Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2023 17:11
Static task
static1
Behavioral task
behavioral1
Sample
FB7392139A115FCF8E9F741D3187D5BDB682BE4F7BABC.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
FB7392139A115FCF8E9F741D3187D5BDB682BE4F7BABC.exe
Resource
win10v2004-20220812-en
General
-
Target
FB7392139A115FCF8E9F741D3187D5BDB682BE4F7BABC.exe
-
Size
21.6MB
-
MD5
6631fd90c648d10b65e4778010c7c2fb
-
SHA1
53d833a9b6238247ae63deb0bbaeb1264c3dbffc
-
SHA256
fb7392139a115fcf8e9f741d3187d5bdb682be4f7babc52e9fcd6bd6fc897c31
-
SHA512
f3765881e58ebbe6876c31600f6da115b9bfa2be1a5053a88e60e3a8e52cf38e2d629841a60e1e6ea7751aaef3f9e81ab38e8de3ff6ab473e748475cc3ab859e
-
SSDEEP
393216:tq5jjbBR1Ha+LAkVcPjvdgcKCqNSLIWURm/UHFo6FkhC:qBR1HDNOPJgcKCHhsHFDz
Malware Config
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Client.exe revengerat C:\Users\Admin\AppData\Local\Temp\Client.exe revengerat C:\Users\Admin\AppData\Roaming\Microsoft .Net Framework Servcies.exe revengerat C:\Users\Admin\AppData\Roaming\Microsoft .Net Framework Servcies.exe revengerat -
Executes dropped EXE 8 IoCs
Processes:
Client.exefix.exeSetup.exeSetup.exefix .exesvchost.exeexplorer.exeMicrosoft .Net Framework Servcies.exepid process 2112 Client.exe 4372 fix.exe 1552 Setup.exe 2260 Setup.exe 2960 fix .exe 3936 svchost.exe 4376 explorer.exe 2760 Microsoft .Net Framework Servcies.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Client.exeFB7392139A115FCF8E9F741D3187D5BDB682BE4F7BABC.exefix.exeSetup.exesvchost.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation FB7392139A115FCF8E9F741D3187D5BDB682BE4F7BABC.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation fix.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Setup.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation svchost.exe -
Drops startup file 1 IoCs
Processes:
Microsoft .Net Framework Servcies.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsSecurityHandler.lnk Microsoft .Net Framework Servcies.exe -
Loads dropped DLL 4 IoCs
Processes:
fix .exepid process 2960 fix .exe 2960 fix .exe 2960 fix .exe 2960 fix .exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
Setup.exesvchost.exeMicrosoft .Net Framework Servcies.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Intel Security Corporation = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\svchost.exe" Setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Explorer = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\explorer.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft .Net Framework Servcies = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft .Net Framework Servcies.exe" Microsoft .Net Framework Servcies.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Microsoft .Net Framework Servcies.exeClient.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 Microsoft .Net Framework Servcies.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Microsoft .Net Framework Servcies.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 Client.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Client.exe -
Modifies registry class 1 IoCs
Processes:
