Analysis
-
max time kernel
191s -
max time network
205s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
26-01-2024 13:57
Static task
static1
Behavioral task
behavioral1
Sample
TransportLabel_7685508907_PDF - Copy (2).exe
Resource
win10-20231215-en
General
-
Target
TransportLabel_7685508907_PDF - Copy (2).exe
-
Size
1.9MB
-
MD5
c295d1b04c08cca83884279ef5deebeb
-
SHA1
62589735b49497bfefff8f1e2994ab7bde2b05f7
-
SHA256
3c22de3eaaaa8896d5d806e8840f6c37957062519614a30bc2c1d1c4dcbfc240
-
SHA512
0ab11da7595c473aa180c95442a0e302984aa08679cf6ee023813a41de1e880b42c23ab2fd474884c511357b6296dacf60433089fbf2715a07fd2ffd8a3c5ad1
-
SSDEEP
49152:6QYedNTsjnxf2hp4XLkrhKOekUvUeudcv4aF5P0RuG:6Qpds2hp4XQrhhekUvfud+uRp
Malware Config
Extracted
remcos
Crypted
172.206.61.17:55642
172.206.61.17:55746
172.206.61.17:55867
172.206.61.17:55733
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
xosa.dat
-
keylog_flag
false
-
keylog_path
%UserProfile%
-
mouse_option
false
-
mutex
mioeiasa-XMLRCS
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1912-2-0x0000000002E70000-0x0000000003E70000-memory.dmp modiloader_stage2 behavioral1/memory/1132-106-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 -
Creates new service(s) 1 TTPs
-
Executes dropped EXE 3 IoCs
Processes:
easinvoker.exeeasinvoker.exeeasinvoker.exepid process 4796 easinvoker.exe 1416 easinvoker.exe 3392 easinvoker.exe -
Loads dropped DLL 3 IoCs
Processes:
easinvoker.exeeasinvoker.exeeasinvoker.exepid process 4796 easinvoker.exe 1416 easinvoker.exe 3392 easinvoker.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exepid process 4412 sc.exe 4616 sc.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
xcopy.exexcopy.exexcopy.exexcopy.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Script User-Agent 4 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 5 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 11 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 24 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 25 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
easinvoker.exepid process 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe 4796 easinvoker.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 636 -
Suspicious use of AdjustPrivilegeToken 22 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2928 powershell.exe Token: SeIncreaseQuotaPrivilege 2928 powershell.exe Token: SeSecurityPrivilege 2928 powershell.exe Token: SeTakeOwnershipPrivilege 2928 powershell.exe Token: SeLoadDriverPrivilege 2928 powershell.exe Token: SeSystemProfilePrivilege 2928 powershell.exe Token: SeSystemtimePrivilege 2928 powershell.exe Token: SeProfSingleProcessPrivilege 2928 powershell.exe Token: SeIncBasePriorityPrivilege 2928 powershell.exe Token: SeCreatePagefilePrivilege 2928 powershell.exe Token: SeBackupPrivilege 2928 powershell.exe Token: SeRestorePrivilege 2928 powershell.exe Token: SeShutdownPrivilege 2928 powershell.exe Token: SeDebugPrivilege 2928 powershell.exe Token: SeSystemEnvironmentPrivilege 2928 powershell.exe Token: SeRemoteShutdownPrivilege 2928 powershell.exe Token: SeUndockPrivilege 2928 powershell.exe Token: SeManageVolumePrivilege 2928 powershell.exe Token: 33 2928 powershell.exe Token: 34 2928 powershell.exe Token: 35 2928 powershell.exe Token: 36 2928 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
SndVol.exepid process 4452 SndVol.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
SndVol.exepid process 4452 SndVol.exe 4452 SndVol.exe -
Suspicious use of WriteProcessMemory 60 IoCs
Processes:
