Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 12:47
Static task
static1
Behavioral task
behavioral1
Sample
2238e83f.exe
Resource
win7-20220414-en
General
-
Target
2238e83f.exe
-
Size
1.4MB
-
MD5
abb0da45041a587897972066124a73fe
-
SHA1
5a82eb5e9ef349e798fc930f077e15e5e692fe5c
-
SHA256
2238e83f8febb5591c0c5416f5e81d17a4d6a061a05230c4765b9af3faa26845
-
SHA512
10c81fcbd10a23a26ac80c31098d736ada5f015df5da146c4f32939c13f396085b22c74b24da69dd5b91836a4ab5744dfc5310aa284358b7a689ad73cc6a5e25
Malware Config
Extracted
remcos
1.7 Pro
Host
194.5.97.32:5890
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
remcos_oqkhxjzletgovfx
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
- take_screenshot_title
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
remcos.exeremcos.exepid process 2032 remcos.exe 1104 remcos.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 1680 cmd.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
remcos.exe2238e83f.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\ remcos.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" remcos.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 2238e83f.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" 2238e83f.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
2238e83f.exeremcos.exeremcos.exedescription pid process target process PID 880 set thread context of 580 880 2238e83f.exe 2238e83f.exe PID 2032 set thread context of 1104 2032 remcos.exe remcos.exe PID 1104 set thread context of 860 1104 remcos.exe iexplore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 1820 timeout.exe 752 timeout.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{11A67B01-D84C-11EC-8873-66AE473A865F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exe2238e83f.exepowershell.exeremcos.exepid process 956 powershell.exe 880 2238e83f.exe 384 powershell.exe 2032 remcos.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exe2238e83f.exepowershell.exeremcos.exedescription pid process Token: SeDebugPrivilege 956 powershell.exe Token: SeDebugPrivilege 880 2238e83f.exe Token: SeDebugPrivilege 384 powershell.exe Token: SeDebugPrivilege 2032 remcos.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1604 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1604 iexplore.exe 1604 iexplore.exe 708 IEXPLORE.EXE 708 IEXPLORE.EXE 708 IEXPLORE.EXE 708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2238e83f.execmd.exe2238e83f.execmd.exeremcos.execmd.exeremcos.exedescription pid process target process PID 880 wrote to memory of 956 880 2238e83f.exe powershell.exe PID 880 wrote to memory of 956 880 2238e83f.exe powershell.exe PID 880 wrote to memory of 956 880 2238e83f.exe powershell.exe PID 880 wrote to memory of 956 880 2238e83f.exe powershell.exe PID 880 wrote to memory of 1940 880 2238e83f.exe cmd.exe PID 880 wrote to memory of 1940 880 2238e83f.exe cmd.exe PID 880 wrote to memory of 1940 880 2238e83f.exe cmd.exe PID 880 wrote to memory of 1940 880 2238e83f.exe cmd.exe PID 1940 wrote to memory of 1820 1940 cmd.exe timeout.exe PID 1940 wrote to memory of 1820 1940 cmd.exe timeout.exe PID 1940 wrote to memory of 1820 1940 cmd.exe timeout.exe PID 1940 wrote to memory of 1820 1940 cmd.exe timeout.exe PID 880 wrote to memory of 580 880 2238e83f.exe 2238e83f.exe PID 880 wrote to memory of 580 880 2238e83f.exe 2238e83f.exe PID 880 wrote to memory of 580 880 2238e83f.exe 2238e83f.exe PID 880 wrote to memory of 580 880 2238e83f.exe 2238e83f.exe PID 880 wrote to memory of 580 880 2238e83f.exe 2238e83f.exe PID 880 wrote to memory of 580 880 2238e83f.exe 2238e83f.exe PID 880 wrote to memory of 580 880 2238e83f.exe 2238e83f.exe PID 880 wrote to memory of 580 880 2238e83f.exe 2238e83f.exe PID 880 wrote to memory of 580 880 2238e83f.exe 2238e83f.exe PID 880 wrote to memory of 580 880 2238e83f.exe 2238e83f.exe PID 580 wrote to memory of 1680 580 2238e83f.exe cmd.exe PID 580 wrote to memory of 1680 580 2238e83f.exe