FB7392139A115FCF8E9F741D3187D5BDB682BE4F7BABC.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ FB7392139A115FCF8E9F741D3187D5BDB682BE4F7BABC.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
Client.exesvchost.exeexplorer.exefix .exeMicrosoft .Net Framework Servcies.exedescription pid process Token: SeDebugPrivilege 2112 Client.exe Token: SeDebugPrivilege 3936 svchost.exe Token: SeDebugPrivilege 4376 explorer.exe Token: SeDebugPrivilege 2960 fix .exe Token: SeDebugPrivilege 2760 Microsoft .Net Framework Servcies.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
FB7392139A115FCF8E9F741D3187D5BDB682BE4F7BABC.exefix.exeSetup.exesvchost.exeClient.exedescription pid process target process PID 3472 wrote to memory of 2112 3472 FB7392139A115FCF8E9F741D3187D5BDB682BE4F7BABC.exe Client.exe PID 3472 wrote to memory of 2112 3472 FB7392139A115FCF8E9F741D3187D5BDB682BE4F7BABC.exe Client.exe PID 3472 wrote to memory of 2112 3472 FB7392139A115FCF8E9F741D3187D5BDB682BE4F7BABC.exe Client.exe PID 3472 wrote to memory of 4372 3472 FB7392139A115FCF8E9F741D3187D5BDB682BE4F7BABC.exe fix.exe PID 3472 wrote to memory of 4372 3472 FB7392139A115FCF8E9F741D3187D5BDB682BE4F7BABC.exe fix.exe PID 4372 wrote to memory of 1552 4372 fix.exe Setup.exe PID 4372 wrote to memory of 1552 4372 fix.exe Setup.exe PID 4372 wrote to memory of 2260 4372 fix.exe Setup.exe PID 4372 wrote to memory of 2260 4372 fix.exe Setup.exe PID 4372 wrote to memory of 2960 4372 fix.exe fix .exe PID 4372 wrote to memory of 2960 4372 fix.exe fix .exe PID 1552 wrote to memory of 3936 1552 Setup.exe svchost.exe PID 1552 wrote to memory of 3936 1552 Setup.exe svchost.exe PID 3936 wrote to memory of 4376 3936 svchost.exe explorer.exe PID 3936 wrote to memory of 4376 3936 svchost.exe explorer.exe PID 2112 wrote to memory of 2760 2112 Client.exe Microsoft .Net Framework Servcies.exe PID 2112 wrote to memory of 2760 2112 Client.exe Microsoft .Net Framework Servcies.exe PID 2112 wrote to memory of 2760 2112 Client.exe Microsoft .Net Framework Servcies.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FB7392139A115FCF8E9F741D3187D5BDB682BE4F7BABC.exe"C:\Users\Admin\AppData\Local\Temp\FB7392139A115FCF8E9F741D3187D5BDB682BE4F7BABC.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft .Net Framework Servcies.exe"C:\Users\Admin\AppData\Roaming\Microsoft .Net Framework Servcies.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\fix.exe"C:\Users\Admin\AppData\Local\Temp\fix.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\fix .exe"C:\Users\Admin\AppData\Local\Temp\fix .exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\Setup.exe.logFilesize
408B
MD58e1e19a5abcce21f8a12921d6a2eeeee
SHA1b5704368dfd8fc7aeafb15c23b69895e809fe20e
SHA25622cf24d10cc11a9bb23268f18afbc8f3481c27e1feb4cb42ba5c8775e12720e3
SHA51248365f858592d677ef5d0e2948f672234898e47a153eec32592a2e079353702a64e41e1aa59250f05bd690690b9edfb8455dfac90c6695fb7c0b6907a057fe78
-
C:\Users\Admin\AppData\Local\Temp\Client.exeFilesize
144KB
MD53c99042b54fb74e45b1c2f9bec86321b
SHA19c91ae20f4214122819659cd3f0ea46d4ea8699c
SHA2564fc5d7b78bb2a049986044f87441ade0f0d09485cc508489bf1d484b2c7da695
SHA51296b490b45fe228c0f0f18192a58f29bcef69afc0fd940544db1c0e849cffecf6091a1cfb1c8412a751deb5b3a67564d56afe3f72d4eee2678363ce84b2e58457
