Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    25-01-2022 14:19

General

  • Target

    New Tender.exe

  • Size

    1.5MB

  • MD5

    421422ea74c1f97efd4c202ab402210d

  • SHA1

    674045a74cd3c1d54b494e3638ead5bb9d4e421e

  • SHA256

    68c0f9e10a5529d1a3d7031f4364a7e04746db13515041c94ceecf9a706fc671

  • SHA512

    b1b9483f05b74adcb76faf21ed4a3e90b7effa4451f7829e670d7f5597c7523693ce8317bfd5091b31e68489798875ebb999cebac876a4389cfd9b6800d37b12

Malware Config

Extracted

Family

remcos

Version

3.2.1 Pro

Botnet

RemoteHost

C2

janeilla.myddns.me:9711

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Remcos-SLEDDG

  • screenshot_crypt

    false

  • screenshot_flag

    true

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    notepad;solitaire;

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot1841252439:AAFeBNk12wAgfxXFXtqpw50JT4iCgTc-FsM/sendDocument

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • AgentTesla Payload 4 IoCs
  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 1 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 5 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 8 IoCs
  • Stops running service(s) 3 TTPs
  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\New Tender.exe
    "C:\Users\Admin\AppData\Local\Temp\New Tender.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1404
    • C:\Windows\SysWOW64\cmd.exe
      "cmd" /c ping 127.0.0.1 -n 10 > nul && REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\spoolse.exe,"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:996
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 10
        3⤵
        • Runs ping.exe
        PID:1368
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\spoolse.exe,"
        3⤵
        • Modifies WinLogon for persistence
        PID:1088
    • C:\Windows\SysWOW64\cmd.exe
      "cmd" /c ping 127.0.0.1 -n 12 > nul && copy "C:\Users\Admin\AppData\Local\Temp\New Tender.exe" "C:\Users\Admin\AppData\Roaming\spoolse.exe" && ping 127.0.0.1 -n 12 > nul && "C:\Users\Admin\AppData\Roaming\spoolse.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1116
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 12
        3⤵
        • Runs ping.exe
        PID:1824
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 12
        3⤵
        • Runs ping.exe
        PID:536
      • C:\Users\Admin\AppData\Roaming\spoolse.exe
        "C:\Users\Admin\AppData\Roaming\spoolse.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:908
        • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
          "C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:984
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C sc stop Windefend
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2000
            • C:\Windows\SysWOW64\sc.exe
              sc stop Windefend
              6⤵
                PID:1572
            • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
              C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe /stext "C:\Users\Admin\AppData\Local\Temp\zrcsucklyffsfrdora"
              5⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:1084
            • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
              C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe /stext "C:\Users\Admin\AppData\Local\Temp\juhcvuvfmnxxqfrsadcokm"
              5⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:952
            • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
              C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe /stext "C:\Users\Admin\AppData\Local\Temp\touvwnogavpcslowsowivzpla"
              5⤵
              • Executes dropped EXE
              • Accesses Microsoft Outlook accounts
              PID:296
            • C:\Users\Admin\AppData\Roaming\dwn.exe
              "C:\Users\Admin\AppData\Roaming\dwn.exe"
              5⤵
              • Drops file in Drivers directory
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1076
          • C:\Users\Admin\AppData\Local\Temp\spoolSE.exe
            "C:\Users\Admin\AppData\Local\Temp\spoolSE.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1228
            • C:\Users\Admin\AppData\Local\Temp\spoolSE.exe
              "C:\Users\Admin\AppData\Local\Temp\spoolSE.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1784

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Winlogon Helper DLL

    1
    T1004

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Impair Defenses

    1
    T1562

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    System Information Discovery

