Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 13:10
Static task
static1
Behavioral task
behavioral1
Sample
fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe
Resource
win7-20240221-en
General
-
Target
fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe
-
Size
450KB
-
MD5
ead981cd98146fabe078992943b0329d
-
SHA1
a20ba9450187e13e3ed62e6beab4d2bec788df01
-
SHA256
fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e
-
SHA512
a20fc11777c75d1062c16407b0f77098e93cdfa28afae053fd8671b56afc234c4bce9243dcd516adb95183a8d4aa58dafb850bd54c996c7507b2bf51c0fcb03a
-
SSDEEP
12288:FZcdIu1fgsDbqonwXKI9SrWLcsz8tEaay4MF3kR:FHumsct9SaLcPtaEFi
Malware Config
Extracted
asyncrat
0.5.7B
Default
194.147.140.157:3361
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
msdtc.exe
-
install_folder
%AppData%
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
msdtc.exemsdtc.exepid process 676 msdtc.exe 1752 msdtc.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 1800 cmd.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exemsdtc.exedescription pid process target process PID 2960 set thread context of 2436 2960 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe PID 676 set thread context of 1752 676 msdtc.exe msdtc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 2676 schtasks.exe 2756 schtasks.exe 2180 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2820 timeout.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exepowershell.exepowershell.exefafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exemsdtc.exepowershell.exepowershell.exepid process 2960 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe 2960 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe 2960 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe 2960 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe 2960 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe 2960 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe 2960 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe 2992 powershell.exe 2628 powershell.exe 2436 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe 2436 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe 676 msdtc.exe 676 msdtc.exe 676 msdtc.exe 676 msdtc.exe 676 msdtc.exe 676 msdtc.exe 2452 powershell.exe 1952 powershell.exe 676 msdtc.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exepowershell.exepowershell.exefafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exemsdtc.exepowershell.exepowershell.exemsdtc.exedescription pid process Token: SeDebugPrivilege 2960 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe Token: SeDebugPrivilege 2992 powershell.exe Token: SeDebugPrivilege 2628 powershell.exe Token: SeDebugPrivilege 2436 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe Token: SeDebugPrivilege 676 msdtc.exe Token: SeDebugPrivilege 2452 powershell.exe Token: SeDebugPrivilege 1952 powershell.exe Token: SeDebugPrivilege 1752 msdtc.exe -
Suspicious use of WriteProcessMemory 62 IoCs
Processes:
fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exefafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.execmd.execmd.exemsdtc.exedescription pid process target process PID 2960 wrote to memory of 2992 2960 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe powershell.exe PID 2960 wrote to memory of 2992 2960 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe powershell.exe PID 2960 wrote to memory of 2992 2960 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe powershell.exe PID 2960 wrote to memory of 2992 2960 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe powershell.exe PID 2960 wrote to memory of 2628 2960 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe powershell.exe PID 2960 wrote to memory of 2628 2960 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe powershell.exe PID 2960 wrote to memory of 2628 2960 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe powershell.exe PID 2960 wrote to memory of 2628 2960 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe powershell.exe PID 2960 wrote to memory of 2676 2960 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe schtasks.exe PID 2960 wrote to memory of 2676 2960 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe schtasks.exe PID 2960 wrote to memory of 2676 2960 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe schtasks.exe PID 2960 wrote to memory of 2676 2960 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe schtasks.exe PID 2960 wrote to memory of 2436 2960 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe PID 2960 wrote to memory of 2436 2960 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe PID 2960 wrote to memory of 2436 2960 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe PID 2960 wrote to memory of 2436 2960 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe PID 