-
C:\Users\Admin\AppData\Local\Temp\Client.exeFilesize
144KB
MD53c99042b54fb74e45b1c2f9bec86321b
SHA19c91ae20f4214122819659cd3f0ea46d4ea8699c
SHA2564fc5d7b78bb2a049986044f87441ade0f0d09485cc508489bf1d484b2c7da695
SHA51296b490b45fe228c0f0f18192a58f29bcef69afc0fd940544db1c0e849cffecf6091a1cfb1c8412a751deb5b3a67564d56afe3f72d4eee2678363ce84b2e58457
-
C:\Users\Admin\AppData\Local\Temp\Setup.exeFilesize
356KB
MD5fa0b327abd82686bb9d676a30fa89b46
SHA1a5521f5e8e500f67b183542ffad65b83ebcb186f
SHA256d01728070486e1abbf024db0eeeacf232e02fe326c4c0b762af73f728fc9392d
SHA512ead84a6cbe44be5cb213154cf11f8cbe7cc992563549201500f11cf770e3b57b02da027fc982b436f8eebbfa60088f4dad8e10de1086dbb5781b2b3da004790d
-
C:\Users\Admin\AppData\Local\Temp\Setup.exeFilesize
356KB
MD5fa0b327abd82686bb9d676a30fa89b46
SHA1a5521f5e8e500f67b183542ffad65b83ebcb186f
SHA256d01728070486e1abbf024db0eeeacf232e02fe326c4c0b762af73f728fc9392d
SHA512ead84a6cbe44be5cb213154cf11f8cbe7cc992563549201500f11cf770e3b57b02da027fc982b436f8eebbfa60088f4dad8e10de1086dbb5781b2b3da004790d
-
C:\Users\Admin\AppData\Local\Temp\Setup.exeFilesize
356KB
MD5fa0b327abd82686bb9d676a30fa89b46
SHA1a5521f5e8e500f67b183542ffad65b83ebcb186f
SHA256d01728070486e1abbf024db0eeeacf232e02fe326c4c0b762af73f728fc9392d
SHA512ead84a6cbe44be5cb213154cf11f8cbe7cc992563549201500f11cf770e3b57b02da027fc982b436f8eebbfa60088f4dad8e10de1086dbb5781b2b3da004790d
-
C:\Users\Admin\AppData\Local\Temp\evb111.tmpFilesize
1KB
MD5dd366a1aa8ff08588a4e2bcb45d457ef
SHA1b95e345b10380b61937c90a2bc7a10384882628c
SHA256ea362d6ebb9d153a4809ab732faa7c57b6e768574b64a78ea059c613fcf9a462
SHA512423684f89c971146e270412007776803588e6439dc717941c4f98db1fc5cfabf857812973fa02fc552d9593b2ec9fafa15f1335185b88e96e0de5a74d30f4ca2
-
C:\Users\Admin\AppData\Local\Temp\evb363.tmpFilesize
1KB
MD555d3b3303dad8fcaa598bc68232e554c
SHA1b4cd7e5592ec48e5cd24b060c463e56324e17d92
SHA2565040e7905ccda365b759e8ec047c2424312714a69754f6e2d968a5e1be7498f9
SHA512ccaf6163ffe64ca9d5495d0e631236fcf2e248b88d29b5b97abcad0310d7bc33709d58750592052d334252eb03fbe9c70ea894071507a66c46bba33b7359d5b5
-
C:\Users\Admin\AppData\Local\Temp\evb3A3.tmpFilesize
1KB
MD555d3b3303dad8fcaa598bc68232e554c
SHA1b4cd7e5592ec48e5cd24b060c463e56324e17d92
SHA2565040e7905ccda365b759e8ec047c2424312714a69754f6e2d968a5e1be7498f9
SHA512ccaf6163ffe64ca9d5495d0e631236fcf2e248b88d29b5b97abcad0310d7bc33709d58750592052d334252eb03fbe9c70ea894071507a66c46bba33b7359d5b5
-
C:\Users\Admin\AppData\Local\Temp\evbD1.tmpFilesize
1KB
MD5dd366a1aa8ff08588a4e2bcb45d457ef
SHA1b95e345b10380b61937c90a2bc7a10384882628c
SHA256ea362d6ebb9d153a4809ab732faa7c57b6e768574b64a78ea059c613fcf9a462
SHA512423684f89c971146e270412007776803588e6439dc717941c4f98db1fc5cfabf857812973fa02fc552d9593b2ec9fafa15f1335185b88e96e0de5a74d30f4ca2
-
C:\Users\Admin\AppData\Local\Temp\fix .exeFilesize
26.9MB
MD520f0d5f26ccc128b8dc82a9cfb248df4
SHA11fbcdd3ac02351998393b61f2ce8e63fc1e7e59e
SHA2563640ce892fd1b03f75074d471cabffd9fe49dd26445db4c5b1f976de91c6a0c0
SHA512ddbaf0d4a0074c6636cef41944c9a034dd0fd6a5aa89efbfa7395d9146dd94646f28e81596e5135ebbed6bbcc0fccc6a09575837809017d252de7c241c9e0035
-
