Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
22-03-2023 14:46
Static task
static1
Behavioral task
behavioral1
Sample
Photo_Jessa_Rhodes.vbs
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
Photo_Jessa_Rhodes.vbs
Resource
win10v2004-20230220-en
General
-
Target
Photo_Jessa_Rhodes.vbs
-
Size
3.0MB
-
MD5
ba053f0069a5e1f112bde79b8460c07d
-
SHA1
6c928e440da5067ded65078ac1599f999f5576b7
-
SHA256
e303ae23d963f2247b113f3a228b2b5421bd9dd563a286db2bd88c4e94d2b1e1
-
SHA512
f83cfbd608936796b7cb4136ac49afbc3ab69b91ebdea3d60ac79a6372d6948fbe6a50c366ef7bf54a2e10850b8d62c37c281363084a36caf5f73673f6096ec6
-
SSDEEP
12288:Y/9F/E/F/E/9F/E/h/9F/E/F/E/9F/E/h/9F/E/F/E/9F/E/F/E/9F/x/E/A/jjh:euTiVoAC3FxQTXPsw
Malware Config
Extracted
remcos
Popads1
15.235.53.10:3005
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-TOMSMO
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Signatures
-
Drops startup file 3 IoCs
Processes:
WScript.exewscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Photo_Jessa_Rhodes.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Photo_Jessa_Rhodes.vbs WScript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Photo_Jessa_Rhodes.vbs wscript.exe -
Loads dropped DLL 4 IoCs
Processes:
regsvr32.exewscript.exeregsvr32.exeregsvr32.exepid process 3152 regsvr32.exe 2628 wscript.exe 2056 regsvr32.exe 3932 regsvr32.exe -
Registers COM server for autorun 1 TTPs 6 IoCs
Processes:
regsvr32.exeregsvr32.exeregsvr32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dynwrapx.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dynwrapx.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dynwrapx.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
wscript.exedescription pid process target process PID 2628 set thread context of 4996 2628 wscript.exe winhlp32.exe PID 2628 set thread context of 4136 2628 wscript.exe winhlp32.exe PID 2628 set thread context of 3092 2628 wscript.exe winhlp32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 16 IoCs
Processes:
regsvr32.exeregsvr32.exeregsvr32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dynwrapx.dll" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\DynamicWrapperX\CLSID\ = "{89565275-A714-4a43-912E-978B935EDCCC}" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dynwrapx.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\DynamicWrapperX\CLSID regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\DynamicWrapperX regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\DynamicWrapperX\CLSID\ = "{89565275-A714-4a43-912E-978B935EDCCC}" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\WOW6432Node regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\DynamicWrapperX\CLSID regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\DynamicWrapperX\CLSID\ = "{89565275-A714-4a43-912E-978B935EDCCC}" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\WOW6432Node\CLSID\{89565275-A714-4a43-912E-978B935EDCCC}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dynwrapx.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\DynamicWrapperX\CLSID regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\WOW6432Node\CLSID regsvr32.exe -
Suspicious use of WriteProcessMemory 48 IoCs
Processes:
WScript.exewscript.exedescription pid process target process PID 2076 wrote to memory of 2628 2076 WScript.exe wscript.exe PID 2076 wrote to memory of 2628 2076 WScript.exe wscript.exe PID 2076 wrote to memory of 2628 2076 WScript.exe wscript.exe PID 2628 wrote to memory of 3152 2628 wscript.exe regsvr32.exe PID 2628 wrote to memory of 3152 2628 wscript.exe regsvr32.exe PID 2628 wrote to memory of 3152 2628 wscript.exe regsvr32.exe PID 2628 wrote to memory of 4996 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 4996 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 4996 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 4996 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 4996 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 4996 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 4996 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 4996 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 4996 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 4996 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 4996 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 4996 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 2056 2628 wscript.exe regsvr32.exe PID 2628 wrote to memory of 2056 2628 wscript.exe regsvr32.exe PID 2628 wrote to memory of 2056 2628 wscript.exe regsvr32.exe PID 2628 wrote to memory of 4136 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 4136 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 4136 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 4136 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 4136 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 4136 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 4136 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 4136 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 4136 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 4136 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 4136 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 4136 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 3932 2628 wscript.exe regsvr32.exe PID 2628 wrote to memory of 3932 2628 wscript.exe regsvr32.exe PID 2628 wrote to memory of 3932 2628 wscript.exe regsvr32.exe PID 2628 wrote to memory of 3092 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 3092 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 3092 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 3092 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 3092 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 3092 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 3092 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 3092 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 3092 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 3092 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 3092 2628 wscript.exe winhlp32.exe PID 2628 wrote to memory of 3092 2628 wscript.exe winhlp32.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Photo_Jessa_Rhodes.vbs"1⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
