Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-05-2022 07:30
Static task
static1
Behavioral task
behavioral1
Sample
3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe
Resource
win10v2004-20220414-en
General
-
Target
3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe
-
Size
217KB
-
MD5
28410510706c74c2ca6494f036ebbd94
-
SHA1
4068e6a8618dc47a08962f91121c7bedf51e2407
-
SHA256
3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7
-
SHA512
f429fcba47b03e96be57219ecf7ff1d435510600eae6772bfddc11354d357325aaa140b6db16c8c0bdbfa6a615ff72223ed332472b7c02c7a8754d342a2cf952
Malware Config
Extracted
revengerat
NyanCatRevenge
hpdndbnb.duckdns.org:2404
90a49aa7c27647e
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\Temp\\3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe\"" 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe -
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Turns off Windows Defender SpyNet reporting 2 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe -
Drops startup file 2 IoCs
Processes:
3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe -
Processes:
3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe = "0" 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe = "0" 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SpyNetReporting = "0" 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe" 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\<Unknown> = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe" 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
Processes:
3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exepid process 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exedescription pid process target process PID 2480 set thread context of 3052 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5116 2480 WerFault.exe 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1424 timeout.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exe3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exepid process 3600 powershell.exe 3896 powershell.exe 3444 powershell.exe 4304 powershell.exe 3600 powershell.exe 3444 powershell.exe 3896 powershell.exe 4304 powershell.exe 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe Token: SeDebugPrivilege 3600 powershell.exe Token: SeDebugPrivilege 3896 powershell.exe Token: SeDebugPrivilege 3444 powershell.exe Token: SeDebugPrivilege 4304 powershell.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exedescription pid process target process PID 2480 wrote to memory of 1424 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe timeout.exe PID 2480 wrote to memory of 1424 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe timeout.exe PID 2480 wrote to memory of 1424 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe timeout.exe PID 2480 wrote to memory of 3600 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe powershell.exe PID 2480 wrote to memory of 3600 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe powershell.exe PID 2480 wrote to memory of 3600 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe powershell.exe PID 2480 wrote to memory of 3896 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe powershell.exe PID 2480 wrote to memory of 3896 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe powershell.exe PID 2480 wrote to memory of 3896 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe powershell.exe PID 2480 wrote to memory of 3444 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe powershell.exe PID 2480 wrote to memory of 3444 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe powershell.exe PID 2480 wrote to memory of 3444 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe powershell.exe PID 2480 wrote to memory of 4304 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe powershell.exe PID 2480 wrote to memory of 4304 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe powershell.exe PID 2480 wrote to memory of 4304 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe powershell.exe PID 2480 wrote to memory of 3052 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe PID 2480 wrote to memory of 3052 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe PID 2480 wrote to memory of 3052 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe PID 2480 wrote to memory of 3052 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe PID 2480 wrote to memory of 3052 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe PID 2480 wrote to memory of 3052 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe PID 2480 wrote to memory of 3052 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe PID 2480 wrote to memory of 3052 2480 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe 3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe"C:\Users\Admin\AppData\Local\Temp\3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Drops startup file
- Windows security modification
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 482⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe"C:\Users\Admin\AppData\Local\Temp\3f62f75c0294381629c8cb14382a5ab1d27e83966014961a414cd9411abd27a7.exe"2⤵
- Checks processor information in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 22762⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2480 -ip 24801⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD5d273e3ca56549a8c9d5e3fd25edc1807
SHA14e69dbf4f5ccc903f741de2b3f31b2736133034a
SHA2565595c752a8f185e2f6d723fb38e0c2f8e6711bfda658ca54ece19266e8a14865
SHA5128aedbb3eda21938e23622bcdcd4fda061394c16cf0b239a96105c1f64e3498ae8150db4b6cf36bd9a7c3063a978fbc5b7995485357cac410516b46080088a916
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD5d273e3ca56549a8c9d5e3fd25edc1807
SHA14e69dbf4f5ccc903f741de2b3f31b2736133034a
SHA2565595c752a8f185e2f6d723fb38e0c2f8e6711bfda658ca54ece19266e8a14865
SHA5128aedbb3eda21938e23622bcdcd4fda061394c16cf0b239a96105c1f64e3498ae8150db4b6cf36bd9a7c3063a978fbc5b7995485357cac410516b46080088a916
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD51a13b8c6a80a7e881f34a2cf6e97055d
SHA1a199faf4a9386c4d2dada8f01714522a93456aac
SHA2569ed96f3e724c259bf215eb62fb67278de671fba7a6a4f6dbba53fe553b0c8ab7
SHA5125ace7c35dfa88875c9e207c876b7f5c6af6c5180fb07673532ffa95cb720b11dd0f7149fb987b65549d9f1a29157cff3e166702e41aac5bc74c3b51eb0fd2c15
-
memory/1424-132-0x0000000000000000-mapping.dmp
-
memory/2480-133-0x0000000005CF0000-0x0000000006294000-memory.dmpFilesize
5.6MB
-
memory/2480-131-0x0000000005360000-0x00000000053FC000-memory.dmpFilesize
624KB
-
memory/2480-130-0x0000000000A90000-0x0000000000ACA000-memory.dmpFilesize
232KB
-
memory/3052-144-0x0000000000000000-mapping.dmp
-
memory/3052-145-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/3444-146-0x0000000007640000-0x0000000007672000-memory.dmpFilesize
200KB
-
memory/3444-136-0x0000000000000000-mapping.dmp
-
memory/3444-150-0x000000006FA20000-0x000000006FA6C000-memory.dmpFilesize
304KB
-
memory/3600-137-0x00000000027D0000-0x0000000002806000-memory.dmpFilesize
216KB
-
memory/3600-143-0x00000000060C0000-0x00000000060DE000-memory.dmpFilesize
120KB
-
memory/3600-141-0x00000000059F0000-0x0000000005A56000-memory.dmpFilesize
408KB
-
memory/3600-142-0x0000000005B60000-0x0000000005BC6000-memory.dmpFilesize
408KB
-
memory/3600-140-0x00000000050F0000-0x0000000005112000-memory.dmpFilesize
136KB
-
memory/3600-134-0x0000000000000000-mapping.dmp
-
memory/3600-148-0x000000006FA20000-0x000000006FA6C000-memory.dmpFilesize
304KB
-
memory/3600-139-0x0000000005210000-0x0000000005838000-memory.dmpFilesize
6.2MB
-
memory/3600-153-0x00000000073D0000-0x00000000073EA000-memory.dmpFilesize
104KB
-
memory/3896-149-0x000000006FA20000-0x000000006FA6C000-memory.dmpFilesize
304KB
-
memory/3896-152-0x0000000007650000-0x0000000007CCA000-memory.dmpFilesize
6.5MB
-
memory/3896-154-0x0000000007080000-0x000000000708A000-memory.dmpFilesize
40KB
-
memory/3896-156-0x0000000007240000-0x000000000724E000-memory.dmpFilesize
56KB
-
memory/3896-135-0x0000000000000000-mapping.dmp
-
memory/4304-155-0x0000000007390000-0x0000000007426000-memory.dmpFilesize
600KB
-
memory/4304-157-0x0000000007450000-0x000000000746A000-memory.dmpFilesize
104KB
-
memory/4304-158-0x0000000007430000-0x0000000007438000-memory.dmpFilesize
32KB
-
memory/4304-147-0x000000006FA20000-0x000000006FA6C000-memory.dmpFilesize
304KB
-
memory/4304-151-0x00000000063C0000-0x00000000063DE000-memory.dmpFilesize
120KB
-
memory/4304-138-0x0000000000000000-mapping.dmp