cmd.exe PID 580 wrote to memory of 1680 580 2238e83f.exe cmd.exe PID 580 wrote to memory of 1680 580 2238e83f.exe cmd.exe PID 580 wrote to memory of 1680 580 2238e83f.exe cmd.exe PID 580 wrote to memory of 1680 580 2238e83f.exe cmd.exe PID 580 wrote to memory of 1680 580 2238e83f.exe cmd.exe PID 1680 wrote to memory of 824 1680 cmd.exe PING.EXE PID 1680 wrote to memory of 824 1680 cmd.exe PING.EXE PID 1680 wrote to memory of 824 1680 cmd.exe PING.EXE PID 1680 wrote to memory of 824 1680 cmd.exe PING.EXE PID 1680 wrote to memory of 2032 1680 cmd.exe remcos.exe PID 1680 wrote to memory of 2032 1680 cmd.exe remcos.exe PID 1680 wrote to memory of 2032 1680 cmd.exe remcos.exe PID 1680 wrote to memory of 2032 1680 cmd.exe remcos.exe PID 2032 wrote to memory of 384 2032 remcos.exe powershell.exe PID 2032 wrote to memory of 384 2032 remcos.exe powershell.exe PID 2032 wrote to memory of 384 2032 remcos.exe powershell.exe PID 2032 wrote to memory of 384 2032 remcos.exe powershell.exe PID 2032 wrote to memory of 1036 2032 remcos.exe cmd.exe PID 2032 wrote to memory of 1036 2032 remcos.exe cmd.exe PID 2032 wrote to memory of 1036 2032 remcos.exe cmd.exe PID 2032 wrote to memory of 1036 2032 remcos.exe cmd.exe PID 1036 wrote to memory of 752 1036 cmd.exe timeout.exe PID 1036 wrote to memory of 752 1036 cmd.exe timeout.exe PID 1036 wrote to memory of 752 1036 cmd.exe timeout.exe PID 1036 wrote to memory of 752 1036 cmd.exe timeout.exe PID 2032 wrote to memory of 1104 2032 remcos.exe remcos.exe PID 2032 wrote to memory of 1104 2032 remcos.exe remcos.exe PID 2032 wrote to memory of 1104 2032 remcos.exe remcos.exe PID 2032 wrote to memory of 1104 2032 remcos.exe remcos.exe PID 2032 wrote to memory of 1104 2032 remcos.exe remcos.exe PID 2032 wrote to memory of 1104 2032 remcos.exe remcos.exe PID 2032 wrote to memory of 1104 2032 remcos.exe remcos.exe PID 2032 wrote to memory of 1104 2032 remcos.exe remcos.exe PID 2032 wrote to memory of 1104 2032 remcos.exe remcos.exe PID 2032 wrote to memory of 1104 2032 remcos.exe remcos.exe PID 1104 wrote to memory of 860 1104 remcos.exe iexplore.exe PID 1104 wrote to memory of 860 1104 remcos.exe iexplore.exe PID 1104 wrote to memory of 860 1104 remcos.exe iexplore.exe PID 1104 wrote to memory of 860 1104 remcos.exe iexplore.exe PID 1104 wrote to memory of 860 1104 remcos.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2238e83f.exe"C:\Users\Admin\AppData\Local\Temp\2238e83f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AEEAcgB0AC0AUwBsAEUAZQBQACAALQBzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 202⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 203⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\2238e83f.exeC:\Users\Admin\AppData\Local\Temp\2238e83f.exe2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEPING 127.0.0.1 -n 24⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AEEAcgB0AC0AUwBsAEUAZQBQACAALQBzACAAMgAwAA==5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 205⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 206⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=iexplore.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.07⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1604 CREDAT:275457 /prefetch:28⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\k007hrg\imagestore.datFilesize
21KB
MD5a0e8a465aaf27955a03f0d48ff728888
SHA1c01f487551bf423f16bdedf1ed9a6e19c8334df5
SHA2567dd48f1e6925aefd0ecbe23a0f74ac1c73101adca887cafae20ecf44d7a9f577
SHA5124d56359f192db7726b42c465c48f2f9260ab5de46cd693336228b2f590bb2f3b8299f322683825df97307cd901dc64b524e3b2e80cfa76dd0d0d041e62ac895f
-
C:\Users\Admin\AppData\Local\Temp\install.batFilesize
99B
MD576c1687d97dfdbcea62ef1490bec5001
SHA15f4d1aeafa7d840cde67b76f97416dd68efd1bed
SHA25679f04ea049979ffd2232c459fdd57fae97a5255aea9b4a2c7dce7ead856f37a4
SHA512da250f0628632a644f159d818a82a8b9cca8224e46843bddbe0f6f9c32a2d04f7736a620af49ab6d77616317ca7d68285e60043965fe86c03d940835bd30a925