2960 wrote to memory of 2436 2960 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe PID 2960 wrote to memory of 2436 2960 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe PID 2960 wrote to memory of 2436 2960 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe PID 2960 wrote to memory of 2436 2960 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe PID 2960 wrote to memory of 2436 2960 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe PID 2436 wrote to memory of 2464 2436 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe cmd.exe PID 2436 wrote to memory of 2464 2436 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe cmd.exe PID 2436 wrote to memory of 2464 2436 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe cmd.exe PID 2436 wrote to memory of 2464 2436 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe cmd.exe PID 2436 wrote to memory of 1800 2436 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe cmd.exe PID 2436 wrote to memory of 1800 2436 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe cmd.exe PID 2436 wrote to memory of 1800 2436 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe cmd.exe PID 2436 wrote to memory of 1800 2436 fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe cmd.exe PID 2464 wrote to memory of 2756 2464 cmd.exe schtasks.exe PID 2464 wrote to memory of 2756 2464 cmd.exe schtasks.exe PID 2464 wrote to memory of 2756 2464 cmd.exe schtasks.exe PID 2464 wrote to memory of 2756 2464 cmd.exe schtasks.exe PID 1800 wrote to memory of 2820 1800 cmd.exe timeout.exe PID 1800 wrote to memory of 2820 1800 cmd.exe timeout.exe PID 1800 wrote to memory of 2820 1800 cmd.exe timeout.exe PID 1800 wrote to memory of 2820 1800 cmd.exe timeout.exe PID 1800 wrote to memory of 676 1800 cmd.exe msdtc.exe PID 1800 wrote to memory of 676 1800 cmd.exe msdtc.exe PID 1800 wrote to memory of 676 1800 cmd.exe msdtc.exe PID 1800 wrote to memory of 676 1800 cmd.exe msdtc.exe PID 676 wrote to memory of 2452 676 msdtc.exe powershell.exe PID 676 wrote to memory of 2452 676 msdtc.exe powershell.exe PID 676 wrote to memory of 2452 676 msdtc.exe powershell.exe PID 676 wrote to memory of 2452 676 msdtc.exe powershell.exe PID 676 wrote to memory of 1952 676 msdtc.exe powershell.exe PID 676 wrote to memory of 1952 676 msdtc.exe powershell.exe PID 676 wrote to memory of 1952 676 msdtc.exe powershell.exe PID 676 wrote to memory of 1952 676 msdtc.exe powershell.exe PID 676 wrote to memory of 2180 676 msdtc.exe schtasks.exe PID 676 wrote to memory of 2180 676 msdtc.exe schtasks.exe PID 676 wrote to memory of 2180 676 msdtc.exe schtasks.exe PID 676 wrote to memory of 2180 676 msdtc.exe schtasks.exe PID 676 wrote to memory of 1752 676 msdtc.exe msdtc.exe PID 676 wrote to memory of 1752 676 msdtc.exe msdtc.exe PID 676 wrote to memory of 1752 676 msdtc.exe msdtc.exe PID 676 wrote to memory of 1752 676 msdtc.exe msdtc.exe PID 676 wrote to memory of 1752 676 msdtc.exe msdtc.exe PID 676 wrote to memory of 1752 676 msdtc.exe msdtc.exe PID 676 wrote to memory of 1752 676 msdtc.exe msdtc.exe PID 676 wrote to memory of 1752 676 msdtc.exe msdtc.exe PID 676 wrote to memory of 1752 676 msdtc.exe msdtc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe"C:\Users\Admin\AppData\Local\Temp\fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\FITGzizVFD.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FITGzizVFD" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA709.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe"C:\Users\Admin\AppData\Local\Temp\fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "msdtc" /tr '"C:\Users\Admin\AppData\Roaming\msdtc.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "msdtc" /tr '"C:\Users\Admin\AppData\Roaming\msdtc.exe"'4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpBE9E.tmp.bat""3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\msdtc.exe"C:\Users\Admin\AppData\Roaming\msdtc.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\msdtc.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\FITGzizVFD.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FITGzizVFD" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1B00.tmp"5⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\msdtc.exe"C:\Users\Admin\AppData\Roaming\msdtc.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpA709.tmpFilesize
1KB
MD51932843c6cdcb3a7c01029c551e67201
SHA17b8aed4f6e9596568c06876db80ae7616303a6bd
SHA25614a56d320fb17b4bd11f103e6fbe10b618491f11965e3cd3a0d8044fcc5612a3
SHA5126802ea1a79b93faa7adb1d0f6e8fae1ac3859cc3cb43b938bb0c272003ff1356dbb98427b79ec665a7d1903b51d79f362886d4f74a1d2f86b4e41a7f46b89b5f
-
C:\Users\Admin\AppData\Local\Temp\tmpBE9E.tmp.batFilesize
149B
MD567ef356a2925832ec6ffa768d6ea2c78
SHA112361a2b230d80fca2b2d3332b1c5d9668922a14
SHA2563ee2c307ef89808af255da0f796d516ee2fcd215cd3bc6c2f3b337b121b659c5
