Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2022 08:15
Static task
static1
Behavioral task
behavioral1
Sample
1883b1cf887b4748bcf5f6fd82a6dce3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1883b1cf887b4748bcf5f6fd82a6dce3.exe
Resource
win10v2004-20220901-en
General
-
Target
1883b1cf887b4748bcf5f6fd82a6dce3.exe
-
Size
342KB
-
MD5
1883b1cf887b4748bcf5f6fd82a6dce3
-
SHA1
0027119a3c92b25e6dac059d952c2298de29cc66
-
SHA256
b50a455b38340055fe28091525b17a3b9de0ed0a3c0a8bb6d8337850ea3bb81f
-
SHA512
88f56c14b4517b1745e769c9995d3dd5f8ae804cb3ab4e861017a85837b967b88ece92c7cb5a16d50a1cb1d6189f38e75d971b3f28a6f506f061f6ce1d7c2edc
-
SSDEEP
6144:bkXpGtKOhRiO2etLe6ftHYoUJ2Kw4kN4SHyK1tjvoFSDtZQxW:bmpkKOXiO57ftHjJ4xzwWW
Malware Config
Extracted
amadey
3.60
85.209.135.11/gjend7w/index.php
Extracted
systembc
89.22.236.225:4193
176.124.205.5:4193
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 45 3580 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
gntuud.exeumciavi32.exeEngine.exeavicapn32.exepid process 3632 gntuud.exe 2448 umciavi32.exe 2644 Engine.exe 2568 avicapn32.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\SETUP_16941\Engine.exe upx C:\Users\Admin\AppData\Local\Temp\SETUP_16941\Engine.exe upx behavioral2/memory/2644-162-0x0000000000400000-0x0000000000558000-memory.dmp upx -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1883b1cf887b4748bcf5f6fd82a6dce3.exegntuud.exeavicapn32.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 1883b1cf887b4748bcf5f6fd82a6dce3.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation gntuud.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation avicapn32.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 2340 rundll32.exe 3580 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
gntuud.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\umciavi32.exe = "C:\\Users\\Admin\\AppData\\Roaming\\1000019050\\umciavi32.exe" gntuud.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\syncfiles.dll = "rundll32 C:\\Users\\Admin\\1000003062\\syncfiles.dll, rundll" gntuud.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
rundll32.exepid process 3580 rundll32.exe 3580 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 5096 schtasks.exe 4956 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
rundll32.exepowershell.exepid process 3580 rundll32.exe 3580 rundll32.exe 4384 powershell.exe 4384 powershell.exe 4384 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 4384 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 4716 OpenWith.exe -
Suspicious use of WriteProcessMemory 53 IoCs
Processes:
1883b1cf887b4748bcf5f6fd82a6dce3.exegntuud.execmd.exerundll32.exeumciavi32.exeEngine.execmd.execmd.exeavicapn32.exedescription pid process target process PID 4104 wrote to memory of 3632 4104 1883b1cf887b4748bcf5f6fd82a6dce3.exe gntuud.exe PID 4104 wrote to memory of 3632 4104 1883b1cf887b4748bcf5f6fd82a6dce3.exe gntuud.exe PID 4104 wrote to memory of 3632 4104 1883b1cf887b4748bcf5f6fd82a6dce3.exe gntuud.exe PID 3632 wrote to memory of 5096 3632 gntuud.exe schtasks.exe PID 3632 wrote to memory of 5096 3632 gntuud.exe schtasks.exe PID 3632 wrote to memory of 5096 