Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 08:41
Static task
static1
Behavioral task
behavioral1
Sample
7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe
Resource
win10v2004-20240704-en
General
-
Target
7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe
-
Size
5.4MB
-
MD5
a2a9c309c5300a53d2c2fc41b71b174b
-
SHA1
f6c26eae1925425fa8966266e87a57b688fad218
-
SHA256
7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224
-
SHA512
a29eec8fa98174a74e9bd93c5902cdd95ce329ff8b7a1469901a95705dc1d7fffde58afa296399febb8559d8cd73c932945e85cce8af54e7a672d8f1618e3f7c
-
SSDEEP
98304:j+ddAtuMvY00V2vtQSH7OuqeGszSQTADu0mL63KQOKvYA1ZuoyQPNf+xKi:wdOuMvc8VdbOuqePmQTAKH63NYAiGfiT
Malware Config
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exedescription pid process target process PID 1992 created 1212 1992 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe Explorer.EXE -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
Processes:
powershell.exepowershell.exepid process 7436 powershell.exe 2132 powershell.exe -
Executes dropped EXE 4 IoCs
Processes:
BLueHvffhw.exeBLueHvffhw.exeFallbackBuffer.exeFallbackBuffer.exepid process 1416 BLueHvffhw.exe 876 BLueHvffhw.exe 7684 FallbackBuffer.exe 4468 FallbackBuffer.exe -
Loads dropped DLL 2 IoCs
Processes:
7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exeBLueHvffhw.exepid process 2392 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe 1416 BLueHvffhw.exe -
Drops file in System32 directory 2 IoCs
Processes:
powershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exeBLueHvffhw.exeFallbackBuffer.exeFallbackBuffer.exeInstallUtil.exedescription pid process target process PID 2392 set thread context of 1992 2392 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe PID 1416 set thread context of 876 1416 BLueHvffhw.exe BLueHvffhw.exe PID 7684 set thread context of 4468 7684 FallbackBuffer.exe FallbackBuffer.exe PID 4468 set thread context of 4532 4468 FallbackBuffer.exe InstallUtil.exe PID 4532 set thread context of 7460 4532 InstallUtil.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exedialer.exepowershell.exeFallbackBuffer.exepowershell.exepid process 1992 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe 1992 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe 960 dialer.exe 960 dialer.exe 960 dialer.exe 960 dialer.exe 7436 powershell.exe 4468 FallbackBuffer.exe 4468 FallbackBuffer.exe 4468 FallbackBuffer.exe 4468 FallbackBuffer.exe 2132 powershell.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
Processes:
7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exeBLueHvffhw.exeBLueHvffhw.exepowershell.exeFallbackBuffer.exeFallbackBuffer.exeInstallUtil.exeInstallUtil.exepowershell.exedescription pid process Token: SeDebugPrivilege 2392 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe Token: SeDebugPrivilege 2392 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe Token: SeDebugPrivilege 1416 BLueHvffhw.exe Token: SeDebugPrivilege 1416 BLueHvffhw.exe Token: SeDebugPrivilege 876 BLueHvffhw.exe Token: SeDebugPrivilege 7436 powershell.exe Token: SeDebugPrivilege 7684 FallbackBuffer.exe Token: SeDebugPrivilege 7684 FallbackBuffer.exe Token: SeDebugPrivilege 4468 FallbackBuffer.exe Token: SeDebugPrivilege 4532 InstallUtil.exe Token: SeDebugPrivilege 4532 InstallUtil.exe Token: SeDebugPrivilege 7460 InstallUtil.exe Token: SeDebugPrivilege 2132 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exeBLueHvffhw.exe7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exetaskeng.exetaskeng.exeFallbackBuffer.exeFallbackBuffer.exeInstallUtil.exedescription pid process target process PID 2392 wrote to memory of 1416 2392 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe BLueHvffhw.exe PID 2392 wrote to memory of 1416 2392 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe