Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10_x64 -
resource
win10 -
submitted
23-10-2020 10:24
Static task
static1
Behavioral task
behavioral1
Sample
Vidoe001mp4.scr signed FAT11 d.o.o.exe
Resource
win7v200722
General
-
Target
Vidoe001mp4.scr signed FAT11 d.o.o.exe
-
Size
1.2MB
-
MD5
0d0c318096299a617f70ea57559c4f55
-
SHA1
8199b12cc24d416cb8835b5e3d00b92339ad9b45
-
SHA256
73feac20d7cdbe1e10ca26b196d60d68ea0c4e652ceacf534b1c549e4e597e74
-
SHA512
b6cfc8df9556683cf4cbef46aa208081853d4132cee94fbcd0a6d9ee2ded5d6dd5987578093eae98c595776b51104613c5bc2e6e42bb543c2c59c2eafa012751
Malware Config
Extracted
remcos
108.174.197.5:5050
Signatures
-
Executes dropped EXE 6 IoCs
Processes:
cmd.exeGetX64BTIT.exe2053331618.exesJifmQn.execmd.exeremcos.exepid process 2756 cmd.exe 4032 GetX64BTIT.exe 3792 2053331618.exe 1188 sJifmQn.exe 784 cmd.exe 2864 remcos.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 2756 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
sJifmQn.exeremcos.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\ sJifmQn.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\Remcos\\remcos.exe\"" sJifmQn.exe Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\ remcos.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\Remcos\\remcos.exe\"" remcos.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 17 api.ipify.org 16 api.ipify.org -
Drops file in Windows directory 1 IoCs
Processes:
cmd.exedescription ioc process File created C:\Windows\Tasks\reg.job cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 1148 ipconfig.exe -
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\IntelliForms\Storage2 cmd.exe -
Modifies registry class 1 IoCs
Processes:
sJifmQn.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000_Classes\Local Settings sJifmQn.exe -
Suspicious behavior: EnumeratesProcesses 6892 IoCs
Processes:
Vidoe001mp4.scr signed FAT11 d.o.o.exeipconfig.execmd.exepid process 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe 1148 ipconfig.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe 2756 cmd.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
ipconfig.exepid process 1148 ipconfig.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
cmd.exeremcos.exepid process 2756 cmd.exe 2864 remcos.exe -
Suspicious use of WriteProcessMemory 175 IoCs
Processes:
Vidoe001mp4.scr signed FAT11 d.o.o.exedescription pid process target process PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe PID 3920 wrote to memory of 1148 3920 Vidoe001mp4.scr signed FAT11 d.o.o.exe ipconfig.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Vidoe001mp4.scr signed FAT11 d.o.o.exe"C:\Users\Admin\AppData\Local\Temp\Vidoe001mp4.scr signed FAT11 d.o.o.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe"2⤵
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\cmd.exe"C:\Users\Admin\AppData\Local\Temp\cmd.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"4⤵
- Executes dropped EXE
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\{40BA515E-68FB-42F4-9B0C-74D7328C625B}\2053331618.exe"2053331618.exe"4⤵
- Executes dropped EXE
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\{40BA515E-68FB-42F4-9B0C-74D7328C625B}\sJifmQn.exe"C:\Users\Admin\AppData\Local\Temp\{40BA515E-68FB-42F4-9B0C-74D7328C625B}\sJifmQn.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:1188 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"5⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\cmd.exe"C:\Users\Admin\AppData\Local\Temp\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe"6⤵
- Executes dropped EXE
PID:784 -
C:\Users\Admin\AppData\Roaming\Remcos\remcos.exeC:\Users\Admin\AppData\Roaming\Remcos\remcos.exe7⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:2864
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exeMD5
b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exeMD5
b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
C:\Users\Admin\AppData\Local\Temp\cmd.exeMD5
50b930137463b14f73186c7c6767a2aa
SHA1574f512a44097275658f9c304ef0b74029e9ea46
SHA256eb51a0c96f7de6ce8bb0386429fff83bf95cb23fa61efe499b416f1cb0fc71c9
SHA5127f09ca777189d95d7ca0665a29c800a5228a93437b1067d7276e05d6da07bc6adc9644f545dc35ea0267dd8e7e312b414c9a613001e4f1d600bb481d4cbff872
-
C:\Users\Admin\AppData\Local\Temp\cmd.exeMD5
50b930137463b14f73186c7c6767a2aa
SHA1574f512a44097275658f9c304ef0b74029e9ea46