SHA512977fc7649286292070b19bf852652a7f299c94c473a37d2fd4a5b97343cedde196a5cc44217a138fe495c025b31071b6ea4e376587ef22bff402e55ec600f8c3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\F8NYMYDH0DTXO3GWG075.tempFilesize
7KB
MD50e0d26cb62e8a545f48bd44a7d85eb81
SHA19ea42d82ece8f933c5233792873a29bfec8122a8
SHA25616b0421108933ed478b761b7b2425a1cc2f708c11d774288573979b3cbdeac77
SHA512fe359498e4e032d16931ee48e0b902513813e81afb7c15ea50c063452f9480130820eea2fb42b4ed6d3cbca16830c5c7e91cfda3e51c370fcdaadd45b86be319
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5c3ef1031790b1b6ab3c88d8ea2e3a9ed
SHA1f5dc679b8f33803e8afaf2a6d7d62fce1c11f117
SHA256843bc60d3e304fa0aa13d29d8053ab04fe79d6448459df01a8250799733c3217
SHA512c73ff2e30109c1a23b4d3334089f143b8d0b65be0110c783c913275b3f2a7f3d3720daacb56cc4df88aa71d6ef886142d81614c541cf0421697d162618c3ebc4
-
\Users\Admin\AppData\Roaming\msdtc.exeFilesize
450KB
MD5ead981cd98146fabe078992943b0329d
SHA1a20ba9450187e13e3ed62e6beab4d2bec788df01
SHA256fafaaff6d67dd5702bf67e82ea12605ddc03797213ee5aaaed48fe6194cfe87e
SHA512a20fc11777c75d1062c16407b0f77098e93cdfa28afae053fd8671b56afc234c4bce9243dcd516adb95183a8d4aa58dafb850bd54c996c7507b2bf51c0fcb03a
-
memory/676-60-0x0000000074DE0000-0x00000000754CE000-memory.dmpFilesize
6.9MB
-
memory/676-94-0x0000000074DE0000-0x00000000754CE000-memory.dmpFilesize
6.9MB
-
memory/676-59-0x0000000000CD0000-0x0000000000D24000-memory.dmpFilesize
336KB
-
memory/676-58-0x0000000000440000-0x0000000000480000-memory.dmpFilesize
256KB
-
memory/676-57-0x0000000074DE0000-0x00000000754CE000-memory.dmpFilesize
6.9MB
-
memory/676-56-0x00000000013B0000-0x0000000001424000-memory.dmpFilesize
464KB
-
memory/1752-90-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1752-83-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/1752-93-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1952-89-0x000000006EFD0000-0x000000006F57B000-memory.dmpFilesize
5.7MB
-
memory/1952-85-0x00000000027F0000-0x0000000002830000-memory.dmpFilesize
256KB
-
memory/1952-91-0x00000000027F0000-0x0000000002830000-memory.dmpFilesize
256KB
-
memory/1952-95-0x000000006EFD0000-0x000000006F57B000-memory.dmpFilesize
5.7MB
-
memory/2436-40-0x0000000000AA0000-0x0000000000AE0000-memory.dmpFilesize
256KB
-
memory/2436-52-0x0000000074E30000-0x000000007551E000-memory.dmpFilesize
6.9MB
-
memory/2436-20-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2436-29-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2436-22-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2436-23-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2436-24-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2436-25-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2436-37-0x0000000074E30000-0x000000007551E000-memory.dmpFilesize
6.9MB
-
memory/2436-27-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2436-32-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2452-82-0x00000000026C0000-0x0000000002700000-memory.dmpFilesize
256KB
-
memory/2452-69-0x000000006EFD0000-0x000000006F57B000-memory.dmpFilesize
5.7MB
-
memory/2452-96-0x000000006EFD0000-0x000000006F57B000-memory.dmpFilesize
5.7MB
-
memory/2452-80-0x00000000026C0000-0x0000000002700000-memory.dmpFilesize
256KB
-
memory/2452-76-0x000000006EFD0000-0x000000006F57B000-memory.dmpFilesize
5.7MB
-
memory/2452-74-0x00000000026C0000-0x0000000002700000-memory.dmpFilesize
256KB
-
memory/2628-41-0x000000006FCB0000-0x000000007025B000-memory.dmpFilesize
5.7MB
-
memory/2628-39-0x00000000023B0000-0x00000000023F0000-memory.dmpFilesize
256KB
-
memory/2628-34-0x000000006FCB0000-0x000000007025B000-memory.dmpFilesize
5.7MB
-
memory/2960-7-0x0000000074E30000-0x000000007551E000-memory.dmpFilesize
6.9MB
-
memory/2960-31-0x0000000074E30000-0x000000007551E000-memory.dmpFilesize
6.9MB
-
memory/2960-0-0x0000000000D00000-0x0000000000D74000-memory.dmpFilesize
464KB
-
memory/2960-2-0x0000000004D10000-0x0000000004D50000-memory.dmpFilesize
256KB
-
memory/2960-1-0x0000000074E30000-0x000000007551E000-memory.dmpFilesize
6.9MB
-
memory/2960-3-0x0000000000320000-0x0000000000334000-memory.dmpFilesize
80KB
-
memory/2960-4-0x0000000000350000-0x000000000035A000-memory.dmpFilesize
40KB
-
memory/2960-21-0x0000000004D10000-0x0000000004D50000-memory.dmpFilesize
256KB
-
memory/2960-6-0x0000000000CB0000-0x0000000000D04000-memory.dmpFilesize
336KB
-
memory/2960-5-0x0000000000360000-0x000000000036C000-memory.dmpFilesize
48KB
-
memory/2992-33-0x000000006FCB0000-0x000000007025B000-memory.dmpFilesize
5.7MB
-
memory/2992-35-0x00000000023C0000-0x0000000002400000-memory.dmpFilesize
256KB
-
memory/2992-38-0x00000000023C0000-0x0000000002400000-memory.dmpFilesize
256KB
-
memory/2992-36-0x000000006FCB0000-0x000000007025B000-memory.dmpFilesize
5.7MB
-
memory/2992-42-0x000000006FCB0000-0x000000007025B000-memory.dmpFilesize
5.7MB