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5adc006654ca7120ccb34bbbbfaad38b8
SHA1d09af0b69b2015f873af45c8262d52553de7bdf3
SHA256faadc6d86c45aad6231b71f9c66cae229116d031a00a5d61ed928915d627706e
SHA51296f4beb8c394be6635b235ccf11923ed313a65af1087de20e0afcd29344e1bf5604e829ddf9eea95b6dde0ba733e562e552063e8bc546eb70f24a29cb94d9063
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\hussan\hussan.exeFilesize
1.4MB
MD5abb0da45041a587897972066124a73fe
SHA15a82eb5e9ef349e798fc930f077e15e5e692fe5c
SHA2562238e83f8febb5591c0c5416f5e81d17a4d6a061a05230c4765b9af3faa26845
SHA51210c81fcbd10a23a26ac80c31098d736ada5f015df5da146c4f32939c13f396085b22c74b24da69dd5b91836a4ab5744dfc5310aa284358b7a689ad73cc6a5e25
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeFilesize
1.4MB
MD5abb0da45041a587897972066124a73fe
SHA15a82eb5e9ef349e798fc930f077e15e5e692fe5c
SHA2562238e83f8febb5591c0c5416f5e81d17a4d6a061a05230c4765b9af3faa26845
SHA51210c81fcbd10a23a26ac80c31098d736ada5f015df5da146c4f32939c13f396085b22c74b24da69dd5b91836a4ab5744dfc5310aa284358b7a689ad73cc6a5e25
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeFilesize
1.4MB
MD5abb0da45041a587897972066124a73fe
SHA15a82eb5e9ef349e798fc930f077e15e5e692fe5c
SHA2562238e83f8febb5591c0c5416f5e81d17a4d6a061a05230c4765b9af3faa26845
SHA51210c81fcbd10a23a26ac80c31098d736ada5f015df5da146c4f32939c13f396085b22c74b24da69dd5b91836a4ab5744dfc5310aa284358b7a689ad73cc6a5e25
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeFilesize
1.4MB
MD5abb0da45041a587897972066124a73fe
SHA15a82eb5e9ef349e798fc930f077e15e5e692fe5c
SHA2562238e83f8febb5591c0c5416f5e81d17a4d6a061a05230c4765b9af3faa26845
SHA51210c81fcbd10a23a26ac80c31098d736ada5f015df5da146c4f32939c13f396085b22c74b24da69dd5b91836a4ab5744dfc5310aa284358b7a689ad73cc6a5e25
-
\Users\Admin\AppData\Roaming\remcos\remcos.exeFilesize
1.4MB
MD5abb0da45041a587897972066124a73fe
SHA15a82eb5e9ef349e798fc930f077e15e5e692fe5c
SHA2562238e83f8febb5591c0c5416f5e81d17a4d6a061a05230c4765b9af3faa26845
SHA51210c81fcbd10a23a26ac80c31098d736ada5f015df5da146c4f32939c13f396085b22c74b24da69dd5b91836a4ab5744dfc5310aa284358b7a689ad73cc6a5e25
-
memory/384-88-0x0000000072490000-0x0000000072A3B000-memory.dmpFilesize
5.7MB
-
memory/384-85-0x0000000000000000-mapping.dmp
-
memory/384-89-0x0000000072490000-0x0000000072A3B000-memory.dmpFilesize
5.7MB
-
memory/580-66-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/580-68-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/580-69-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/580-70-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/580-71-0x000000000040FD88-mapping.dmp
-
memory/580-74-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/580-75-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/580-64-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/580-63-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/752-91-0x0000000000000000-mapping.dmp
-
memory/824-78-0x0000000000000000-mapping.dmp
-
memory/880-59-0x00000000086B0000-0x0000000008818000-memory.dmpFilesize
1.4MB
-
memory/880-55-0x0000000075711000-0x0000000075713000-memory.dmpFilesize
8KB
-
memory/880-54-0x0000000000B00000-0x0000000000C6E000-memory.dmpFilesize
1.4MB
-
memory/880-62-0x0000000002280000-0x00000000022B4000-memory.dmpFilesize
208KB
-
memory/956-56-0x0000000000000000-mapping.dmp
-
memory/956-58-0x0000000071100000-0x00000000716AB000-memory.dmpFilesize
5.7MB
-
memory/1036-90-0x0000000000000000-mapping.dmp
-
memory/1104-101-0x000000000040FD88-mapping.dmp
-
memory/1104-105-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1104-106-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1680-76-0x0000000000000000-mapping.dmp
-
memory/1820-61-0x0000000000000000-mapping.dmp
-
memory/1940-60-0x0000000000000000-mapping.dmp
-
memory/2032-83-0x0000000000F50000-0x00000000010BE000-memory.dmpFilesize
1.4MB
-
memory/2032-81-0x0000000000000000-mapping.dmp