    1
    T1082

    Remote System Discovery

    1
    T1018

    Collection

    Data from Local System

    1
    T1005

    Email Collection

    1
    T1114

    Impact

    Service Stop

    1
    T1489

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
      MD5

      6a673bfc3b67ae9782cb31af2f234c68

      SHA1

      7544e89566d91e84e3cd437b9a073e5f6b56566e

      SHA256

      978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e

      SHA512

      72c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39

    • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
      MD5

      6a673bfc3b67ae9782cb31af2f234c68

      SHA1

      7544e89566d91e84e3cd437b9a073e5f6b56566e

      SHA256

      978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e

      SHA512

      72c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39

    • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
      MD5

      6a673bfc3b67ae9782cb31af2f234c68

      SHA1

      7544e89566d91e84e3cd437b9a073e5f6b56566e

      SHA256

      978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e

      SHA512

      72c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39

    • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
      MD5

      6a673bfc3b67ae9782cb31af2f234c68

      SHA1

      7544e89566d91e84e3cd437b9a073e5f6b56566e

      SHA256

      978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e

      SHA512

      72c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39

    • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
      MD5

      6a673bfc3b67ae9782cb31af2f234c68

      SHA1

      7544e89566d91e84e3cd437b9a073e5f6b56566e

      SHA256

      978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e

      SHA512

      72c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39

    • C:\Users\Admin\AppData\Local\Temp\spoolSE.exe
      MD5

      0e362e7005823d0bec3719b902ed6d62

      SHA1

      590d860b909804349e0cdc2f1662b37bd62f7463

      SHA256

      2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

      SHA512

      518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

    • C:\Users\Admin\AppData\Local\Temp\spoolSE.exe
      MD5

      0e362e7005823d0bec3719b902ed6d62

      SHA1

      590d860b909804349e0cdc2f1662b37bd62f7463

      SHA256

      2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

      SHA512

      518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

    • C:\Users\Admin\AppData\Local\Temp\spoolSE.exe
      MD5

      0e362e7005823d0bec3719b902ed6d62

      SHA1

      590d860b909804349e0cdc2f1662b37bd62f7463

      SHA256

      2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

      SHA512

      518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

    • C:\Users\Admin\AppData\Local\Temp\spoolSE.txt
      MD5

      5b4b2ae37af969f0d882406f2e8b4ebe

      SHA1

      276104fec0ee607cde7fb673a6ccf6efd33a1cf0

      SHA256

      c38a17c6d2df78a330acc336b5fe16487d81bc4473c763ca81665d199c84a891

      SHA512

      83b7497b0b7ac5499e99c8b73a4b56c3639e3e888fb57f65048fbdd35f98a6307b0c06c3fb2b8f5ebce321c89c6c900a57dff16340a53a8946aae2a4a2c943a0

    • C:\Users\Admin\AppData\Local\Temp\spoolSE.txt
      MD5

      2c6a3f43eca2335a7be7d669fc4196a9

      SHA1

      61f78b189d72184ef8b8282c47f92fd659e6bbbf

      SHA256

      95bc6fc765ef6361bce161e0b8f990ff3a5cceef5edb57b81153cdc528440060

      SHA512

      e49799e80d328bfecd95ce6771417fa963835cd0ad1d828b3ae241fe8e6690ad29e9cb83408376a69352a77177e1ac5d553db78b72c5c7a6f0ce1a55335bf97c

    • C:\Users\Admin\AppData\Local\Temp\spoolSE.txt
      MD5

      78a926cdaffee8435cd715191faea709

      SHA1

      543f51c599b60d0fdf6d05d2c2de7677c42e9efa

      SHA256

      5041e668f5b2061bf5fd33a0b599c93bdd0b7542304a63aa4e9d03e210e4f984

      SHA512

      17cec8dd6a5861403f5228c5b444c38eab8288fb8c4338da45e7f51b8aa96d63c146e04f882e10c3f6a8f395b9f538c0b9e6f57cd5ddb1ddc36dc7a2255bccbd

    • C:\Users\Admin\AppData\Local\Temp\zrcsucklyffsfrdora
      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • C:\Users\Admin\AppData\Roaming\dwn.exe
      MD5

      51b0c0a91272196870e59acd2e2c88a6

      SHA1

      eea60522132e64e130114efd7547fdac5119ca7f

      SHA256

      7545ad57abfbe482833f8fe9bc6eb10cc4055380ba139300cde4d5aafd179dde

      SHA512

      80f25a9d5ed6c4c7893c1da96017127cfccda6252ce34c5dcceb1c02f03cabe1f2d3ad976cc2b8c8f98710c3813ece735656bfb9d5407694214a83955dd25f59

    • C:\Users\Admin\AppData\Roaming\dwn.exe
      MD5

      51b0c0a91272196870e59acd2e2c88a6

      SHA1

      eea60522132e64e130114efd7547fdac5119ca7f

      SHA256

      7545ad57abfbe482833f8fe9bc6eb10cc4055380ba139300cde4d5aafd179dde

      SHA512

      80f25a9d5ed6c4c7893c1da96017127cfccda6252ce34c5dcceb1c02f03cabe1f2d3ad976cc2b8c8f98710c3813ece735656bfb9d5407694214a83955dd25f59

