Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
01-10-2022 07:27
Behavioral task
behavioral1
Sample
269546bd718741529021774e7032cf8da5075e2d18852ee0859c3c7a854f5950.exe
Resource
win10-20220812-en
General
-
Target
269546bd718741529021774e7032cf8da5075e2d18852ee0859c3c7a854f5950.exe
-
Size
469KB
-
MD5
a0c98858ea96edb2386c86e1786f3419
-
SHA1
461ece495d357885b8ab78341374d830ad88cb76
-
SHA256
269546bd718741529021774e7032cf8da5075e2d18852ee0859c3c7a854f5950
-
SHA512
0d0f7ac9a4450be50e66ca6595870118a28cefe1d4fb4289be6f0e7747a90bfad7e899ae93ae78d8effdbdf156b313e40f18db633cd8c1b763c4ccb7d974febb
-
SSDEEP
12288:Wmnk7iLJbpIpiRL6I2WhSKQ9ZsfZQSvn9:uiLJbpI7I2WhQqZ7v9
Malware Config
Extracted
remcos
Firefox
elew3le3lanle.freeddns.org:20309
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Firefox
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-Z26APQ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Firefox
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral1/memory/4368-457-0x0000000000400000-0x0000000000457000-memory.dmp MailPassView behavioral1/memory/4368-482-0x0000000000400000-0x0000000000457000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral1/memory/3732-460-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral1/memory/3732-497-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Nirsoft 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4368-457-0x0000000000400000-0x0000000000457000-memory.dmp Nirsoft behavioral1/memory/3732-460-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral1/memory/4368-482-0x0000000000400000-0x0000000000457000-memory.dmp Nirsoft behavioral1/memory/1940-485-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/3732-497-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
Executes dropped EXE 4 IoCs
Processes:
remcos.exeremcos.exeremcos.exeremcos.exepid process 4928 remcos.exe 3732 remcos.exe 4368 remcos.exe 1940 remcos.exe -
Deletes itself 1 IoCs
Processes:
WScript.exepid process 1976 WScript.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
remcos.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts remcos.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
269546bd718741529021774e7032cf8da5075e2d18852ee0859c3c7a854f5950.exeremcos.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Firefox = "\"C:\\ProgramData\\Firefox\\remcos.exe\"" 269546bd718741529021774e7032cf8da5075e2d18852ee0859c3c7a854f5950.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\ remcos.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\Firefox = "\"C:\\ProgramData\\Firefox\\remcos.exe\"" remcos.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ remcos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Firefox = "\"C:\\ProgramData\\Firefox\\remcos.exe\"" remcos.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 269546bd718741529021774e7032cf8da5075e2d18852ee0859c3c7a854f5950.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\Firefox = "\"C:\\ProgramData\\Firefox\\remcos.exe\"" 269546bd718741529021774e7032cf8da5075e2d18852ee0859c3c7a854f5950.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ 269546bd718741529021774e7032cf8da5075e2d18852ee0859c3c7a854f5950.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
remcos.exedescription pid process target process PID 4928 set thread context of 1208 4928 remcos.exe svchost.exe PID 4928 set thread context of 3732 4928 remcos.exe remcos.exe PID 4928 set thread context of 4368 4928 remcos.exe remcos.exe PID 4928 set thread context of 1940 4928 remcos.exe remcos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
269546bd718741529021774e7032cf8da5075e2d18852ee0859c3c7a854f5950.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings 269546bd718741529021774e7032cf8da5075e2d18852ee0859c3c7a854f5950.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
remcos.exeremcos.exepid process 3732 remcos.exe 3732 remcos.exe 1940 remcos.exe 1940 remcos.exe 3732 remcos.exe 3732 remcos.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
remcos.exepid process 4928 remcos.exe 4928 remcos.exe 4928 remcos.exe 4928 remcos.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
remcos.exedescription pid process Token: SeDebugPrivilege 1940 remcos.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
remcos.exepid process 4928 remcos.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
