Analysis

  • max time kernel
    192s
  • max time network
    193s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-10-2024 17:29

General

  • Target

    https://drive.google.com/uc?export=download&id=1k_fz8Vh7MNWLW1LFgdz1tl92_ekJu-yz&usp=gmail

Malware Config

Extracted

Family

remcos

Botnet

MANGO

C2

enero2024.con-ip.com:2005

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    registros.dat

  • keylog_flag

    false

  • keylog_folder

    registros

  • mouse_option

    false

  • mutex

    bgdfvcujthdkijagnchgdk-VWA9IM

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Capturas de pantalla

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Executes dropped EXE 17 IoCs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://drive.google.com/uc?export=download&id=1k_fz8Vh7MNWLW1LFgdz1tl92_ekJu-yz&usp=gmail"
    1⤵
      PID:1448
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4284
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • NTFS ADS
      PID:2228
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4616
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:5044
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:4676
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:4104
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4668
      • C:\Program Files\7-Zip\7zG.exe
        "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap11683:176:7zEvent27295
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:1688
      • C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe
        "C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe"
        1⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4508
        • C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe
          "C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe"
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:5004
      • C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe
        "C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe"
        1⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5064
        • C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe
          "C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe"
          2⤵
          • Executes dropped EXE
          PID:4924
      • C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe
        "C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe"
        1⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1128
        • C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe
          "C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe"
          2⤵
          • Executes dropped EXE
          PID:2932
      • C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe
        "C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe"
        1⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:396
        • C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe
          "C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe"
          2⤵
          • Executes dropped EXE
          PID:4952
      • C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe
        "C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe"
        1⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4840
        • C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe
          "C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe"
          2⤵
          • Executes dropped EXE
          PID:3464
      • C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe
        "C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe"
        1⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1368
        • C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe
          "C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe"
          2⤵
          • Executes dropped EXE
          PID:3752
      • C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe
        "C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe"
        1⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2132
        • C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe
          "C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe"
          2⤵
          • Executes dropped EXE
          PID:2764
      • C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe
        "C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe"
        1⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2632
        • C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe
          "C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe"
          2⤵
          • Executes dropped EXE
          PID:1524
      • C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe
        "C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe"
        1⤵
        • Executes dropped EXE
        PID:3712

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\registros\registros.dat

        Filesize

        172B

        MD5

        32921e09e1978f44f60e056a3292414c

        SHA1

        a5b5cd71dd4cf64f0dddad7b217ce2f7f19e8c9e

        SHA256

        edf5179526baa8fecf2faf22870840d6afd2dd84b8485da27203f45a18f30dcc

        SHA512

        6a7f1cccbede362a470e5440dfd42d814d9e28faa6afb9666d6ff9dc7c914eb5f21daa67b528a3ae719851639195b7e27d6ebc1ee12683d31d0d1740f598e637

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XCFODRP5\edgecompatviewlist[1].xml

        Filesize

        74KB

        MD5

        d4fc49dc14f63895d997fa4940f24378

        SHA1

        3efb1437a7c5e46034147cbbc8db017c69d02c31

        SHA256

        853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

        SHA512

        cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\SGZ717YQ\OFICIO%20N°%2000329493234%20RADICAL%20ACCIÓN%20DE%20TUTELA%2002024-0059[1].tar

        Filesize

        1.4MB

        MD5

        a41396b955171c997cbfdee9d9783336

        SHA1

        07efe22552308514a3fa15b3cd1a0854110702e4

        SHA256

        df1161ca9eb45bf7679982ea7a5629c89f592c12ae75197ed4cfb39af919b0e6

        SHA512

        8997e461c6455f3a9045c8139ccbb8b86c6698dcf61681bd901c3ce0123ab950506e849d5e69cfbecb5641ebacfdb62c7ea6e16e16c077c110debb7151568b45

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\AL72F0OC\drive_2022q3_32dp[1].png

