Analysis

  • max time kernel
    149s
  • max time network
    191s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    05-06-2021 01:41

General

  • Target

    SecuriteInfo.com.Variant.Razy.840898.18291.31573.exe

  • Size

    1.1MB

  • MD5

    6ec0ed2ba12675538c2409d012cc3ef3

  • SHA1

    2afa7867e614d5afabe43e6a6c33dc4c5a40d720

  • SHA256

    dc1f93435a858fed72eee637cb23ad024ba309ec030dfa53f2495cb16776ccfd

  • SHA512

    0680e43680abbd95e4f44fa1bc0222a9e84fc32b1886755939cbab7d4c4fd1d50ea35ba439409c14b99eda026015b6a1fa1218e8600cc7895d83676382e15137

Malware Config

Extracted

Family

remcos

Version

1.7 Pro

Botnet

HostUniversal

C2

bressonseencrounder.mangospot.net:1984

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    remcos.exe

  • copy_folder

    remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    Office

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    revsr_bwssxphqkv

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

Extracted

Family

warzonerat

C2

seencroundercontroller.webredirect.org:1894

Extracted

Family

nanocore

Version

1.2.2.0

C2

multipleentry90dayscontroller.homingbeacon.net:54980

universalchampionis.zapto.org:54980

Mutex

44548f7d-2f32-414e-b70b-1138f528266a

Attributes
  • activate_away_mode

    true

  • backup_connection_host

    universalchampionis.zapto.org

  • backup_dns_server

    8.8.4.4

  • buffer_size

    65535

  • build_time

    2021-03-09T23:47:26.614623836Z

  • bypass_user_account_control

    true

  • bypass_user_account_control_data

  • clear_access_control

    true

  • clear_zone_identifier

    false

  • connect_delay

    4000

  • connection_port

    54980

  • default_group

    Basi@Manager

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    44548f7d-2f32-414e-b70b-1138f528266a

  • mutex_timeout

    5000

  • prevent_system_sleep

    false

  • primary_connection_host

    multipleentry90dayscontroller.homingbeacon.net

  • primary_dns_server

    8.8.8.8

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    true

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT Payload 4 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Razy.840898.18291.31573.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Razy.840898.18291.31573.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxxx.exe,"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:760
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxxx.exe,"
        3⤵
        • Modifies WinLogon for persistence
        PID:1096
    • C:\Users\Admin\AppData\Local\notepadnote\firefox.exe
      "C:\Users\Admin\AppData\Local\notepadnote\firefox.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:564
    • C:\Windows\firefox\Outlook w.exe
      "C:\Windows\firefox\Outlook w.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1840
    • C:\Users\Admin\AppData\Local\skype\skype n.exe
      "C:\Users\Admin\AppData\Local\skype\skype n.exe"
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:1516
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxxx.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxxx.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:316
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxxx.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxxx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1568
      • C:\Users\Admin\AppData\Local\Temp\firefoxxxx.exe
        "C:\Users\Admin\AppData\Local\Temp\firefoxxxx.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:468
        • C:\Users\Admin\AppData\Local\Temp\firefoxxxx.exe
          "C:\Users\Admin\AppData\Local\Temp\firefoxxxx.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1132

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\firefoxxxx.exe

    MD5

    0e362e7005823d0bec3719b902ed6d62

    SHA1

    590d860b909804349e0cdc2f1662b37bd62f7463

    SHA256

    2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

    SHA512

    518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

  • C:\Users\Admin\AppData\Local\Temp\firefoxxxx.exe

    MD5

    0e362e7005823d0bec3719b902ed6d62

    SHA1

    590d860b909804349e0cdc2f1662b37bd62f7463

    SHA256

    2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

    SHA512

    518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

  • C:\Users\Admin\AppData\Local\Temp\firefoxxxx.exe

    MD5

    0e362e7005823d0bec3719b902ed6d62

    SHA1

    590d860b909804349e0cdc2f1662b37bd62f7463

    SHA256

    2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

    SHA512

    518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

  • C:\Users\Admin\AppData\Local\Temp\firefoxxxx.txt

    MD5

    ee23f46dc5a40233c74db1260a30905e

    SHA1

    903b9b6642a0696f86cd8c574f8e38bd12e80018

    SHA256

    a93d79f6c641cd7165df0e14a7f3d3db8d74c8e55d5c50fe94211116123252fa

    SHA512

    f3c4048660fb681025ca5a8fe234b7125c6f66e18ed6d07099a8aaff7233b230fc368a911ca3d5136e463a4f4e9ae4513b32837206cdbde1a4b64b52f75367ed