BLueHvffhw.exe PID 2392 wrote to memory of 1416 2392 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe BLueHvffhw.exe PID 2392 wrote to memory of 1416 2392 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe BLueHvffhw.exe PID 2392 wrote to memory of 1992 2392 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe PID 2392 wrote to memory of 1992 2392 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe PID 2392 wrote to memory of 1992 2392 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe PID 2392 wrote to memory of 1992 2392 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe PID 2392 wrote to memory of 1992 2392 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe PID 2392 wrote to memory of 1992 2392 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe PID 2392 wrote to memory of 1992 2392 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe PID 2392 wrote to memory of 1992 2392 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe PID 2392 wrote to memory of 1992 2392 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe PID 1416 wrote to memory of 876 1416 BLueHvffhw.exe BLueHvffhw.exe PID 1416 wrote to memory of 876 1416 BLueHvffhw.exe BLueHvffhw.exe PID 1416 wrote to memory of 876 1416 BLueHvffhw.exe BLueHvffhw.exe PID 1416 wrote to memory of 876 1416 BLueHvffhw.exe BLueHvffhw.exe PID 1416 wrote to memory of 876 1416 BLueHvffhw.exe BLueHvffhw.exe PID 1416 wrote to memory of 876 1416 BLueHvffhw.exe BLueHvffhw.exe PID 1416 wrote to memory of 876 1416 BLueHvffhw.exe BLueHvffhw.exe PID 1416 wrote to memory of 876 1416 BLueHvffhw.exe BLueHvffhw.exe PID 1416 wrote to memory of 876 1416 BLueHvffhw.exe BLueHvffhw.exe PID 1992 wrote to memory of 960 1992 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe dialer.exe PID 1992 wrote to memory of 960 1992 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe dialer.exe PID 1992 wrote to memory of 960 1992 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe dialer.exe PID 1992 wrote to memory of 960 1992 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe dialer.exe PID 1992 wrote to memory of 960 1992 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe dialer.exe PID 1992 wrote to memory of 960 1992 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe dialer.exe PID 7404 wrote to memory of 7436 7404 taskeng.exe powershell.exe PID 7404 wrote to memory of 7436 7404 taskeng.exe powershell.exe PID 7404 wrote to memory of 7436 7404 taskeng.exe powershell.exe PID 7652 wrote to memory of 7684 7652 taskeng.exe FallbackBuffer.exe PID 7652 wrote to memory of 7684 7652 taskeng.exe FallbackBuffer.exe PID 7652 wrote to memory of 7684 7652 taskeng.exe FallbackBuffer.exe PID 7652 wrote to memory of 7684 7652 taskeng.exe FallbackBuffer.exe PID 7684 wrote to memory of 4468 7684 FallbackBuffer.exe FallbackBuffer.exe PID 7684 wrote to memory of 4468 7684 FallbackBuffer.exe FallbackBuffer.exe PID 7684 wrote to memory of 4468 7684 FallbackBuffer.exe FallbackBuffer.exe PID 7684 wrote to memory of 4468 7684 FallbackBuffer.exe FallbackBuffer.exe PID 7684 wrote to memory of 4468 7684 FallbackBuffer.exe FallbackBuffer.exe PID 7684 wrote to memory of 4468 7684 FallbackBuffer.exe FallbackBuffer.exe PID 7684 wrote to memory of 4468 7684 FallbackBuffer.exe FallbackBuffer.exe PID 7684 wrote to memory of 4468 7684 FallbackBuffer.exe FallbackBuffer.exe PID 7684 wrote to memory of 4468 7684 FallbackBuffer.exe FallbackBuffer.exe PID 4468 wrote to memory of 4508 4468 FallbackBuffer.exe InstallUtil.exe PID 4468 wrote to memory of 4508 4468 FallbackBuffer.exe InstallUtil.exe PID 4468 wrote to memory of 4508 4468 FallbackBuffer.exe InstallUtil.exe PID 4468 wrote to memory of 4508 4468 FallbackBuffer.exe InstallUtil.exe PID 4468 wrote to memory of 4508 4468 