SHA256eb51a0c96f7de6ce8bb0386429fff83bf95cb23fa61efe499b416f1cb0fc71c9
SHA5127f09ca777189d95d7ca0665a29c800a5228a93437b1067d7276e05d6da07bc6adc9644f545dc35ea0267dd8e7e312b414c9a613001e4f1d600bb481d4cbff872
-
C:\Users\Admin\AppData\Local\Temp\cmd.exeMD5
50b930137463b14f73186c7c6767a2aa
SHA1574f512a44097275658f9c304ef0b74029e9ea46
SHA256eb51a0c96f7de6ce8bb0386429fff83bf95cb23fa61efe499b416f1cb0fc71c9
SHA5127f09ca777189d95d7ca0665a29c800a5228a93437b1067d7276e05d6da07bc6adc9644f545dc35ea0267dd8e7e312b414c9a613001e4f1d600bb481d4cbff872
-
C:\Users\Admin\AppData\Local\Temp\install.vbsMD5
b92d64fe5b1d1f59df4b738262aea8df
SHA1c8fb1981759c2d9bb2ec91b705985fba5fc7af63
SHA256fa20e9aab03dc8e9f1910aaf0cf42662379fa16ae3a22642084fb97fa3d4f83a
SHA5122566248b93c0cfb0414f033b8dd18bbd4f88180093eac2861107289bcb4ee160f9593706ff1f7d1f2e4ecea430d67a5a2897551a4f9ebd82b707243e300520e2
-
C:\Users\Admin\AppData\Local\Temp\x64btit.txtMD5
039e8e14af27d9aeb4fec5da10f845cf
SHA1da49507a82b0fcae40a18cf9fb6a51b480b79a42
SHA256931bc5e71b050de0a5ce92d1b054c1ba1b66abebeb1df1c780adf91e1a59d232
SHA5124e173054f936dd336cd912b816af6d9a953b498f36329d161af0874e242631af4318d2bcaf4c88577481c766902862088465bf74318a4de8dc6fc5229e87cfc6
-
C:\Users\Admin\AppData\Local\Temp\{40BA515E-68FB-42F4-9B0C-74D7328C625B}\2053331618.exeMD5
9f385a9a69a4d9e18055743f0694976b
SHA12c2385ea964a33f803e96e364d4a05771c733921
SHA25645f175bc165a3f8d9a05da48bdc4c1f234386588e0d003df094f72d019ae6216
SHA512e9e78eb02bad22815648723138a7443da527779644ad9f9e776f91ba796b255c7556c5fe82ea526825c23ea376ed90d4dd5f31b026d2ff00605d8db9b0729c3c
-
C:\Users\Admin\AppData\Local\Temp\{40BA515E-68FB-42F4-9B0C-74D7328C625B}\2053331618.exeMD5
9f385a9a69a4d9e18055743f0694976b
SHA12c2385ea964a33f803e96e364d4a05771c733921
SHA25645f175bc165a3f8d9a05da48bdc4c1f234386588e0d003df094f72d019ae6216
SHA512e9e78eb02bad22815648723138a7443da527779644ad9f9e776f91ba796b255c7556c5fe82ea526825c23ea376ed90d4dd5f31b026d2ff00605d8db9b0729c3c
-
C:\Users\Admin\AppData\Local\Temp\{40BA515E-68FB-42F4-9B0C-74D7328C625B}\sJifmQn.exeMD5
454fd4d559cd0f7f9939fad9044489f6
SHA19495fcfd817ca8871d8a0bef318ded1e0398ad81
SHA2563e8b9218058a61526cb70c888b84984819d593b00fb89d56947ce81657dc62a7
SHA5127a37f3749744f978c7c3d385f9349a1593ce6db839085f6f5110cafa0406ea0170bb321eb625b73828a0285d38cab732fe9c4466169ea9939094ad0570af1d23
-
C:\Users\Admin\AppData\Local\Temp\{40BA515E-68FB-42F4-9B0C-74D7328C625B}\sJifmQn.exeMD5
454fd4d559cd0f7f9939fad9044489f6
SHA19495fcfd817ca8871d8a0bef318ded1e0398ad81
SHA2563e8b9218058a61526cb70c888b84984819d593b00fb89d56947ce81657dc62a7
SHA5127a37f3749744f978c7c3d385f9349a1593ce6db839085f6f5110cafa0406ea0170bb321eb625b73828a0285d38cab732fe9c4466169ea9939094ad0570af1d23
-
C:\Users\Admin\AppData\Roaming\Remcos\remcos.exeMD5
454fd4d559cd0f7f9939fad9044489f6
SHA19495fcfd817ca8871d8a0bef318ded1e0398ad81
SHA2563e8b9218058a61526cb70c888b84984819d593b00fb89d56947ce81657dc62a7
SHA5127a37f3749744f978c7c3d385f9349a1593ce6db839085f6f5110cafa0406ea0170bb321eb625b73828a0285d38cab732fe9c4466169ea9939094ad0570af1d23
-
C:\Users\Admin\AppData\Roaming\Remcos\remcos.exeMD5
454fd4d559cd0f7f9939fad9044489f6
SHA19495fcfd817ca8871d8a0bef318ded1e0398ad81
SHA2563e8b9218058a61526cb70c888b84984819d593b00fb89d56947ce81657dc62a7
SHA5127a37f3749744f978c7c3d385f9349a1593ce6db839085f6f5110cafa0406ea0170bb321eb625b73828a0285d38cab732fe9c4466169ea9939094ad0570af1d23
-
\Users\Admin\AppData\Local\Temp\{40BA515E-68FB-42F4-9B0C-74D7328C625B}\264992817.dllMD5
62cdc3a40d41de66201353fca4a24feb
SHA146ac41a725f669b0ca0a8fed7f3ccb6c190594f1
SHA2566eb970a56420a3a3b101661ec5cdda5952cef5887f45a837d4a10db51930935c
SHA512c046c9035ea542fed3789bc6c92712d4d59f32b7527df9cd53297cb8aab9bfc22a0666b590bbeb955fa2a3858d0d43588b76433796cc4d121bb07298c95dbd6f
-
memory/784-20-0x0000000000000000-mapping.dmp
-
memory/1148-0-0x0000000000000000-mapping.dmp
-
memory/1148-2-0x0000000006710000-0x00000000067AF000-memory.dmpFilesize
636KB
-
memory/1148-1-0x00000000060B0000-0x0000000006132000-memory.dmpFilesize
520KB
-
memory/1188-14-0x0000000000000000-mapping.dmp
-
memory/2152-17-0x0000000000000000-mapping.dmp
-
memory/2756-3-0x0000000000000000-mapping.dmp
-
memory/2756-5-0x0000000000400000-0x000000000049F000-memory.dmpFilesize
636KB
-
memory/2864-22-0x0000000000000000-mapping.dmp
-
memory/3792-11-0x0000000000000000-mapping.dmp
-
memory/4032-6-0x0000000000000000-mapping.dmp