Analysis
-
max time kernel
56s -
max time network
59s -
platform
windows10-1703_x64 -
resource
win10-20220718-en -
resource tags
arch:x64arch:x86image:win10-20220718-enlocale:en-usos:windows10-1703-x64system -
submitted
09-08-2022 01:29
Static task
static1
General
-
Target
Remittance Copy_pdf.exe
-
Size
712KB
-
MD5
c7df9d8848c6c6dea9e0292ebdaad137
-
SHA1
c4442176ea93ddb86d1fba5753ba55225ee2c796
-
SHA256
1133c1d7d534c7b57c50869c73c5ac1c5bf2f9b2cf4fabadb7a0d3b4cac52754
-
SHA512
5a4efb04841a0955e4c1c36b00a028e72b8f18c51cbf98738ac8d27164f76492cb9e4e4b72882b4eba879f63d368dd5df5051c24125dd109cf2bbe97342062ee
Malware Config
Extracted
remcos
3.1.5 Pro
NEWS
catomaaaaa.freedynamicdns.org:6603
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-670V4G
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Remittance Copy_pdf.exedescription pid process target process PID 3368 set thread context of 3496 3368 Remittance Copy_pdf.exe Remittance Copy_pdf.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
chrome.exechrome.exechrome.exepid process 816 chrome.exe 816 chrome.exe 1924 chrome.exe 1924 chrome.exe 2640 chrome.exe 2640 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Remittance Copy_pdf.exedescription pid process Token: SeDebugPrivilege 3368 Remittance Copy_pdf.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe 1924 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Remittance Copy_pdf.exepid process 3496 Remittance Copy_pdf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1924 wrote to memory of 4036 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 4036 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 820 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 816 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 816 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 3356 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 3356 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 3356 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 3356 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 3356 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 3356 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 3356 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 3356 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 3356 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 3356 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 3356 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 3356 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 3356 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 3356 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 3356 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 3356 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 3356 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 3356 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 3356 1924 chrome.exe chrome.exe PID 1924 wrote to memory of 3356 1924 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Remittance Copy_pdf.exe"C:\Users\Admin\AppData\Local\Temp\Remittance Copy_pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Remittance Copy_pdf.exe"C:\Users\Admin\AppData\Local\Temp\Remittance Copy_pdf.exe"2⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\Photo"2⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\Photo\Photo.exe'" /f2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\Photo\Photo.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\Remittance Copy_pdf.exe" "C:\Users\Admin\AppData\Roaming\Photo\Photo.exe"2⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffe5afd4f50,0x7ffe5afd4f60,0x7ffe5afd4f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1628,3568438641921688660,11745318548024246447,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1684 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1628,3568438641921688660,11745318548024246447,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1636 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1628,3568438641921688660,11745318548024246447,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2260 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,3568438641921688660,11745318548024246447,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2840 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,3568438641921688660,11745318548024246447,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2708 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,3568438641921688660,11745318548024246447,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3672 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,3568438641921688660,11745318548024246447,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4456 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,3568438641921688660,11745318548024246447,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4604 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,3568438641921688660,11745318548024246447,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4576 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1628,3568438641921688660,11745318548024246447,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4900 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,3568438641921688660,11745318548024246447,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4832 /prefetch:82⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\??\pipe\crashpad_1924_SONUNQOVVUMTCGOCMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/2640-169-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/2640-171-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/2640-179-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/2640-175-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/2640-166-0x0000000000000000-mapping.dmp
-
memory/3368-152-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-136-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-125-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-126-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-127-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-128-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-129-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-155-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-131-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-132-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-133-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-134-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-135-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-156-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-137-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-138-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-139-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-157-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-141-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-142-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-143-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-144-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-145-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-146-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-147-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-148-0x0000000000D50000-0x0000000000E08000-memory.dmpFilesize
736KB
-
memory/3368-149-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-150-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-151-0x0000000004ED0000-0x00000000053CE000-memory.dmpFilesize
5.0MB
-
memory/3368-117-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-123-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-154-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-130-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-124-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-140-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-158-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-159-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-160-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-161-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-162-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-163-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-118-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-119-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-122-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-178-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-120-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3368-121-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3496-182-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3496-165-0x000000000042F075-mapping.dmp
-
memory/3496-167-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3496-168-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3496-185-0x0000000000400000-0x0000000000479000-memory.dmpFilesize
484KB
-
memory/3496-176-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3496-243-0x0000000000400000-0x0000000000479000-memory.dmpFilesize
484KB
-
memory/3496-164-0x0000000000400000-0x0000000000479000-memory.dmpFilesize
484KB
-
memory/3496-187-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3496-173-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3756-183-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3756-186-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3756-180-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3756-172-0x0000000000000000-mapping.dmp
-
memory/3932-184-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3932-170-0x0000000000000000-mapping.dmp
-
memory/3932-181-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3932-174-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/3932-177-0x0000000077C50000-0x0000000077DDE000-memory.dmpFilesize
1.6MB
-
memory/4236-217-0x0000000000000000-mapping.dmp