        Filesize

        1KB

        MD5

        c66f20f2e39eb2f6a0a4cdbe0d955e5f

        SHA1

        575ef086ce461e0ef83662e3acb3c1a789ebb0a8

        SHA256

        2ab9cd0ffdddf7bf060620ae328fe626bfa2c004739adedb74ec894faf9bee31

        SHA512

        b9c44a2113fb078d83e968dc0af2e78995bb6dd4ca25abff31e9ab180849c5de3036b69931cca295ac64155d5b168b634e35b7699f3fe65d4a30e9058a2639bd

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\QB3ZK6X5\suggestions[1].en-US

        Filesize

        17KB

        MD5

        5a34cb996293fde2cb7a4ac89587393a

        SHA1

        3c96c993500690d1a77873cd62bc639b3a10653f

        SHA256

        c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

        SHA512

        e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

      • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\SGZ717YQ\OFICIO%20N°%2000329493234%20RADICAL%20ACCIÓN%20DE%20TUTELA%2002024-0059[1].tar

        Filesize

        25KB

        MD5

        c2a26f636d92c83ef5cb66b6910bc5da

        SHA1

        a2231ff30355deb3e5baefd5d6a1419f3a7f3216

        SHA256

        b9258d3182cdcb3b8b46a2521ecfbc2ebea59f5be5340d86fa4a63e226352bbc

        SHA512

        83806d187c922d461dff2404b82ec83ef17490efcde5d0bd8c35281d94d0f14b0eb2091883119b1e019ec4152f95840c551d2cb1954115f527ef400c9187bb08

      • C:\Users\Admin\Downloads\OFICIO N° 00329493234 RADICAL ACCIÓN DE TUTELA 02024-0059.exe

        Filesize

        3.7MB

        MD5

        5e1610ac721b1358715549d10a64f298

        SHA1

        3d796a7cba3376f0b0d4ac8b4b225b9ce4882181

        SHA256

        7a325ea3765b6c64aa01c1efabe53d9829e29c134c76096aa9cdd7c7c7e2874a

        SHA512

        bdb697c843e7d4ec81d0b831e09ca9b3863d910100675f19727572baaefe9979aae76dedf24c54219411f53ae9ee15ae46c7df95465eda29a916623fc053aace

      • C:\Users\Admin\Music\SatPCUpdater\SatPCOculus.exe

        Filesize

        738.9MB

        MD5

        95bba9e0c7ef6c1115c09cf5d3451033

        SHA1

        5771a99567fbee04c1d0ed22e449d31c20bab03e

        SHA256

        df36d665f545bfa07cda4cf03c5e0352ae0004cb0544d24b0a81c46403b1f360

        SHA512

        ae2787fbdd4c2f5c2590139171597757572f4055edb0ccb11bb45ae2d954730f967f213b555c890ad1c2d4e1af5707490db3e0d805c2973b74f9f8c7e927c2da

      • C:\Users\Admin\Music\SatPCUpdater\SatPCOculus.exe

        Filesize

        465.3MB

        MD5

        cdd49ab9da886c1c1a0ae14ee8004454

        SHA1

        a8e412901c365fd699cfedf73e37893138c60113

        SHA256

        0a354f184fba9db1de71bbd7966ce4fa03232d1b0ce77eb1997604a7a14d2fc4

        SHA512

        460a9c268f8666537983aae0539844e568c4b7e8d310f040ec1a79ecc9d060ab1a7770ee504963f8638ace08f590ecf3e8a5e04988318a0ea27a7a5f42d80ba8

      • C:\Users\Admin\Music\SatPCUpdater\SatPCOculus.exe

        Filesize

        218.8MB

        MD5

        4f754f29199b9825fb6fae2b6943b93f

        SHA1

        3cfc4f00665c3a6f7052a928d7b0c640d65417da

        SHA256

        6f1bb7a59c02aae8a725fd469bfda30706b535b207e0e5ccd8e51813a334ca7d

        SHA512

        28fd9f4eb94e04aa39f86bf29913a84dd72eb54e7e32d2b6bbe7dbc065c6a14107d23d357704ac76b93e11b64d3cfa87fa2de9ee409262df1f4c5637e725a60e