269546bd718741529021774e7032cf8da5075e2d18852ee0859c3c7a854f5950.exeWScript.execmd.exeremcos.exedescription pid process target process PID 2584 wrote to memory of 1976 2584 269546bd718741529021774e7032cf8da5075e2d18852ee0859c3c7a854f5950.exe WScript.exe PID 2584 wrote to memory of 1976 2584 269546bd718741529021774e7032cf8da5075e2d18852ee0859c3c7a854f5950.exe WScript.exe PID 2584 wrote to memory of 1976 2584 269546bd718741529021774e7032cf8da5075e2d18852ee0859c3c7a854f5950.exe WScript.exe PID 1976 wrote to memory of 4052 1976 WScript.exe cmd.exe PID 1976 wrote to memory of 4052 1976 WScript.exe cmd.exe PID 1976 wrote to memory of 4052 1976 WScript.exe cmd.exe PID 4052 wrote to memory of 4928 4052 cmd.exe remcos.exe PID 4052 wrote to memory of 4928 4052 cmd.exe remcos.exe PID 4052 wrote to memory of 4928 4052 cmd.exe remcos.exe PID 4928 wrote to memory of 1208 4928 remcos.exe svchost.exe PID 4928 wrote to memory of 1208 4928 remcos.exe svchost.exe PID 4928 wrote to memory of 1208 4928 remcos.exe svchost.exe PID 4928 wrote to memory of 1208 4928 remcos.exe svchost.exe PID 4928 wrote to memory of 3732 4928 remcos.exe remcos.exe PID 4928 wrote to memory of 3732 4928 remcos.exe remcos.exe PID 4928 wrote to memory of 3732 4928 remcos.exe remcos.exe PID 4928 wrote to memory of 4368 4928 remcos.exe remcos.exe PID 4928 wrote to memory of 4368 4928 remcos.exe remcos.exe PID 4928 wrote to memory of 4368 4928 remcos.exe remcos.exe PID 4928 wrote to memory of 1940 4928 remcos.exe remcos.exe PID 4928 wrote to memory of 1940 4928 remcos.exe remcos.exe PID 4928 wrote to memory of 1940 4928 remcos.exe remcos.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\269546bd718741529021774e7032cf8da5075e2d18852ee0859c3c7a854f5950.exe"C:\Users\Admin\AppData\Local\Temp\269546bd718741529021774e7032cf8da5075e2d18852ee0859c3c7a854f5950.exe"1⤵
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\ProgramData\Firefox\remcos.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\Firefox\remcos.exeC:\ProgramData\Firefox\remcos.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
-
C:\ProgramData\Firefox\remcos.exeC:\ProgramData\Firefox\remcos.exe /stext "C:\Users\Admin\AppData\Local\Temp\iqhiolmogwsfhiwrottpcqcnshcmkg"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\ProgramData\Firefox\remcos.exeC:\ProgramData\Firefox\remcos.exe /stext "C:\Users\Admin\AppData\Local\Temp\ksnbhewptekskotvxdgrmvxebwunlrypr"5⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
-
C:\ProgramData\Firefox\remcos.exeC:\ProgramData\Firefox\remcos.exe /stext "C:\Users\Admin\AppData\Local\Temp\vmsli"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Firefox\remcos.exeFilesize
469KB
MD5a0c98858ea96edb2386c86e1786f3419
SHA1461ece495d357885b8ab78341374d830ad88cb76
SHA256269546bd718741529021774e7032cf8da5075e2d18852ee0859c3c7a854f5950
SHA5120d0f7ac9a4450be50e66ca6595870118a28cefe1d4fb4289be6f0e7747a90bfad7e899ae93ae78d8effdbdf156b313e40f18db633cd8c1b763c4ccb7d974febb
-
C:\ProgramData\Firefox\remcos.exeFilesize
469KB
MD5a0c98858ea96edb2386c86e1786f3419
SHA1461ece495d357885b8ab78341374d830ad88cb76
SHA256269546bd718741529021774e7032cf8da5075e2d18852ee0859c3c7a854f5950
SHA5120d0f7ac9a4450be50e66ca6595870118a28cefe1d4fb4289be6f0e7747a90bfad7e899ae93ae78d8effdbdf156b313e40f18db633cd8c1b763c4ccb7d974febb
-
C:\ProgramData\Firefox\remcos.exeFilesize
469KB
MD5a0c98858ea96edb2386c86e1786f3419
SHA1461ece495d357885b8ab78341374d830ad88cb76
SHA256269546bd718741529021774e7032cf8da5075e2d18852ee0859c3c7a854f5950
SHA5120d0f7ac9a4450be50e66ca6595870118a28cefe1d4fb4289be6f0e7747a90bfad7e899ae93ae78d8effdbdf156b313e40f18db633cd8c1b763c4ccb7d974febb
-
C:\ProgramData\Firefox\remcos.exeFilesize
469KB
MD5a0c98858ea96edb2386c86e1786f3419
SHA1461ece495d357885b8ab78341374d830ad88cb76
SHA256269546bd718741529021774e7032cf8da5075e2d18852ee0859c3c7a854f5950
SHA5120d0f7ac9a4450be50e66ca6595870118a28cefe1d4fb4289be6f0e7747a90bfad7e899ae93ae78d8effdbdf156b313e40f18db633cd8c1b763c4ccb7d974febb
-
C:\ProgramData\Firefox\remcos.exeFilesize
469KB
MD5a0c98858ea96edb2386c86e1786f3419
SHA1461ece495d357885b8ab78341374d830ad88cb76
SHA256269546bd718741529021774e7032cf8da5075e2d18852ee0859c3c7a854f5950
SHA5120d0f7ac9a4450be50e66ca6595870118a28cefe1d4fb4289be6f0e7747a90bfad7e899ae93ae78d8effdbdf156b313e40f18db633cd8c1b763c4ccb7d974febb
-
C:\Users\Admin\AppData\Local\Temp\install.vbsFilesize
628B
MD5e2e11b2470ab8c4c1369eb7130cca472
SHA13c71d0adb20c66d75f9e260a14b08f4b71c34ebf
SHA256b517f1e97cf1292efd37a185eb9ce42178c743472cb583d7a850f3120cf6d76e
SHA512c67841341c3d710af9059e7a5cf63b203fc0336e7a554a3211e72fe632664adfd7ad2899a47c7f052842a428dc213a873bd40e4fd5ad38c4499369e3eccea030
-
C:\Users\Admin\AppData\Local\Temp\iqhiolmogwsfhiwrottpcqcnshcmkgFilesize
4KB
MD59f8131a06cce5763da558a7a80474089
SHA1f4e4c7a1e2e833ea63383479f952f7ea4da1b827
SHA256c7d4ccec594fb7d70edaac07f06927e39c651baa89a2116ee4d2b69dc0d9353b
SHA512f841e39b5d724a16afea3ed8e849eec3dc72444aafaf20a65c48a7bb9c4bb8362241d1b692255f3742a7631478b465453a8cce4ae6ecdbe63d48e40f0293cc8b
-
memory/1208-367-0x0000000002A90000-0x0000000002B0F000-memory.dmpFilesize