3632 gntuud.exe schtasks.exe PID 3632 wrote to memory of 816 3632 gntuud.exe cmd.exe PID 3632 wrote to memory of 816 3632 gntuud.exe cmd.exe PID 3632 wrote to memory of 816 3632 gntuud.exe cmd.exe PID 816 wrote to memory of 3644 816 cmd.exe cmd.exe PID 816 wrote to memory of 3644 816 cmd.exe cmd.exe PID 816 wrote to memory of 3644 816 cmd.exe cmd.exe PID 816 wrote to memory of 928 816 cmd.exe cacls.exe PID 816 wrote to memory of 928 816 cmd.exe cacls.exe PID 816 wrote to memory of 928 816 cmd.exe cacls.exe PID 816 wrote to memory of 2888 816 cmd.exe cacls.exe PID 816 wrote to memory of 2888 816 cmd.exe cacls.exe PID 816 wrote to memory of 2888 816 cmd.exe cacls.exe PID 816 wrote to memory of 4948 816 cmd.exe cmd.exe PID 816 wrote to memory of 4948 816 cmd.exe cmd.exe PID 816 wrote to memory of 4948 816 cmd.exe cmd.exe PID 816 wrote to memory of 4584 816 cmd.exe cacls.exe PID 816 wrote to memory of 4584 816 cmd.exe cacls.exe PID 816 wrote to memory of 4584 816 cmd.exe cacls.exe PID 816 wrote to memory of 4336 816 cmd.exe cacls.exe PID 816 wrote to memory of 4336 816 cmd.exe cacls.exe PID 816 wrote to memory of 4336 816 cmd.exe cacls.exe PID 3632 wrote to memory of 2340 3632 gntuud.exe rundll32.exe PID 3632 wrote to memory of 2340 3632 gntuud.exe rundll32.exe PID 3632 wrote to memory of 2340 3632 gntuud.exe rundll32.exe PID 2340 wrote to memory of 3580 2340 rundll32.exe rundll32.exe PID 2340 wrote to memory of 3580 2340 rundll32.exe rundll32.exe PID 3632 wrote to memory of 2448 3632 gntuud.exe umciavi32.exe PID 3632 wrote to memory of 2448 3632 gntuud.exe umciavi32.exe PID 3632 wrote to memory of 2448 3632 gntuud.exe umciavi32.exe PID 2448 wrote to memory of 2644 2448 umciavi32.exe Engine.exe PID 2448 wrote to memory of 2644 2448 umciavi32.exe Engine.exe PID 2448 wrote to memory of 2644 2448 umciavi32.exe Engine.exe PID 2644 wrote to memory of 3824 2644 Engine.exe cmd.exe PID 2644 wrote to memory of 3824 2644 Engine.exe cmd.exe PID 2644 wrote to memory of 3824 2644 Engine.exe cmd.exe PID 3632 wrote to memory of 2568 3632 gntuud.exe avicapn32.exe PID 3632 wrote to memory of 2568 3632 gntuud.exe avicapn32.exe PID 3632 wrote to memory of 2568 3632 gntuud.exe avicapn32.exe PID 3824 wrote to memory of 3444 3824 cmd.exe cmd.exe PID 3824 wrote to memory of 3444 3824 cmd.exe cmd.exe PID 3824 wrote to memory of 3444 3824 cmd.exe cmd.exe PID 3444 wrote to memory of 4384 3444 cmd.exe powershell.exe PID 3444 wrote to memory of 4384 3444 cmd.exe powershell.exe PID 3444 wrote to memory of 4384 3444 cmd.exe powershell.exe PID 2568 wrote to memory of 4956 2568 avicapn32.exe schtasks.exe PID 2568 wrote to memory of 4956 2568 avicapn32.exe schtasks.exe PID 2568 wrote to memory of 4956 2568 avicapn32.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1883b1cf887b4748bcf5f6fd82a6dce3.exe"C:\Users\Admin\AppData\Local\Temp\1883b1cf887b4748bcf5f6fd82a6dce3.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exe" /F3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "Admin:N"&&CACLS "gntuud.exe" /P "Admin:R" /E&&echo Y|CACLS "..\acc0b83959" /P "Admin:N"&&CACLS "..