    • C:\Users\Admin\AppData\Roaming\spoolse.exe
      MD5

      421422ea74c1f97efd4c202ab402210d

      SHA1

      674045a74cd3c1d54b494e3638ead5bb9d4e421e

      SHA256

      68c0f9e10a5529d1a3d7031f4364a7e04746db13515041c94ceecf9a706fc671

      SHA512

      b1b9483f05b74adcb76faf21ed4a3e90b7effa4451f7829e670d7f5597c7523693ce8317bfd5091b31e68489798875ebb999cebac876a4389cfd9b6800d37b12

    • C:\Users\Admin\AppData\Roaming\spoolse.exe
      MD5

      421422ea74c1f97efd4c202ab402210d

      SHA1

      674045a74cd3c1d54b494e3638ead5bb9d4e421e

      SHA256

      68c0f9e10a5529d1a3d7031f4364a7e04746db13515041c94ceecf9a706fc671

      SHA512

      b1b9483f05b74adcb76faf21ed4a3e90b7effa4451f7829e670d7f5597c7523693ce8317bfd5091b31e68489798875ebb999cebac876a4389cfd9b6800d37b12

    • \Users\Admin\AppData\Local\Temp\AddInProcess32.exe
      MD5

      6a673bfc3b67ae9782cb31af2f234c68

      SHA1

      7544e89566d91e84e3cd437b9a073e5f6b56566e

      SHA256

      978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e

      SHA512

      72c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39

    • \Users\Admin\AppData\Local\Temp\AddInProcess32.exe
      MD5

      6a673bfc3b67ae9782cb31af2f234c68

      SHA1

      7544e89566d91e84e3cd437b9a073e5f6b56566e

      SHA256

      978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e

      SHA512

      72c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39

    • \Users\Admin\AppData\Local\Temp\AddInProcess32.exe
      MD5

      6a673bfc3b67ae9782cb31af2f234c68

      SHA1

      7544e89566d91e84e3cd437b9a073e5f6b56566e

      SHA256

      978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e

      SHA512

      72c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39

    • \Users\Admin\AppData\Local\Temp\AddInProcess32.exe
      MD5

      6a673bfc3b67ae9782cb31af2f234c68

      SHA1

      7544e89566d91e84e3cd437b9a073e5f6b56566e

      SHA256

      978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e

      SHA512

      72c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39

    • \Users\Admin\AppData\Local\Temp\spoolSE.exe
      MD5

      0e362e7005823d0bec3719b902ed6d62

      SHA1

      590d860b909804349e0cdc2f1662b37bd62f7463

      SHA256

      2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

      SHA512

      518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

    • \Users\Admin\AppData\Local\Temp\spoolSE.exe
      MD5

      0e362e7005823d0bec3719b902ed6d62

      SHA1

      590d860b909804349e0cdc2f1662b37bd62f7463

      SHA256

      2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

      SHA512

      518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

    • \Users\Admin\AppData\Roaming\dwn.exe
      MD5

      51b0c0a91272196870e59acd2e2c88a6

      SHA1

      eea60522132e64e130114efd7547fdac5119ca7f

      SHA256

      7545ad57abfbe482833f8fe9bc6eb10cc4055380ba139300cde4d5aafd179dde

      SHA512

      80f25a9d5ed6c4c7893c1da96017127cfccda6252ce34c5dcceb1c02f03cabe1f2d3ad976cc2b8c8f98710c3813ece735656bfb9d5407694214a83955dd25f59

    • \Users\Admin\AppData\Roaming\spoolse.exe
      MD5

      421422ea74c1f97efd4c202ab402210d

      SHA1

      674045a74cd3c1d54b494e3638ead5bb9d4e421e

      SHA256

      68c0f9e10a5529d1a3d7031f4364a7e04746db13515041c94ceecf9a706fc671

      SHA512

      b1b9483f05b74adcb76faf21ed4a3e90b7effa4451f7829e670d7f5597c7523693ce8317bfd5091b31e68489798875ebb999cebac876a4389cfd9b6800d37b12