FallbackBuffer.exe InstallUtil.exe PID 4468 wrote to memory of 4508 4468 FallbackBuffer.exe InstallUtil.exe PID 4468 wrote to memory of 4508 4468 FallbackBuffer.exe InstallUtil.exe PID 4468 wrote to memory of 4532 4468 FallbackBuffer.exe InstallUtil.exe PID 4468 wrote to memory of 4532 4468 FallbackBuffer.exe InstallUtil.exe PID 4468 wrote to memory of 4532 4468 FallbackBuffer.exe InstallUtil.exe PID 4468 wrote to memory of 4532 4468 FallbackBuffer.exe InstallUtil.exe PID 4468 wrote to memory of 4532 4468 FallbackBuffer.exe InstallUtil.exe PID 4468 wrote to memory of 4532 4468 FallbackBuffer.exe InstallUtil.exe PID 4468 wrote to memory of 4532 4468 FallbackBuffer.exe InstallUtil.exe PID 4468 wrote to memory of 4532 4468 FallbackBuffer.exe InstallUtil.exe PID 4468 wrote to memory of 4532 4468 FallbackBuffer.exe InstallUtil.exe PID 4468 wrote to memory of 4532 4468 FallbackBuffer.exe InstallUtil.exe PID 4468 wrote to memory of 4532 4468 FallbackBuffer.exe InstallUtil.exe PID 4468 wrote to memory of 4532 4468 FallbackBuffer.exe InstallUtil.exe PID 4532 wrote to memory of 7460 4532 InstallUtil.exe InstallUtil.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe"C:\Users\Admin\AppData\Local\Temp\7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\BLueHvffhw.exe"C:\Users\Admin\AppData\Local\Temp\BLueHvffhw.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\BLueHvffhw.exe"C:\Users\Admin\AppData\Local\Temp\BLueHvffhw.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe"C:\Users\Admin\AppData\Local\Temp\7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\taskeng.exetaskeng.exe {115BF59B-DB1E-4610-B795-18EA7D7FF3E2} S-1-5-21-3294248377-1418901787-4083263181-1000:FMEDFXFE\Admin:S4U:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAARgBhAGwAbABiAGEAYwBrAEIAdQBmAGYAZQByAC4AZQB4AGUAOwA=2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAARgBhAGwAbABiAGEAYwBrAEIAdQBmAGYAZQByAC4AZQB4AGUAOwA=2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskeng.exetaskeng.exe {FD07C8A8-E4DA-43B6-B551-BDE78C511AFF} S-1-5-21-3294248377-1418901787-4083263181-1000:FMEDFXFE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Current\mgtmhqr\FallbackBuffer.exeC:\Users\Admin\AppData\Local\Current\mgtmhqr\FallbackBuffer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Current\mgtmhqr\FallbackBuffer.exe"C:\Users\Admin\AppData\Local\Current\mgtmhqr\FallbackBuffer.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe4⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe4⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\BLueHvffhw.exeFilesize
2.7MB
MD5abf2da5b3e7845f50463a72f8b6e6aaa
SHA1a5299f55950ca82134da73b9e9844c5d624114c3
SHA2562a4b1ae0ae67cd31f85680e6351bd5b92ff61e246c158decb1a43a3ef01d9f2c
SHA512570e8becd18b36d66a2ac295518c8ba3c0bc83d8a6175e601b509efd9237462d1d0826dbeb9e52465e7cdcd57cb4ae7fd859ddc4a5aad895cef6ef7fa981e8a4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD586f995a7df0ecf7e523039cdc107e208
SHA15bb772d22a32ec799cef286f856f76623662ac46
SHA25654c91b0302807a5d40923fd77f3bf9bbdea9bf3405ee26747f63a975a1c2a5ed
SHA512dd6aae725d88cacb34eae84e43e84072cf08845e121cf0fde3d8bdc0e46f9516271cf212b533f8891a9b36c7a33095341ea86410c9932561e9638956a50b4dcf
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\RVRZH1KORIEG1DUIP7DQ.tempFilesize
7KB
MD502b3d0e64afed1b9421e1b54b0c71f1e
SHA18432e9826e84f379e121a06413f9fe016ec828fb
SHA2567664016888181e66281ba4b8c0019388037001b8978b4e8b45450281ba21e3ba
SHA512890fbebe297e1879da256a88b02014b923dc5c31a42aa06aeb9958a9bee48aad60ce475ba3f12919420ef23bafa0b94b6ee7d2588dd85d757460d6c49c9d36db
-
memory/876-9824-0x0000000000E00000-0x0000000000EE8000-memory.dmpFilesize
928KB
-
memory/876-12036-0x0000000004BE0000-0x0000000004C36000-memory.dmpFilesize
344KB
-
memory/876-12035-0x00000000007F0000-0x00000000007F8000-memory.dmpFilesize