508KB
-
memory/1208-288-0x0000000002AC27A4-mapping.dmp
-
memory/1940-485-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/1940-378-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/1940-354-0x0000000000422206-mapping.dmp
-
memory/1976-181-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/1976-180-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/1976-166-0x0000000000000000-mapping.dmp
-
memory/1976-179-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/1976-178-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/1976-177-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/1976-176-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/1976-175-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/1976-174-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/1976-173-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/1976-172-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/1976-171-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/1976-170-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/1976-169-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/1976-168-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/1976-167-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-138-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-137-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-147-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-149-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-150-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-151-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-152-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-154-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-153-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-148-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-155-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-156-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-157-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-158-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-159-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-160-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-161-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-162-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-163-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-164-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-165-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-145-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-144-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-143-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-142-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-141-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-140-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-139-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-117-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-146-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-136-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-135-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-134-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-133-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-132-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-131-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-130-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-129-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-118-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-119-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-128-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-127-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-126-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-120-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-125-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-121-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-124-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-123-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2584-122-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3732-346-0x0000000000476274-mapping.dmp
-
memory/3732-370-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB
-
memory/3732-460-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB
-
memory/3732-497-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB
-
memory/4052-233-0x0000000000000000-mapping.dmp
-
memory/4368-349-0x0000000000455238-mapping.dmp
-
memory/4368-374-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/4368-457-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/4368-482-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/4928-246-0x0000000000000000-mapping.dmp