  • C:\Users\Admin\AppData\Local\Temp\firefoxxxx.txt

    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • C:\Users\Admin\AppData\Local\Temp\firefoxxxx.txt

    MD5

    79e3ac04695d73adc03250bd25253dcb

    SHA1

    fbc5dd7544ce6944faa40b1142f0cd2956aea7c6

    SHA256

    dd604c1e43881f87d07d2a2c490c46e9e6b5d40ea246a17887018e54226b8529

    SHA512

    2f19a9ad01c6b25ca8e86c7c231ce4fe85ec698a2769d0563a88aedcc5d2e95a5025c3a7c8ad7fd337f74c3965bf847d373a0a724428d98213ea0b328c4c75e3

  • C:\Users\Admin\AppData\Local\notepadnote\firefox.exe

    MD5

    aeb7a2e7337a13a908467c3bed338793

    SHA1

    6bd27610a281b5e6d2b68e3fcce4d5430d11df9d

    SHA256

    820e12af8f79fb8a108b80eea3bcf26dcc5d31c2c79072ee3cfceba1b22e355f

    SHA512

    8770e6c6059761a1be3af01fbecbc8668f5471bc74f6dd05838aebb7380a4725db50a4309d2ca8fee1a08ebb6876a6d71ddb3a48a24e6623b047c759288337e7

  • C:\Users\Admin\AppData\Local\skype\skype n.exe

    MD5

    1297bfced52ab967d26578f733c0fc27

    SHA1

    0267ac0ceefbbf81d6411c17e886f98a7e9fb04d

    SHA256

    acc69ae8822c6facb03542af4fcca5588408b41d351f7bc7988d462a7f8c60d2

    SHA512

    beb4047e1792dd2be37d4e4e76cb1e14e36ed6aceb8452acc8d9da48d430539072c9d14d7afb55772e96ed9215d6643285de20637c97136acc2598c702f97a82

  • C:\Users\Admin\AppData\Local\skype\skype n.exe

    MD5

    1297bfced52ab967d26578f733c0fc27

    SHA1

    0267ac0ceefbbf81d6411c17e886f98a7e9fb04d

    SHA256

    acc69ae8822c6facb03542af4fcca5588408b41d351f7bc7988d462a7f8c60d2

    SHA512

    beb4047e1792dd2be37d4e4e76cb1e14e36ed6aceb8452acc8d9da48d430539072c9d14d7afb55772e96ed9215d6643285de20637c97136acc2598c702f97a82

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxxx.exe

    MD5

    6ec0ed2ba12675538c2409d012cc3ef3

    SHA1

    2afa7867e614d5afabe43e6a6c33dc4c5a40d720

    SHA256

    dc1f93435a858fed72eee637cb23ad024ba309ec030dfa53f2495cb16776ccfd

    SHA512

    0680e43680abbd95e4f44fa1bc0222a9e84fc32b1886755939cbab7d4c4fd1d50ea35ba439409c14b99eda026015b6a1fa1218e8600cc7895d83676382e15137

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxxx.exe

    MD5

    6ec0ed2ba12675538c2409d012cc3ef3

    SHA1

    2afa7867e614d5afabe43e6a6c33dc4c5a40d720

    SHA256

    dc1f93435a858fed72eee637cb23ad024ba309ec030dfa53f2495cb16776ccfd

    SHA512

    0680e43680abbd95e4f44fa1bc0222a9e84fc32b1886755939cbab7d4c4fd1d50ea35ba439409c14b99eda026015b6a1fa1218e8600cc7895d83676382e15137

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxxx.exe

    MD5

    6ec0ed2ba12675538c2409d012cc3ef3

    SHA1

    2afa7867e614d5afabe43e6a6c33dc4c5a40d720

    SHA256

    dc1f93435a858fed72eee637cb23ad024ba309ec030dfa53f2495cb16776ccfd

    SHA512

    0680e43680abbd95e4f44fa1bc0222a9e84fc32b1886755939cbab7d4c4fd1d50ea35ba439409c14b99eda026015b6a1fa1218e8600cc7895d83676382e15137

  • C:\Windows\firefox\Outlook w.exe

    MD5

    e46ec8afa834fa878bd2476fa357ed4f

    SHA1

    87d9cbed84df8f33167a0250f4f7f9e1e3c02fa0

    SHA256

    2b21124d1683a0732c14190ec17c0aba4d33e3e00567607d8f7b7ed9754305b5

    SHA512

    852675255511626b5d63b7b2c1115c710a27eab30d9e0f23edd4d44c471b08bcd01a95799e7f3bd89ff0afc976af52771cda58ccbd6b438788c9095d476637b9