TransportLabel_7685508907_PDF - Copy (2).execmd.exeeasinvoker.execmd.execmd.execmd.exeTransportLabel_7685508907_PDF - Copy (2).execmd.exedescription pid process target process PID 1912 wrote to memory of 2404 1912 TransportLabel_7685508907_PDF - Copy (2).exe cmd.exe PID 1912 wrote to memory of 2404 1912 TransportLabel_7685508907_PDF - Copy (2).exe cmd.exe PID 1912 wrote to memory of 2404 1912 TransportLabel_7685508907_PDF - Copy (2).exe cmd.exe PID 2404 wrote to memory of 1488 2404 cmd.exe cmd.exe PID 2404 wrote to memory of 1488 2404 cmd.exe cmd.exe PID 2404 wrote to memory of 1488 2404 cmd.exe cmd.exe PID 2404 wrote to memory of 1528 2404 cmd.exe cmd.exe PID 2404 wrote to memory of 1528 2404 cmd.exe cmd.exe PID 2404 wrote to memory of 1528 2404 cmd.exe cmd.exe PID 2404 wrote to memory of 5080 2404 cmd.exe xcopy.exe PID 2404 wrote to memory of 5080 2404 cmd.exe xcopy.exe PID 2404 wrote to memory of 5080 2404 cmd.exe xcopy.exe PID 2404 wrote to memory of 3380 2404 cmd.exe cmd.exe PID 2404 wrote to memory of 3380 2404 cmd.exe cmd.exe PID 2404 wrote to memory of 3380 2404 cmd.exe cmd.exe PID 2404 wrote to memory of 96 2404 cmd.exe xcopy.exe PID 2404 wrote to memory of 96 2404 cmd.exe xcopy.exe PID 2404 wrote to memory of 96 2404 cmd.exe xcopy.exe PID 2404 wrote to memory of 4944 2404 cmd.exe cmd.exe PID 2404 wrote to memory of 4944 2404 cmd.exe cmd.exe PID 2404 wrote to memory of 4944 2404 cmd.exe cmd.exe PID 2404 wrote to memory of 4044 2404 cmd.exe xcopy.exe PID 2404 wrote to memory of 4044 2404 cmd.exe xcopy.exe PID 2404 wrote to memory of 4044 2404 cmd.exe xcopy.exe PID 2404 wrote to memory of 4128 2404 cmd.exe cmd.exe PID 2404 wrote to memory of 4128 2404 cmd.exe cmd.exe PID 2404 wrote to memory of 4128 2404 cmd.exe cmd.exe PID 2404 wrote to memory of 4056 2404 cmd.exe xcopy.exe PID 2404 wrote to memory of 4056 2404 cmd.exe xcopy.exe PID 2404 wrote to memory of 4056 2404 cmd.exe xcopy.exe PID 2404 wrote to memory of 4796 2404 cmd.exe easinvoker.exe PID 2404 wrote to memory of 4796 2404 cmd.exe easinvoker.exe PID 4796 wrote to memory of 4460 4796 easinvoker.exe cmd.exe PID 4796 wrote to memory of 4460 4796 easinvoker.exe cmd.exe PID 4460 wrote to memory of 988 4460 cmd.exe cmd.exe PID 4460 wrote to memory of 988 4460 cmd.exe cmd.exe PID 4460 wrote to memory of 4412 4460 cmd.exe sc.exe PID 4460 wrote to memory of 4412 4460 cmd.exe sc.exe PID 4460 wrote to memory of 4616 4460 cmd.exe sc.exe PID 4460 wrote to memory of 4616 4460 cmd.exe sc.exe PID 988 wrote to memory of 2928 988 cmd.exe powershell.exe PID 988 wrote to memory of 2928 988 cmd.exe powershell.exe PID 1912 wrote to memory of 2420 1912 TransportLabel_7685508907_PDF - Copy (2).exe cmd.exe PID 1912 wrote to memory of 2420 1912 TransportLabel_7685508907_PDF - Copy (2).exe cmd.exe PID 1912 wrote to memory of 2420 1912 TransportLabel_7685508907_PDF - Copy (2).exe cmd.exe PID 1912 wrote to memory of 4452 1912 TransportLabel_7685508907_PDF - Copy (2).exe SndVol.exe PID 1912 wrote to memory of 4452 1912 TransportLabel_7685508907_PDF - Copy (2).exe SndVol.exe PID 1912 wrote to memory of 4452 1912 TransportLabel_7685508907_PDF - Copy (2).exe SndVol.exe PID 1912 wrote to memory of 4452 1912 TransportLabel_7685508907_PDF - Copy (2).exe SndVol.exe PID 2420 wrote to memory of 1416 2420 cmd.exe easinvoker.exe PID 2420 wrote to memory of 1416 2420 cmd.exe easinvoker.exe PID 1132 wrote to memory of 2084 1132 TransportLabel_7685508907_PDF - Copy (2).exe cmd.exe PID 1132 wrote to memory of 2084 1132 TransportLabel_7685508907_PDF - Copy (2).exe cmd.exe PID 1132 wrote to