241404cebfadcd6d7f0da43a4329f8e7bb68dcd7fa6cf813903ad07d8091c6a32a3bee9d2f531

                                  • C:\Users\Admin\AppData\Local\Temp\setup.rpt

                                    Filesize

                                    283B

                                    MD5

                                    096544267fe3d7749ff4793dafee8c3a

                                    SHA1

                                    bb716016a27fc198d174b00739c87161bc8c8503

                                    SHA256

                                    9b344e11fe2d42063544e009e1ad0940361df057d8891f91ac28451597046894

                                    SHA512

                                    73700e586a9c8e84e3d6de8daf4924ef321559febc6d90ebda2719d474248b58dc1a16baa1882a350a8246acbef796a33875b88b7ce85f171dc1fea711bb859e

                                  • C:\Users\Admin\AppData\Roaming\MICROS~1\{B8000~1\01DB83DD128BC31009

                                    Filesize

                                    400B

                                    MD5

                                    748e0886e55e611977f61afdcdebfe72

                                    SHA1

                                    90c61764d6efaa07f1fc359fa43486715ae0e3be

                                    SHA256

                                    35eb3f3c1b793fc877746aa1722f6004910ab010ddd73c41fdcc583617b0b452

                                    SHA512

                                    4ce1487682ba5003b9af6e266428582cc70573dce2be323a526988db14c6cf5d60dd5de72cd5ccd3591c979ea49e8f85e3b906f9b0ceb8c071c7492c0023714f

                                  • C:\Users\Admin\AppData\Roaming\MICROS~1\{B8000~1\setup.inf

                                    Filesize

                                    947B

                                    MD5

                                    60d8e0fd77414188ef2f30f33e220250

                                    SHA1

                                    a079f391cc58deadff996104a73d0a4964102461

                                    SHA256

                                    ab2f33b2d1249a036246e616b3ef8375a5cfea4238e3af7a094360c1c70e8a35

                                    SHA512

                                    607c225315b867a18645e43890a014115c475c2288e0b428c2a1506aca0feb4f173cd250dd33b64cba83448c4a1091ad9b172f3b26e085135aa4d3ed0b515347

                                  • C:\Users\Admin\AppData\Roaming\MICROS~1\{B8000~1\setup.rpt

                                    Filesize

                                    283B

                                    MD5

                                    01c1b741273b1efaca9e22bbb930bccd

                                    SHA1

                                    e6b90d71e869c04c979bee8d17bb2bdf0a9e772a

                                    SHA256

                                    1f3e2da5cd30e7e5cdeca7fb1a0a0b9d88e4119b5b3f9176ff6563205a093b94

                                    SHA512

                                    c0d3053361dc413426d8ad41ea07dd4d6e832b4b5d4eccec382e23a4c0cde9ea2d24a6df7d75c51d523014959189dda8c5acd1e245a2c3e4d45f3fc9e670e70e

                                  • memory/1192-27-0x0000000006790000-0x00000000068C6000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1192-25-0x0000000006790000-0x00000000068C6000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1192-28-0x0000000006790000-0x00000000068C6000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1192-31-0x0000000006790000-0x00000000068C6000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1192-29-0x0000000006790000-0x00000000068C6000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1192-136-0x0000000006790000-0x00000000068C6000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1192-19-0x0000000006790000-0x00000000068C6000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1192-109-0x0000000006790000-0x00000000068C6000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1192-71-0x0000000006790000-0x00000000068C6000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1192-36-0x0000000006790000-0x00000000068C6000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1192-39-0x0000000006790000-0x00000000068C6000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1192-40-0x0000000006790000-0x00000000068C6000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1192-38-0x0000000006790000-0x00000000068C6000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1192-41-0x0000000006790000-0x00000000068C6000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1192-44-0x0000000006790000-0x00000000068C6000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1192-46-0x0000000006790000-0x00000000068C6000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1192-33-0x0000000006790000-0x00000000068C6000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1192-35-0x0000000006790000-0x00000000068C6000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1192-24-0x0000000002540000-0x0000000002541000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1192-26-0x0000000006790000-0x00000000068C6000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1476-13-0x0000000002080000-0x00000000021B6000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1476-23-0x0000000002080000-0x00000000021B6000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1476-16-0x0000000002080000-0x00000000021B6000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/1476-12-0x00000000002D0000-0x00000000002D1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1476-11-0x000007FFFFFDC000-0x000007FFFFFDD000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1568-7-0x00000000002D0000-0x00000000002D1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1568-10-0x0000000000400000-0x0000000000511000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/1568-9-0x00000000002D0000-0x00000000002D1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1568-0-0x00000000002C0000-0x00000000002D0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/1568-8-0x00000000002D0000-0x00000000002D1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1568-18-0x0000000000400000-0x0000000000511000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/1568-5-0x00000000002C0000-0x00000000002D0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/1568-6-0x0000000000280000-0x0000000000281000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1568-4-0x0000000000280000-0x0000000000281000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1568-3-0x00000000002D0000-0x00000000002D1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1568-2-0x00000000002D0000-0x00000000002D1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1568-1-0x00000000002D0000-0x00000000002D1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/2832-30-0x00000000022F0000-0x0000000002418000-memory.dmp

                                    Filesize

                                    1.2MB