  • C:\Windows\firefox\Outlook w.exe

    MD5

    e46ec8afa834fa878bd2476fa357ed4f

    SHA1

    87d9cbed84df8f33167a0250f4f7f9e1e3c02fa0

    SHA256

    2b21124d1683a0732c14190ec17c0aba4d33e3e00567607d8f7b7ed9754305b5

    SHA512

    852675255511626b5d63b7b2c1115c710a27eab30d9e0f23edd4d44c471b08bcd01a95799e7f3bd89ff0afc976af52771cda58ccbd6b438788c9095d476637b9

  • \Users\Admin\AppData\Local\Temp\firefoxxxx.exe

    MD5

    0e362e7005823d0bec3719b902ed6d62

    SHA1

    590d860b909804349e0cdc2f1662b37bd62f7463

    SHA256

    2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

    SHA512

    518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

  • \Users\Admin\AppData\Local\Temp\firefoxxxx.exe

    MD5

    0e362e7005823d0bec3719b902ed6d62

    SHA1

    590d860b909804349e0cdc2f1662b37bd62f7463

    SHA256

    2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

    SHA512

    518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

  • \Users\Admin\AppData\Local\notepadnote\firefox.exe

    MD5

    aeb7a2e7337a13a908467c3bed338793

    SHA1

    6bd27610a281b5e6d2b68e3fcce4d5430d11df9d

    SHA256

    820e12af8f79fb8a108b80eea3bcf26dcc5d31c2c79072ee3cfceba1b22e355f

    SHA512

    8770e6c6059761a1be3af01fbecbc8668f5471bc74f6dd05838aebb7380a4725db50a4309d2ca8fee1a08ebb6876a6d71ddb3a48a24e6623b047c759288337e7

  • \Users\Admin\AppData\Local\notepadnote\firefox.exe

    MD5

    aeb7a2e7337a13a908467c3bed338793

    SHA1

    6bd27610a281b5e6d2b68e3fcce4d5430d11df9d

    SHA256

    820e12af8f79fb8a108b80eea3bcf26dcc5d31c2c79072ee3cfceba1b22e355f

    SHA512

    8770e6c6059761a1be3af01fbecbc8668f5471bc74f6dd05838aebb7380a4725db50a4309d2ca8fee1a08ebb6876a6d71ddb3a48a24e6623b047c759288337e7

  • \Users\Admin\AppData\Local\skype\skype n.exe

    MD5

    1297bfced52ab967d26578f733c0fc27

    SHA1

    0267ac0ceefbbf81d6411c17e886f98a7e9fb04d

    SHA256

    acc69ae8822c6facb03542af4fcca5588408b41d351f7bc7988d462a7f8c60d2

    SHA512

    beb4047e1792dd2be37d4e4e76cb1e14e36ed6aceb8452acc8d9da48d430539072c9d14d7afb55772e96ed9215d6643285de20637c97136acc2598c702f97a82

  • \Users\Admin\AppData\Local\skype\skype n.exe

    MD5

    1297bfced52ab967d26578f733c0fc27

    SHA1

    0267ac0ceefbbf81d6411c17e886f98a7e9fb04d

    SHA256

    acc69ae8822c6facb03542af4fcca5588408b41d351f7bc7988d462a7f8c60d2

    SHA512

    beb4047e1792dd2be37d4e4e76cb1e14e36ed6aceb8452acc8d9da48d430539072c9d14d7afb55772e96ed9215d6643285de20637c97136acc2598c702f97a82

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxxx.exe

    MD5

    6ec0ed2ba12675538c2409d012cc3ef3

    SHA1

    2afa7867e614d5afabe43e6a6c33dc4c5a40d720

    SHA256

    dc1f93435a858fed72eee637cb23ad024ba309ec030dfa53f2495cb16776ccfd

    SHA512

    0680e43680abbd95e4f44fa1bc0222a9e84fc32b1886755939cbab7d4c4fd1d50ea35ba439409c14b99eda026015b6a1fa1218e8600cc7895d83676382e15137

