Analysis
-
max time kernel
164s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 23:05
Static task
static1
Behavioral task
behavioral1
Sample
813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe
Resource
win7-20220812-en
General
-
Target
813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe
-
Size
431KB
-
MD5
e0bb084cee8de5d16f817283ad8c799f
-
SHA1
7d1ae37b26406bf03b39b3b35da4fd2c897f5b1e
-
SHA256
813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242
-
SHA512
fac101a5592bbb53e37062057321a08d3a0b931f244dcebf9cfdb26fd6023effd258cc2d77697798635ede9ababf1867b7dda3f54411a0220570fb23890f07e6
-
SSDEEP
12288:OAarz4BkDPQqeJLHAY4m7Bszl15WyN6ehat/F:Xarz4BGQBt4BfWq6MG
Malware Config
Extracted
cybergate
v3.4.2.2
remote
wwc.ddns.net:81
U11R10TOVBKO35
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
cybergate
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
Processes:
813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "c:\\directory\\CyberGate\\install\\server.exe" 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "c:\\directory\\CyberGate\\install\\server.exe" 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe -
Executes dropped EXE 2 IoCs
Processes:
server.exeserver.exepid process 3452 server.exe 508 server.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
Processes:
813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exeexplorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{8PX51F1N-RG6C-A7N1-LU3N-U67U6N138S1S} 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8PX51F1N-RG6C-A7N1-LU3N-U67U6N138S1S}\StubPath = "c:\\directory\\CyberGate\\install\\server.exe Restart" 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{8PX51F1N-RG6C-A7N1-LU3N-U67U6N138S1S} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8PX51F1N-RG6C-A7N1-LU3N-U67U6N138S1S}\StubPath = "c:\\directory\\CyberGate\\install\\server.exe" explorer.exe -
Processes:
resource yara_rule behavioral2/memory/3364-140-0x0000000010410000-0x0000000010480000-memory.dmp upx behavioral2/memory/3364-146-0x0000000010480000-0x00000000104F0000-memory.dmp upx behavioral2/memory/5108-149-0x0000000010480000-0x00000000104F0000-memory.dmp upx behavioral2/memory/5108-150-0x0000000010480000-0x00000000104F0000-memory.dmp upx behavioral2/memory/3364-154-0x00000000104F0000-0x0000000010560000-memory.dmp upx behavioral2/memory/3364-159-0x0000000010560000-0x00000000105D0000-memory.dmp upx behavioral2/memory/4444-162-0x0000000010560000-0x00000000105D0000-memory.dmp upx behavioral2/memory/4444-163-0x0000000010560000-0x00000000105D0000-memory.dmp upx behavioral2/memory/5108-164-0x0000000010480000-0x00000000104F0000-memory.dmp upx behavioral2/memory/4444-165-0x0000000010560000-0x00000000105D0000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exeserver.exedescription pid process target process PID 4308 set thread context of 3364 4308 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe PID 3452 set thread context of 508 3452 server.exe server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exeserver.exepid process 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe 508 server.exe 508 server.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
explorer.exedescription pid process Token: SeDebugPrivilege 4444 explorer.exe Token: SeDebugPrivilege 4444 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exepid process 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exedescription pid process target process PID 4308 wrote to memory of 3364 4308 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe PID 4308 wrote to memory of 3364 4308 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe PID 4308 wrote to memory of 3364 4308 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe PID 4308 wrote to memory of 3364 4308 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe PID 4308 wrote to memory of 3364 4308 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE PID 3364 wrote to memory of 2716 3364 813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe"C:\Users\Admin\AppData\Local\Temp\813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exeC:\Users\Admin\AppData\Local\Temp\813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242.exe3⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Modifies Installed Components in the registry