memory of 2084 1132 TransportLabel_7685508907_PDF - Copy (2).exe cmd.exe PID 1132 wrote to memory of 1796 1132 TransportLabel_7685508907_PDF - Copy (2).exe SndVol.exe PID 1132 wrote to memory of 1796 1132 TransportLabel_7685508907_PDF - Copy (2).exe SndVol.exe PID 1132 wrote to memory of 1796 1132 TransportLabel_7685508907_PDF - Copy (2).exe SndVol.exe PID 2084 wrote to memory of 3392 2084 cmd.exe easinvoker.exe PID 2084 wrote to memory of 3392 2084 cmd.exe easinvoker.exe PID 1132 wrote to memory of 4452 1132 TransportLabel_7685508907_PDF - Copy (2).exe SndVol.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\TransportLabel_7685508907_PDF - Copy (2).exe"C:\Users\Admin\AppData\Local\Temp\TransportLabel_7685508907_PDF - Copy (2).exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\SvkfevbuO.bat" "2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c mkdir "\\?\C:\Windows "3⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ECHO F"3⤵
-
C:\Windows\SysWOW64\xcopy.exexcopy "easinvoker.exe" "C:\Windows \System32\" /K /D /H /Y3⤵
- Enumerates system info in registry
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ECHO F"3⤵
-
C:\Windows\SysWOW64\xcopy.exexcopy "netutils.dll" "C:\Windows \System32\" /K /D /H /Y3⤵
- Enumerates system info in registry
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ECHO F"3⤵
-
C:\Windows\SysWOW64\xcopy.exexcopy "KDECO.bat" "C:\Windows \System32\" /K /D /H /Y3⤵
- Enumerates system info in registry
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ECHO F"3⤵
-
C:\Windows\SysWOW64\xcopy.exexcopy "x.bat" "C:\Windows \System32\" /K /D /H /Y3⤵
- Enumerates system info in registry
-
C:\Windows \System32\easinvoker.exe"C:\\Windows \\System32\\easinvoker.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows \system32\KDECO.bat""4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\sc.exesc.exe create truesight binPath="C:\Users\Public\Libraries\truesight.sys" type=kernel5⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.execmd /c powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users'"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users'"6⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\sc.exesc.exe start truesight5⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\\Windows \\System32\\easinvoker.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows \System32\easinvoker.exe"C:\\Windows \\System32\\easinvoker.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\SndVol.exeC:\Windows\System32\SndVol.exe2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\AppData\Local\Temp\TransportLabel_7685508907_PDF - Copy (2).exe"C:\Users\Admin\AppData\Local\Temp\TransportLabel_7685508907_PDF - Copy (2).exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\\Windows \\System32\\easinvoker.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows \System32\easinvoker.exe"C:\\Windows \\System32\\easinvoker.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\SndVol.exeC:\Windows\System32\SndVol.exe2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pwwmghwb.hgf.ps1Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
C:\Users\Public\Libraries\KDECO.batFilesize
271B
MD5d62b11dc4dc821ef23260e5b0e74a835
SHA1cdff2004cb9ef149f75fae296f50f4fbfefb2e84
SHA256d1b19b878a3ae98f650843314cc3ef8d681013f6e18e0201cb47a0afa45fc349
SHA51227b8292eb318413b965e1c7552165e65f9003d03b15ddc0c5c142420a1a174303f983c268942d7b60c74ac4e8e79e01f83510807fc0c492cabdf4948bc69c625
-
C:\Users\Public\Libraries\SvkfevbuO.batFilesize
404B
MD56880148d6cd8fabdce94b7e91dbd8d17