  • \Windows\firefox\Outlook w.exe

    MD5

    e46ec8afa834fa878bd2476fa357ed4f

    SHA1

    87d9cbed84df8f33167a0250f4f7f9e1e3c02fa0

    SHA256

    2b21124d1683a0732c14190ec17c0aba4d33e3e00567607d8f7b7ed9754305b5

    SHA512

    852675255511626b5d63b7b2c1115c710a27eab30d9e0f23edd4d44c471b08bcd01a95799e7f3bd89ff0afc976af52771cda58ccbd6b438788c9095d476637b9

  • \Windows\firefox\Outlook w.exe

    MD5

    e46ec8afa834fa878bd2476fa357ed4f

    SHA1

    87d9cbed84df8f33167a0250f4f7f9e1e3c02fa0

    SHA256

    2b21124d1683a0732c14190ec17c0aba4d33e3e00567607d8f7b7ed9754305b5

    SHA512

    852675255511626b5d63b7b2c1115c710a27eab30d9e0f23edd4d44c471b08bcd01a95799e7f3bd89ff0afc976af52771cda58ccbd6b438788c9095d476637b9

  • memory/316-95-0x0000000000A61000-0x0000000000A62000-memory.dmp

    Filesize

    4KB

  • memory/316-90-0x0000000000AA0000-0x0000000000AA1000-memory.dmp

    Filesize

    4KB

  • memory/316-92-0x0000000000A60000-0x0000000000A61000-memory.dmp

    Filesize

    4KB

  • memory/316-96-0x0000000002090000-0x000000000209B000-memory.dmp

    Filesize

    44KB

  • memory/316-97-0x00000000020B0000-0x00000000020B1000-memory.dmp

    Filesize

    4KB

  • memory/316-87-0x0000000000000000-mapping.dmp

  • memory/468-112-0x0000000000000000-mapping.dmp

  • memory/468-117-0x0000000000850000-0x0000000000851000-memory.dmp

    Filesize

    4KB

  • memory/564-73-0x0000000075551000-0x0000000075553000-memory.dmp

    Filesize

    8KB

  • memory/564-70-0x0000000000000000-mapping.dmp

  • memory/760-65-0x0000000000000000-mapping.dmp

  • memory/1096-66-0x0000000000000000-mapping.dmp

  • memory/1132-124-0x0000000000000000-mapping.dmp

  • memory/1304-60-0x0000000000AB0000-0x0000000000AB1000-memory.dmp

    Filesize

    4KB

  • memory/1304-67-0x0000000002161000-0x0000000002162000-memory.dmp

    Filesize

    4KB

  • memory/1304-64-0x00000000009B0000-0x00000000009D1000-memory.dmp

    Filesize

    132KB

  • memory/1304-62-0x0000000002160000-0x0000000002161000-memory.dmp

    Filesize

    4KB

  • memory/1516-80-0x0000000000000000-mapping.dmp

  • memory/1516-85-0x0000000000D70000-0x0000000000D71000-memory.dmp

    Filesize

    4KB

  • memory/1568-120-0x0000000000DA0000-0x0000000000DA6000-memory.dmp

    Filesize

    24KB

  • memory/1568-121-0x0000000002555000-0x0000000002566000-memory.dmp

    Filesize

    68KB

  • memory/1568-130-0x0000000002566000-0x0000000002567000-memory.dmp

    Filesize

    4KB

  • memory/1568-114-0x0000000000C30000-0x0000000000C34000-memory.dmp

    Filesize

    16KB

  • memory/1568-110-0x0000000000A80000-0x0000000000A8F000-memory.dmp

    Filesize

    60KB

  • memory/1568-119-0x0000000000D50000-0x0000000000D56000-memory.dmp

    Filesize

    24KB

  • memory/1568-109-0x00000000002E0000-0x00000000002E8000-memory.dmp

    Filesize

    32KB

  • memory/1568-116-0x0000000000C40000-0x0000000000C44000-memory.dmp

    Filesize

    16KB

  • memory/1568-108-0x0000000002550000-0x0000000002551000-memory.dmp

    Filesize

    4KB

  • memory/1568-107-0x00000000005B0000-0x00000000005D3000-memory.dmp

    Filesize

    140KB

  • memory/1568-105-0x0000000000080000-0x0000000000082000-memory.dmp

    Filesize

    8KB

  • memory/1568-104-0x0000000000080000-0x00000000000E0000-memory.dmp

    Filesize

    384KB

  • memory/1568-101-0x0000000000080000-0x00000000000E0000-memory.dmp

    Filesize

    384KB

  • memory/1568-99-0x000000000045A41E-mapping.dmp

  • memory/1840-75-0x0000000000000000-mapping.dmp