-
C:\Windows\syswow64\wscript.exe"C:\Windows\syswow64\wscript.exe" //b //e:vbscript "C:\Users\Admin\AppData\Local\Temp\Photo_Jessa_Rhodes.vbs"2⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"3⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
-
C:\Windows\winhlp32.exe"C:\Windows\winhlp32.exe"3⤵
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"3⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
-
C:\Windows\winhlp32.exe"C:\Windows\winhlp32.exe"3⤵
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /I /S "C:\Users\Admin\AppData\Local\Temp\dynwrapx.dll"3⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
-
C:\Windows\winhlp32.exe"C:\Windows\winhlp32.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\dynwrapx.dllFilesize
13KB
MD5e0b8dfd17b8e7de760b273d18e58b142
SHA1801509fb6783c9e57edc67a72dde3c62080ffbaf
SHA2564ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379
SHA512443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Photo_Jessa_Rhodes.vbsMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\AppData\Local\Temp\dynwrapx.dllFilesize
13KB
MD5e0b8dfd17b8e7de760b273d18e58b142
SHA1801509fb6783c9e57edc67a72dde3c62080ffbaf
SHA2564ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379
SHA512443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b
-
\Users\Admin\AppData\Local\Temp\dynwrapx.dllFilesize
13KB
MD5e0b8dfd17b8e7de760b273d18e58b142
SHA1801509fb6783c9e57edc67a72dde3c62080ffbaf
SHA2564ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379
SHA512443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b
-
\Users\Admin\AppData\Local\Temp\dynwrapx.dllFilesize
13KB
MD5e0b8dfd17b8e7de760b273d18e58b142
SHA1801509fb6783c9e57edc67a72dde3c62080ffbaf
SHA2564ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379
SHA512443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b
-
\Users\Admin\AppData\Local\Temp\dynwrapx.dllFilesize
13KB
MD5e0b8dfd17b8e7de760b273d18e58b142
SHA1801509fb6783c9e57edc67a72dde3c62080ffbaf
SHA2564ef3a6703abc6b2b8e2cac3031c1e5b86fe8b377fde92737349ee52bd2604379
SHA512443359da27b3c87e81ae4f4b9a2ab7e7bf6abfa93551fc62347a0b79b36d79635131abc14d4deddab3ace12fdf973496518f67e1be8dc4903b35fd465835556b
-
memory/2628-137-0x0000000008230000-0x0000000008231000-memory.dmpFilesize
4KB
-
memory/2628-146-0x00000000083B0000-0x00000000083B1000-memory.dmpFilesize
4KB
-
memory/3092-152-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/3092-154-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/3092-153-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4136-145-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4136-143-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4136-147-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-171-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-178-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-148-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-136-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-135-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-133-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-155-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-156-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-157-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-158-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-159-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-160-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-161-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-162-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-163-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-164-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-165-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-166-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-167-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-168-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-169-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-170-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-130-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-172-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-173-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-174-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-175-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-176-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-177-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-139-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-179-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-180-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-181-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-182-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-183-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-184-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-185-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-186-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-187-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-188-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-189-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-190-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-191-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-192-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-193-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-194-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-195-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-196-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-197-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-198-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-199-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-200-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-201-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-202-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-203-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-204-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-205-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB
-
memory/4996-206-0x0000000000400000-0x000000000047A000-memory.dmpFilesize
488KB