\acc0b83959" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "gntuud.exe" /P "Admin:N"4⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "gntuud.exe" /P "Admin:R" /E4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\acc0b83959" /P "Admin:N"4⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\acc0b83959" /P "Admin:R" /E4⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\1000003062\syncfiles.dll, rundll3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\1000003062\syncfiles.dll, rundll4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\1000019050\umciavi32.exe"C:\Users\Admin\AppData\Roaming\1000019050\umciavi32.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\SETUP_16941\Engine.exeC:\Users\Admin\AppData\Local\Temp\SETUP_16941\Engine.exe /TH_ID=_1420 /OriginExe="C:\Users\Admin\AppData\Roaming\1000019050\umciavi32.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd < 695⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell get-process avastui7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\1000020001\avicapn32.exe"C:\Users\Admin\AppData\Local\Temp\1000020001\avicapn32.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "svcupdater" /tr "C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f4⤵
- Creates scheduled task(s)
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Drops desktop.ini file(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\1000003062\syncfiles.dllFilesize
6.4MB
MD52f781ea76036a17bbd0c0f63be7cff12
SHA1b9b4c756949a038e87f4efd3569ba12c41a8e810
SHA2563acc979360b4496d3557182148b005a36f5334ea1b7efc42095c85aa0bf64372
SHA512c2b89d8be8438b9234a4cfeee4bd46535ec15dbf599c7553b957f0d3a8703fbd9dada2d2baa3b1a25b2bc58907f6db2f271d9d1926cac89d69912fb9e4f83208
-
C:\Users\Admin\1000003062\syncfiles.dllFilesize
6.4MB
MD52f781ea76036a17bbd0c0f63be7cff12
SHA1b9b4c756949a038e87f4efd3569ba12c41a8e810
SHA2563acc979360b4496d3557182148b005a36f5334ea1b7efc42095c85aa0bf64372
SHA512c2b89d8be8438b9234a4cfeee4bd46535ec15dbf599c7553b957f0d3a8703fbd9dada2d2baa3b1a25b2bc58907f6db2f271d9d1926cac89d69912fb9e4f83208
-
C:\Users\Admin\1000003062\syncfiles.dllFilesize
6.4MB
MD52f781ea76036a17bbd0c0f63be7cff12
SHA1b9b4c756949a038e87f4efd3569ba12c41a8e810
SHA2563acc979360b4496d3557182148b005a36f5334ea1b7efc42095c85aa0bf64372
SHA512c2b89d8be8438b9234a4cfeee4bd46535ec15dbf599c7553b957f0d3a8703fbd9dada2d2baa3b1a25b2bc58907f6db2f271d9d1926cac89d69912fb9e4f83208
-
C:\Users\Admin\AppData\Local\Temp\1000020001\avicapn32.exeFilesize
194KB
MD59ac7b60b880d404a156457d7b1dacd05
SHA154ad3bc6bd447a016aba24d3d7adaf0ecac38f75
SHA256c0a070dd3a3fe772359440bce75f73825ea8f16b195e15d91a2fa8c120c32463
SHA5125b738e583cfcb06f44afc3da81b38f493bc17b4657cdf911b0a8759e85ba3d1b165e7b327523b6bb79d7e9dc086d5474f64776f8e7e9393fce7769a377934a36
-
C:\Users\Admin\AppData\Local\Temp\1000020001\avicapn32.exeFilesize
194KB
MD59ac7b60b880d404a156457d7b1dacd05
SHA154ad3bc6bd447a016aba24d3d7adaf0ecac38f75
SHA256c0a070dd3a3fe772359440bce75f73825ea8f16b195e15d91a2fa8c120c32463
SHA5125b738e583cfcb06f44afc3da81b38f493bc17b4657cdf911b0a8759e85ba3d1b165e7b327523b6bb79d7e9dc086d5474f64776f8e7e9393fce7769a377934a36
-
C:\Users\Admin\AppData\Local\Temp\SETUP_16941\00000#06Filesize
872KB
MD53cdc0d31aee9f7223afdbdfc2f36f6a5