C:\Users\Admin\AppData\Local\Temp\fix .exeFilesize
26.9MB
MD520f0d5f26ccc128b8dc82a9cfb248df4
SHA11fbcdd3ac02351998393b61f2ce8e63fc1e7e59e
SHA2563640ce892fd1b03f75074d471cabffd9fe49dd26445db4c5b1f976de91c6a0c0
SHA512ddbaf0d4a0074c6636cef41944c9a034dd0fd6a5aa89efbfa7395d9146dd94646f28e81596e5135ebbed6bbcc0fccc6a09575837809017d252de7c241c9e0035
-
C:\Users\Admin\AppData\Local\Temp\fix.exeFilesize
27.2MB
MD55ef560b9b48b65bb06fcc33f3396b60e
SHA16a41c446b22a59571423f24626b1165a9cf07154
SHA256cd228faec86ed22a4c06d9ab3d7db74a8a440190b2ec001c81a42d99ded15644
SHA5126cc6375b1abc7404854c9d5fefd942c37a9a9fefb659d8100a82b6e0fceca08f2d2aea3bfb3fc4f355fc02e7dd84989f556b4a945ffee9ca451f0d8d0e2c4ccc
-
C:\Users\Admin\AppData\Local\Temp\fix.exeFilesize
27.2MB
MD55ef560b9b48b65bb06fcc33f3396b60e
SHA16a41c446b22a59571423f24626b1165a9cf07154
SHA256cd228faec86ed22a4c06d9ab3d7db74a8a440190b2ec001c81a42d99ded15644
SHA5126cc6375b1abc7404854c9d5fefd942c37a9a9fefb659d8100a82b6e0fceca08f2d2aea3bfb3fc4f355fc02e7dd84989f556b4a945ffee9ca451f0d8d0e2c4ccc
-
C:\Users\Admin\AppData\Roaming\Microsoft .Net Framework Servcies.exeFilesize
144KB
MD53c99042b54fb74e45b1c2f9bec86321b
SHA19c91ae20f4214122819659cd3f0ea46d4ea8699c
SHA2564fc5d7b78bb2a049986044f87441ade0f0d09485cc508489bf1d484b2c7da695
SHA51296b490b45fe228c0f0f18192a58f29bcef69afc0fd940544db1c0e849cffecf6091a1cfb1c8412a751deb5b3a67564d56afe3f72d4eee2678363ce84b2e58457
-
C:\Users\Admin\AppData\Roaming\Microsoft .Net Framework Servcies.exeFilesize
144KB
MD53c99042b54fb74e45b1c2f9bec86321b
SHA19c91ae20f4214122819659cd3f0ea46d4ea8699c
SHA2564fc5d7b78bb2a049986044f87441ade0f0d09485cc508489bf1d484b2c7da695
SHA51296b490b45fe228c0f0f18192a58f29bcef69afc0fd940544db1c0e849cffecf6091a1cfb1c8412a751deb5b3a67564d56afe3f72d4eee2678363ce84b2e58457
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exeFilesize
63KB
MD5d298454882caac154fc9217fc7e90499
SHA111970a2f8b9d1153fbc7fe925a846bd95e07e96f
SHA256badaa2312457f3d08ca1f72287989456f9e62d6b417af6fb9b5e39ca1e8c8100
SHA512e28a4d7c827b5c816503ddba4fee0bc82b16a0acb2eed9c81b20bb1b043d69b89cd3a1cf2beafb27a2471b6172f707d53e3c90568636b0c65e484e051dfde86f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exeFilesize
63KB
MD5d298454882caac154fc9217fc7e90499
SHA111970a2f8b9d1153fbc7fe925a846bd95e07e96f
SHA256badaa2312457f3d08ca1f72287989456f9e62d6b417af6fb9b5e39ca1e8c8100
SHA512e28a4d7c827b5c816503ddba4fee0bc82b16a0acb2eed9c81b20bb1b043d69b89cd3a1cf2beafb27a2471b6172f707d53e3c90568636b0c65e484e051dfde86f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exeFilesize
256KB
MD5c4e4407b5fcf49586ddd5d5573ae4b95
SHA10f60aaaaac09d4f9273207114fcc78c0bfb250eb
SHA2568f1e6eb0269fbe449678ce4863d494fda78bc648f27ad1c129270575efce4f7a
SHA51295a89aae7f135b3355f2f0f751607742d8dfa5dfb04bf86cad0fff99d6c687a18a2f0be30d92a79d004cba49823c73f0208f40bb5e9cff3b26f72d1fe5f3d47b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exeFilesize
256KB
MD5c4e4407b5fcf49586ddd5d5573ae4b95
SHA10f60aaaaac09d4f9273207114fcc78c0bfb250eb
SHA2568f1e6eb0269fbe449678ce4863d494fda78bc648f27ad1c129270575efce4f7a
SHA51295a89aae7f135b3355f2f0f751607742d8dfa5dfb04bf86cad0fff99d6c687a18a2f0be30d92a79d004cba49823c73f0208f40bb5e9cff3b26f72d1fe5f3d47b