    • memory/296-110-0x0000000000400000-0x0000000000457000-memory.dmp
      Filesize

      348KB

    • memory/296-126-0x0000000000400000-0x0000000000457000-memory.dmp
      Filesize

      348KB

    • memory/296-113-0x0000000000400000-0x0000000000457000-memory.dmp
      Filesize

      348KB

    • memory/296-114-0x0000000000400000-0x0000000000457000-memory.dmp
      Filesize

      348KB

    • memory/296-128-0x000000000042C000-0x0000000000457000-memory.dmp
      Filesize

      172KB

    • memory/296-112-0x0000000000400000-0x0000000000457000-memory.dmp
      Filesize

      348KB

    • memory/296-111-0x0000000000400000-0x0000000000457000-memory.dmp
      Filesize

      348KB

    • memory/296-119-0x0000000000400000-0x0000000000457000-memory.dmp
      Filesize

      348KB

    • memory/908-76-0x0000000001F31000-0x0000000001F32000-memory.dmp
      Filesize

      4KB

    • memory/908-64-0x0000000004340000-0x000000000435A000-memory.dmp
      Filesize

      104KB

    • memory/908-65-0x0000000001F20000-0x0000000001F26000-memory.dmp
      Filesize

      24KB

    • memory/908-63-0x0000000001F30000-0x0000000001F31000-memory.dmp
      Filesize

      4KB

    • memory/908-62-0x0000000000160000-0x00000000002EC000-memory.dmp
      Filesize

      1.5MB

    • memory/952-99-0x0000000000400000-0x0000000000424000-memory.dmp
      Filesize

      144KB

    • memory/952-101-0x0000000000400000-0x0000000000424000-memory.dmp
      Filesize

      144KB

    • memory/952-117-0x0000000000400000-0x0000000000424000-memory.dmp
      Filesize

      144KB

    • memory/952-109-0x0000000000400000-0x0000000000424000-memory.dmp
      Filesize

      144KB

    • memory/952-118-0x000000000040E000-0x0000000000424000-memory.dmp
      Filesize

      88KB

    • memory/952-104-0x0000000000400000-0x0000000000424000-memory.dmp
      Filesize

      144KB

    • memory/952-103-0x0000000000400000-0x0000000000424000-memory.dmp
      Filesize

      144KB

    • memory/952-100-0x0000000000400000-0x0000000000424000-memory.dmp
      Filesize

      144KB

    • memory/984-68-0x0000000000400000-0x0000000000479000-memory.dmp
      Filesize

      484KB

    • memory/984-71-0x0000000000400000-0x0000000000479000-memory.dmp
      Filesize

      484KB

    • memory/984-69-0x0000000000400000-0x0000000000479000-memory.dmp
      Filesize

      484KB

    • memory/984-72-0x0000000000400000-0x0000000000479000-memory.dmp
      Filesize

      484KB

    • memory/984-70-0x0000000000400000-0x0000000000479000-memory.dmp
      Filesize

      484KB

    • memory/984-80-0x0000000000400000-0x0000000000479000-memory.dmp
      Filesize

      484KB

    • memory/984-74-0x0000000000400000-0x0000000000479000-memory.dmp
      Filesize

      484KB

    • memory/984-73-0x0000000000400000-0x0000000000479000-memory.dmp
      Filesize

      484KB

    • memory/984-75-0x0000000000400000-0x0000000000479000-memory.dmp
      Filesize

      484KB

    • memory/984-77-0x0000000000400000-0x0000000000479000-memory.dmp
      Filesize

      484KB

    • memory/984-79-0x0000000075F81000-0x0000000075F83000-memory.dmp
      Filesize

      8KB

    • memory/1076-127-0x0000000000BC0000-0x0000000000BC1000-memory.dmp
      Filesize

      4KB

    • memory/1076-123-0x0000000000C00000-0x0000000000C3C000-memory.dmp
      Filesize

      240KB

    • memory/1084-94-0x0000000000400000-0x0000000000478000-memory.dmp
      Filesize

      480KB

    • memory/1084-105-0x0000000000400000-0x0000000000478000-memory.dmp
      Filesize

      480KB

    • memory/1084-92-0x0000000000400000-0x0000000000478000-memory.dmp
      Filesize

      480KB

    • memory/1084-93-0x0000000000400000-0x0000000000478000-memory.dmp
      Filesize

      480KB

    • memory/1084-124-0x0000000000400000-0x0000000000478000-memory.dmp
      Filesize

      480KB

    • memory/1084-125-0x0000000000430000-0x0000000000478000-memory.dmp
      Filesize

      288KB

    • memory/1084-95-0x0000000000400000-0x0000000000478000-memory.dmp
      Filesize

      480KB

    • memory/1084-96-0x0000000000400000-0x0000000000478000-memory.dmp
      Filesize

      480KB

    • memory/1228-84-0x00000000002E0000-0x00000000002FA000-memory.dmp
      Filesize

      104KB

    • memory/1404-55-0x0000000000A70000-0x0000000000BFC000-memory.dmp
      Filesize

      1.5MB

    • memory/1404-58-0x0000000000420000-0x0000000000436000-memory.dmp
      Filesize

      88KB

    • memory/1404-57-0x0000000000360000-0x0000000000392000-memory.dmp
      Filesize

      200KB

    • memory/1404-56-0x0000000000470000-0x0000000000471000-memory.dmp
      Filesize

      4KB