SHA1de414174005ac4794e901f8d99ff3ea595ba68eb
SHA2564021cce6fdc1d43d1a389fcfb212ce07cef8e01e8803ced6fe3c421802639369
SHA512ee86c1123b107c784b6e94bd9e4037136f73686c0f6fedf3f60926b7371941359f32b131dd29401e2ebf6e9f26a7ccc1b347591a862a686ff4ce6237762da9c4
-
C:\Users\Admin\AppData\Local\Temp\SETUP_16941\00001#69Filesize
10KB
MD5767125c146432d6bc91cfebb697da9e1
SHA148b0e29458447a6b5e111dc04ac5b7b565a0656b
SHA2561085125450bde79c1c70230d90a6965e22d218d103c456a2b95d50d2b05b3eba
SHA51277ec52dfe0454c34a9d7d0fb14641398b6bf11ab3a9919470d018c25d6b7d5e542fa9406465dbf4fd403349a91b36691b6f63896ec02a3c8e9be3a84c57954e4
-
C:\Users\Admin\AppData\Local\Temp\SETUP_16941\00002#7Filesize
1.5MB
MD5c4608baba4469ad420ea3a18c0daba5a
SHA168abd369422fb326e387d461244226f5242761ee
SHA2563ebd30c7fb5a86de8975a5e96f4e875e21ad50358de6988e4deffd250c4bacf8
SHA512a785b72f5db57bc165586b1551d1c7702b2c387d6d76ae82f126ac9567cd2a1a1f0ebf80eeeddb1dc6b155680b9d99eeff3fed59fbec6b4a3bc1cc91362d64e5
-
C:\Users\Admin\AppData\Local\Temp\SETUP_16941\Engine.exeFilesize
392KB
MD5a7a99a201774531d761f6aac2651a9df
SHA1b122ae368c4bf103e959a6ebb54ddb310117ab96
SHA256e6e73497e85e9ece4c92ac7d49e07b9d55e932ba2d9e5789b94b95a9841ee524
SHA512056504da2afeed547a4123ac8c38b35291b7dc0126fb638ae304eee802ac572715f9d608e9f1655788a030f488354741ee27c805434111c8e915cf841c0892f1
-
C:\Users\Admin\AppData\Local\Temp\SETUP_16941\Engine.exeFilesize
392KB
MD5a7a99a201774531d761f6aac2651a9df
SHA1b122ae368c4bf103e959a6ebb54ddb310117ab96
SHA256e6e73497e85e9ece4c92ac7d49e07b9d55e932ba2d9e5789b94b95a9841ee524
SHA512056504da2afeed547a4123ac8c38b35291b7dc0126fb638ae304eee802ac572715f9d608e9f1655788a030f488354741ee27c805434111c8e915cf841c0892f1
-
C:\Users\Admin\AppData\Local\Temp\SETUP_16941\Modern_Icon.bmpFilesize
7KB
MD51dd88f67f029710d5c5858a6293a93f1
SHA13e5ef66613415fe9467b2a24ccc27d8f997e7df6
SHA256b5dad33ceb6eb1ac2a05fbda76e29a73038403939218a88367925c3a20c05532
SHA5127071fd64038e0058c8c586c63c62677c0ca403768100f90323cf9c0bc7b7fcb538391e6f3606bd7970b8769445606ada47adcdcfc1e991e25caf272a13e10c94
-
C:\Users\Admin\AppData\Local\Temp\SETUP_16941\Setup.txtFilesize
2KB
MD53502606b47f353647741bfae662f1fd4
SHA11fc4247b029a2ab3c092154b16b960200c6954e8
SHA256467b95e5714e8c0490965500aadf0576afccd0504a3419bbac059f51cc5f4c80
SHA512610809440132e4b412e9ecbfaf88303c788626bb0858d2aeb4842ec6a6fb529abdd7deaa8900775a964055a25af41143184cd8096d0f4d9ebc3b0752ece1f11b
-
C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exeFilesize
342KB
MD51883b1cf887b4748bcf5f6fd82a6dce3
SHA10027119a3c92b25e6dac059d952c2298de29cc66
SHA256b50a455b38340055fe28091525b17a3b9de0ed0a3c0a8bb6d8337850ea3bb81f
SHA51288f56c14b4517b1745e769c9995d3dd5f8ae804cb3ab4e861017a85837b967b88ece92c7cb5a16d50a1cb1d6189f38e75d971b3f28a6f506f061f6ce1d7c2edc
-
C:\Users\Admin\AppData\Local\Temp\acc0b83959\gntuud.exeFilesize
342KB
MD51883b1cf887b4748bcf5f6fd82a6dce3
SHA10027119a3c92b25e6dac059d952c2298de29cc66
SHA256b50a455b38340055fe28091525b17a3b9de0ed0a3c0a8bb6d8337850ea3bb81f
SHA51288f56c14b4517b1745e769c9995d3dd5f8ae804cb3ab4e861017a85837b967b88ece92c7cb5a16d50a1cb1d6189f38e75d971b3f28a6f506f061f6ce1d7c2edc
-
C:\Users\Admin\AppData\Roaming\1000019050\umciavi32.exeFilesize