-
memory/1552-144-0x00007FFC1BE60000-0x00007FFC1C896000-memory.dmpFilesize
10.2MB
-
memory/1552-141-0x0000000000000000-mapping.dmp
-
memory/2112-192-0x00000000725A0000-0x0000000072B51000-memory.dmpFilesize
5.7MB
-
memory/2112-160-0x00000000725A0000-0x0000000072B51000-memory.dmpFilesize
5.7MB
-
memory/2112-139-0x00000000725A0000-0x0000000072B51000-memory.dmpFilesize
5.7MB
-
memory/2112-133-0x0000000000000000-mapping.dmp
-
memory/2260-147-0x00007FFC1BE60000-0x00007FFC1C896000-memory.dmpFilesize
10.2MB
-
memory/2260-145-0x0000000000000000-mapping.dmp
-
memory/2760-189-0x0000000000000000-mapping.dmp
-
memory/2760-193-0x00000000725A0000-0x0000000072B51000-memory.dmpFilesize
5.7MB
-
memory/2760-194-0x00000000725A0000-0x0000000072B51000-memory.dmpFilesize
5.7MB
-
memory/2960-163-0x0000000001070000-0x0000000001078000-memory.dmpFilesize
32KB
-
memory/2960-179-0x00007FFC1B330000-0x00007FFC1BDF1000-memory.dmpFilesize
10.8MB
-
memory/2960-148-0x0000000000000000-mapping.dmp
-
memory/2960-164-0x000000001E320000-0x000000001E3DA000-memory.dmpFilesize
744KB
-
memory/2960-166-0x0000000003B90000-0x0000000003BB8000-memory.dmpFilesize
160KB
-
memory/2960-162-0x000000001E1D0000-0x000000001E20E000-memory.dmpFilesize
248KB
-
memory/2960-151-0x0000000000400000-0x000000000076A000-memory.dmpFilesize
3.4MB
-
memory/2960-170-0x0000000020920000-0x00000000210F8000-memory.dmpFilesize
7.8MB
-
memory/2960-171-0x0000000003BD0000-0x0000000003C08000-memory.dmpFilesize
224KB
-
memory/2960-172-0x0000000001090000-0x000000000109E000-memory.dmpFilesize
56KB
-
memory/2960-173-0x0000000020480000-0x00000000205B6000-memory.dmpFilesize
1.2MB
-
memory/2960-175-0x0000000180000000-0x0000000180014000-memory.dmpFilesize
80KB
-
memory/2960-161-0x000000001E5D0000-0x000000001E93A000-memory.dmpFilesize
3.4MB
-
memory/2960-159-0x00007FFC1B330000-0x00007FFC1BDF1000-memory.dmpFilesize
10.8MB
-
memory/2960-178-0x0000000000400000-0x0000000000808000-memory.dmpFilesize
4.0MB
-
memory/2960-153-0x0000000000400000-0x0000000000808000-memory.dmpFilesize
4.0MB
-
memory/2960-182-0x0000000180000000-0x0000000180014000-memory.dmpFilesize
80KB
-
memory/2960-184-0x000000001E260000-0x000000001E284000-memory.dmpFilesize
144KB
-
memory/2960-188-0x000000002C6D0000-0x000000002C746000-memory.dmpFilesize
472KB
-
memory/2960-181-0x0000000180002000-0x0000000180022000-memory.dmpFilesize
128KB
-
memory/2960-154-0x00007FFBBB8B0000-0x00007FFBBB8C0000-memory.dmpFilesize
64KB
-
memory/2960-185-0x0000000180000000-0x0000000180024000-memory.dmpFilesize
144KB
-
memory/2960-186-0x000000001E4F0000-0x000000001E4F8000-memory.dmpFilesize
32KB
-
memory/2960-187-0x0000000180000000-0x0000000180024000-memory.dmpFilesize
144KB
-
memory/3472-132-0x0000000000400000-0x0000000001990000-memory.dmpFilesize
21.6MB
-
memory/3936-158-0x00007FFC1BE60000-0x00007FFC1C896000-memory.dmpFilesize
10.2MB
-
memory/3936-152-0x0000000000000000-mapping.dmp
-
memory/4372-140-0x00007FFC1BE60000-0x00007FFC1C896000-memory.dmpFilesize
10.2MB
-
memory/4372-136-0x0000000000000000-mapping.dmp
-
memory/4376-169-0x00007FFC1BE60000-0x00007FFC1C896000-memory.dmpFilesize
10.2MB
-
memory/4376-165-0x0000000000000000-mapping.dmp