SHA1870e9ad13355a8452746e0904d004ee8c8ec66e5
SHA2560bfe311ffb1de96cbb2616c2a59c2a1a4942ec03073cc2ddfdfc43f79c74d18a
SHA512810ee2896597cbcf813b9285bb2d7f9127360a4d8a872c47460d32710fe114c27ed58f840dc8bcfdaf7b826e7e46c78c0e814e4fa3d380d10737673a1febf38e
-
C:\Users\Public\Libraries\easinvoker.exeFilesize
128KB
MD5231ce1e1d7d98b44371ffff407d68b59
SHA125510d0f6353dbf0c9f72fc880de7585e34b28ff
SHA25630951db8bfc21640645aa9144cfeaa294bb7c6980ef236d28552b6f4f3f92a96
SHA512520887b01bda96b7c4f91b9330a5c03a12f7c7f266d4359432e7bacc76b0eef377c05a4361f8fa80ad0b94b5865699d747a5d94a2d3dcdb85dabf5887bb6c612
-
C:\Users\Public\Libraries\netutils.dllFilesize
116KB
MD518f2fcec0ea10ef689b557fb0315ba3b
SHA1cef14b1ebe402b6685734bc7efb16e27831c5b9e
SHA256e443c8e9201f17ef4180d97a8505c24b4645e3ab25eacdeb8807d036229e2c1a
SHA51229513bd06224e1e1b40aedde09ba0f14b7b0bce7533fb215809b25d972d889d8e72c91dc8e00966369e31721c526322b9a6a7573c9f58f335ef94ca782ff844a
-
memory/1132-109-0x0000000000400000-0x00000000005F5000-memory.dmpFilesize
2.0MB
-
memory/1132-104-0x0000000002240000-0x0000000002241000-memory.dmpFilesize
4KB
-
memory/1132-106-0x0000000002D10000-0x0000000003D10000-memory.dmpFilesize
16.0MB
-
memory/1416-94-0x00000000613C0000-0x00000000613E3000-memory.dmpFilesize
140KB
-
memory/1912-81-0x0000000002510000-0x0000000002511000-memory.dmpFilesize
4KB
-
memory/1912-1-0x0000000002E70000-0x0000000003E70000-memory.dmpFilesize
16.0MB
-
memory/1912-5-0x00000000008D0000-0x00000000008D1000-memory.dmpFilesize
4KB
-
memory/1912-2-0x0000000002E70000-0x0000000003E70000-memory.dmpFilesize
16.0MB
-
memory/1912-0-0x00000000008D0000-0x00000000008D1000-memory.dmpFilesize
4KB
-
memory/1912-4-0x0000000000400000-0x00000000005F5000-memory.dmpFilesize
2.0MB
-
memory/2928-53-0x000001BE5B8E0000-0x000001BE5B8F0000-memory.dmpFilesize
64KB
-
memory/2928-34-0x000001BE43640000-0x000001BE43662000-memory.dmpFilesize
136KB
-
memory/2928-78-0x00007FFDCF1C0000-0x00007FFDCFBAC000-memory.dmpFilesize
9.9MB
-
memory/2928-40-0x000001BE5BA70000-0x000001BE5BAE6000-memory.dmpFilesize
472KB
-
memory/2928-37-0x000001BE5B8E0000-0x000001BE5B8F0000-memory.dmpFilesize
64KB
-
memory/2928-36-0x000001BE5B8E0000-0x000001BE5B8F0000-memory.dmpFilesize
64KB
-
memory/2928-35-0x00007FFDCF1C0000-0x00007FFDCFBAC000-memory.dmpFilesize
9.9MB
-
memory/3392-114-0x00000000613C0000-0x00000000613E3000-memory.dmpFilesize
140KB
-
memory/4452-85-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/4452-101-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/4452-82-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/4452-88-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/4452-95-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/4452-96-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/4452-97-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/4452-99-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/4452-100-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/4452-89-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/4452-87-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/4452-83-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/4452-108-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/4452-80-0x0000000005220000-0x0000000006220000-memory.dmpFilesize
16.0MB
-
memory/4452-116-0x0000000005220000-0x0000000006220000-memory.dmpFilesize
16.0MB
-
memory/4452-117-0x0000000018220000-0x00000000182A2000-memory.dmpFilesize
520KB
-
memory/4452-119-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/4796-28-0x00000000613C0000-0x00000000613E3000-memory.dmpFilesize
140KB