1.6MB
MD569a3014aa137c526dfd131460f458241
SHA1f0c6afa51de99f657d4d005615d6cb290dca4540
SHA25635c6d144c1b40b1914e7a16856af6e05eccccae04545bb04716b0f1f186ee7ff
SHA512132429678f8c1d60eb09a1d7239161bf4232303ad63b8fcee8fa98173721ecb6c8909749153681f738725f2850e969ad12b5c904cd96cfb8fe146d46f246cdac
-
C:\Users\Admin\AppData\Roaming\1000019050\umciavi32.exeFilesize
1.6MB
MD569a3014aa137c526dfd131460f458241
SHA1f0c6afa51de99f657d4d005615d6cb290dca4540
SHA25635c6d144c1b40b1914e7a16856af6e05eccccae04545bb04716b0f1f186ee7ff
SHA512132429678f8c1d60eb09a1d7239161bf4232303ad63b8fcee8fa98173721ecb6c8909749153681f738725f2850e969ad12b5c904cd96cfb8fe146d46f246cdac
-
memory/816-140-0x0000000000000000-mapping.dmp
-
memory/928-142-0x0000000000000000-mapping.dmp
-
memory/2340-148-0x0000000000000000-mapping.dmp
-
memory/2448-153-0x0000000000000000-mapping.dmp
-
memory/2568-172-0x00000000014E0000-0x00000000014F9000-memory.dmpFilesize
100KB
-
memory/2568-181-0x00000000014E0000-0x00000000014F9000-memory.dmpFilesize
100KB
-
memory/2568-171-0x00000000014E0000-0x00000000014F9000-memory.dmpFilesize
100KB
-
memory/2568-167-0x0000000000000000-mapping.dmp
-
memory/2644-157-0x0000000000000000-mapping.dmp
-
memory/2644-162-0x0000000000400000-0x0000000000558000-memory.dmpFilesize
1.3MB
-
memory/2888-143-0x0000000000000000-mapping.dmp
-
memory/3444-170-0x0000000000000000-mapping.dmp
-
memory/3580-151-0x0000000000000000-mapping.dmp
-
memory/3580-156-0x00007FFB85700000-0x00007FFB860FD000-memory.dmpFilesize
10.0MB
-
memory/3632-147-0x0000000000770000-0x00000000007B4000-memory.dmpFilesize
272KB
-
memory/3632-174-0x0000000000770000-0x00000000007B4000-memory.dmpFilesize
272KB
-
memory/3632-134-0x0000000000000000-mapping.dmp
-
memory/3644-141-0x0000000000000000-mapping.dmp
-
memory/3824-166-0x0000000000000000-mapping.dmp
-
memory/4104-132-0x0000000000A40000-0x0000000000A84000-memory.dmpFilesize
272KB
-
memory/4104-137-0x0000000000A40000-0x0000000000A84000-memory.dmpFilesize
272KB
-
memory/4104-133-0x0000000000A40000-0x0000000000A84000-memory.dmpFilesize
272KB
-
memory/4336-146-0x0000000000000000-mapping.dmp
-
memory/4384-173-0x0000000000000000-mapping.dmp
-
memory/4384-179-0x0000000005AD0000-0x0000000005B36000-memory.dmpFilesize
408KB
-
memory/4384-186-0x00000000078C0000-0x0000000007E64000-memory.dmpFilesize
5.6MB
-
memory/4384-175-0x0000000002810000-0x0000000002846000-memory.dmpFilesize
216KB
-
memory/4384-176-0x00000000052C0000-0x00000000058E8000-memory.dmpFilesize
6.2MB
-
memory/4384-177-0x0000000005160000-0x0000000005182000-memory.dmpFilesize
136KB
-
memory/4384-178-0x0000000005960000-0x00000000059C6000-memory.dmpFilesize
408KB
-
memory/4384-185-0x00000000072E0000-0x0000000007302000-memory.dmpFilesize
136KB
-
memory/4384-184-0x0000000006610000-0x000000000662A000-memory.dmpFilesize
104KB
-
memory/4384-183-0x0000000006680000-0x0000000006716000-memory.dmpFilesize
600KB
-
memory/4384-182-0x0000000006090000-0x00000000060AE000-memory.dmpFilesize
120KB
-
memory/4584-145-0x0000000000000000-mapping.dmp
-
memory/4948-144-0x0000000000000000-mapping.dmp
-
memory/4956-180-0x0000000000000000-mapping.dmp
-
memory/5096-139-0x0000000000000000-mapping.dmp