32KB
-
memory/876-9822-0x0000000000400000-0x00000000004AC000-memory.dmpFilesize
688KB
-
memory/1416-9807-0x0000000005570000-0x0000000005664000-memory.dmpFilesize
976KB
-
memory/1416-9823-0x00000000744B0000-0x0000000074B9E000-memory.dmpFilesize
6.9MB
-
memory/1416-4900-0x0000000000F70000-0x000000000122C000-memory.dmpFilesize
2.7MB
-
memory/1416-4903-0x0000000004B20000-0x0000000004DD8000-memory.dmpFilesize
2.7MB
-
memory/1416-4902-0x00000000744B0000-0x0000000074B9E000-memory.dmpFilesize
6.9MB
-
memory/1992-9955-0x0000000000080000-0x0000000000130000-memory.dmpFilesize
704KB
-
memory/1992-10149-0x0000000000920000-0x0000000000928000-memory.dmpFilesize
32KB
-
memory/2132-26255-0x000000001A1C0000-0x000000001A4A2000-memory.dmpFilesize
2.9MB
-
memory/2132-26256-0x0000000001200000-0x0000000001208000-memory.dmpFilesize
32KB
-
memory/2392-26-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-4892-0x00000000744B0000-0x0000000074B9E000-memory.dmpFilesize
6.9MB
-
memory/2392-32-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-34-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-36-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-38-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-40-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-42-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-44-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-46-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-48-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-50-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-52-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-54-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-56-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-58-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-60-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-62-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-64-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-66-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-4889-0x00000000059C0000-0x0000000005D70000-memory.dmpFilesize
3.7MB
-
memory/2392-4890-0x0000000002410000-0x000000000245C000-memory.dmpFilesize
304KB
-
memory/2392-4891-0x00000000744B0000-0x0000000074B9E000-memory.dmpFilesize
6.9MB
-
memory/2392-30-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-4901-0x0000000004C90000-0x0000000004CE4000-memory.dmpFilesize
336KB
-
memory/2392-28-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-0-0x00000000744BE000-0x00000000744BF000-memory.dmpFilesize
4KB
-
memory/2392-24-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-22-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-20-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-18-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-12-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-14-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-16-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-10-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-8-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-6-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-1-0x00000000001B0000-0x0000000000728000-memory.dmpFilesize
5.5MB
-
memory/2392-2-0x00000000060B0000-0x0000000006624000-memory.dmpFilesize
5.5MB
-
memory/2392-3-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/2392-4-0x00000000060B0000-0x000000000661E000-memory.dmpFilesize
5.4MB
-
memory/4468-16946-0x0000000000400000-0x00000000004AC000-memory.dmpFilesize
688KB
-
memory/4532-19155-0x0000000000400000-0x00000000006BC000-memory.dmpFilesize
2.7MB
-
memory/7436-12042-0x00000000009D0000-0x00000000009D8000-memory.dmpFilesize
32KB
-
memory/7436-12041-0x000000001A350000-0x000000001A632000-memory.dmpFilesize
2.9MB
-
memory/7684-12046-0x0000000001000000-0x00000000012BC000-memory.dmpFilesize
2.7MB