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\directory\CyberGate\install\server.exe"C:\directory\CyberGate\install\server.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\directory\CyberGate\install\server.exeC:\directory\CyberGate\install\server.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Admin2.txtFilesize
385KB
MD537586b75bce43253652b6dc2c155368e
SHA1c7ea946db305085fb12ef82cfee9985a07f7e6cc
SHA2567dea84488916afec00db65ff9e1b28f4862cd52bd7ddc6011ae84be89dbafde9
SHA512fb3f5ee53c2b7879a904764f92907747272ed99f5d487699cd36c9872a2113a2e9e05c21cd4649b91ff5a1afb441211ab00b3e469642677fa110d1507347e6d6
-
C:\directory\CyberGate\install\server.exeFilesize
431KB
MD5e0bb084cee8de5d16f817283ad8c799f
SHA17d1ae37b26406bf03b39b3b35da4fd2c897f5b1e
SHA256813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242
SHA512fac101a5592bbb53e37062057321a08d3a0b931f244dcebf9cfdb26fd6023effd258cc2d77697798635ede9ababf1867b7dda3f54411a0220570fb23890f07e6
-
C:\directory\CyberGate\install\server.exeFilesize
431KB
MD5e0bb084cee8de5d16f817283ad8c799f
SHA17d1ae37b26406bf03b39b3b35da4fd2c897f5b1e
SHA256813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242
SHA512fac101a5592bbb53e37062057321a08d3a0b931f244dcebf9cfdb26fd6023effd258cc2d77697798635ede9ababf1867b7dda3f54411a0220570fb23890f07e6
-
\??\c:\directory\CyberGate\install\server.exeFilesize
431KB
MD5e0bb084cee8de5d16f817283ad8c799f
SHA17d1ae37b26406bf03b39b3b35da4fd2c897f5b1e
SHA256813d544ed8db4d772355747dedfe28985ffb1a8d4fce3b0a8844ad9eea781242
SHA512fac101a5592bbb53e37062057321a08d3a0b931f244dcebf9cfdb26fd6023effd258cc2d77697798635ede9ababf1867b7dda3f54411a0220570fb23890f07e6
-
memory/508-176-0x0000000000400000-0x0000000000471000-memory.dmpFilesize
452KB
-
memory/508-175-0x0000000000400000-0x0000000000471000-memory.dmpFilesize
452KB
-
memory/508-169-0x0000000000000000-mapping.dmp
-
memory/3364-140-0x0000000010410000-0x0000000010480000-memory.dmpFilesize
448KB
-
memory/3364-145-0x0000000000400000-0x0000000000471000-memory.dmpFilesize
452KB
-
memory/3364-146-0x0000000010480000-0x00000000104F0000-memory.dmpFilesize
448KB
-
memory/3364-133-0x0000000000000000-mapping.dmp
-
memory/3364-134-0x0000000000400000-0x0000000000471000-memory.dmpFilesize
452KB
-
memory/3364-138-0x0000000000400000-0x0000000000471000-memory.dmpFilesize
452KB
-
memory/3364-154-0x00000000104F0000-0x0000000010560000-memory.dmpFilesize
448KB
-
memory/3364-135-0x0000000000400000-0x0000000000471000-memory.dmpFilesize
452KB
-
memory/3364-159-0x0000000010560000-0x00000000105D0000-memory.dmpFilesize
448KB
-
memory/3364-168-0x0000000000400000-0x0000000000471000-memory.dmpFilesize
452KB
-
memory/3364-136-0x0000000000400000-0x0000000000471000-memory.dmpFilesize
452KB
-
memory/3452-166-0x0000000000000000-mapping.dmp
-
memory/3452-174-0x0000000072FA0000-0x0000000073551000-memory.dmpFilesize
5.7MB
-
memory/4308-132-0x0000000074FF0000-0x00000000755A1000-memory.dmpFilesize
5.7MB
-
memory/4308-137-0x0000000074FF0000-0x00000000755A1000-memory.dmpFilesize
5.7MB
-
memory/4444-165-0x0000000010560000-0x00000000105D0000-memory.dmpFilesize
448KB
-
memory/4444-163-0x0000000010560000-0x00000000105D0000-memory.dmpFilesize
448KB
-
memory/4444-162-0x0000000010560000-0x00000000105D0000-memory.dmpFilesize
448KB
-
memory/4444-158-0x0000000000000000-mapping.dmp
-
memory/5108-164-0x0000000010480000-0x00000000104F0000-memory.dmpFilesize
448KB
-
memory/5108-144-0x0000000000000000-mapping.dmp
-
memory/5108-150-0x0000000010480000-0x00000000104F0000-memory.dmpFilesize
448KB
-
memory/5108-149-0x0000000010480000-0x00000000104F0000-memory.dmpFilesize
448KB