      • C:\Users\Admin\Music\SatPCUpdater\SatPCOculus.exe

        Filesize

        136.1MB

        MD5

        b43f3657f301579c21f6332f47f5d532

        SHA1

        a9beab69368d2f31eb540724e95dbfb955e1a2a9

        SHA256

        6a01dd9c9b72c0b59a6f7e2a17cd81476e0af36e407e0befd720410cf22b2831

        SHA512

        6f92d19bc95b0d3a694f9daefacc26355583b3bdfaac2545013cd8911f62f507f4724b6b7e960ae7a3fd82341e14bca834b76aa2d4c7ea4f929329c3f1bf4757

      • C:\Users\Admin\Music\SatPCUpdater\SatPCOculus.exe

        Filesize

        119.1MB

        MD5

        dfac254abbc14f474053772b23fc6948

        SHA1

        b230737827ef94d057af86db5065ee57e42f61ee

        SHA256

        d5653cfd1a8169a9d14c71727c3e99744c00bd86b4963841874876afea04cdaf

        SHA512

        c1baef9ca34c1c86791eb8bd6d3ab1b5293a828c8857269a9c5efca7cd7ec6d500425e854436eaa46ab374ad124c772e7b8bbe3b755d89a9c381b36e9ad000c4

      • C:\Users\Admin\Music\SatPCUpdater\SatPCOculus.exe

        Filesize

        89.2MB

        MD5

        76e7a82d78cd53a93e44f534ca4d1d8b

        SHA1

        ceebfa903b53920130233fa3a2a9591dd9aa1bbe

        SHA256

        62490fa4faab7ca0e5adaea4b0f9958a0459435a34d45cda3226fb1c72671814

        SHA512

        bdc5c19f8dcc025fd9dbd327ad9356c81d83d0d8e5921eaad08769d313290d3f031c6326a121bd4d55e185f83ef3e1a19c8778f37541ff91bdd040ee1ff1ad8c

      • memory/4284-92-0x0000010BE27A0000-0x0000010BE27A1000-memory.dmp

        Filesize

        4KB

      • memory/4284-93-0x0000010BE27B0000-0x0000010BE27B1000-memory.dmp

        Filesize

        4KB

      • memory/4284-0-0x0000010BDBA20000-0x0000010BDBA30000-memory.dmp

        Filesize

        64KB

      • memory/4284-35-0x0000010BD8EA0000-0x0000010BD8EA2000-memory.dmp

        Filesize

        8KB

      • memory/4284-16-0x0000010BDBB20000-0x0000010BDBB30000-memory.dmp

        Filesize

        64KB

      • memory/4508-167-0x0000000000400000-0x00000000009BF000-memory.dmp

        Filesize

        5.7MB

      • memory/4508-166-0x0000000000400000-0x00000000009BF000-memory.dmp

        Filesize

        5.7MB

      • memory/4508-163-0x0000000000400000-0x00000000009BF000-memory.dmp

        Filesize

        5.7MB

      • memory/4508-165-0x0000000000400000-0x00000000009BF000-memory.dmp

        Filesize

        5.7MB

      • memory/4508-164-0x0000000000400000-0x00000000009BF000-memory.dmp

        Filesize

        5.7MB

      • memory/4508-170-0x0000000000400000-0x00000000009BF000-memory.dmp

        Filesize

        5.7MB

      • memory/4508-169-0x0000000000400000-0x00000000009BF000-memory.dmp

        Filesize

        5.7MB

      • memory/4676-72-0x0000013D50990000-0x0000013D50992000-memory.dmp

        Filesize

        8KB

      • memory/4676-74-0x0000013D50A50000-0x0000013D50A52000-memory.dmp

        Filesize

        8KB

      • memory/4676-62-0x0000013D40200000-0x0000013D40300000-memory.dmp

        Filesize

        1024KB

      • memory/4676-63-0x0000013D50910000-0x0000013D50912000-memory.dmp

        Filesize

        8KB

      • memory/4676-76-0x0000013D50BB0000-0x0000013D50BB2000-memory.dmp

        Filesize

        8KB

      • memory/4676-68-0x0000013D50950000-0x0000013D50952000-memory.dmp

        Filesize

        8KB

      • memory/4676-66-0x0000013D50940000-0x0000013D50942000-memory.dmp

        Filesize

        8KB

      • memory/4676-70-0x0000013D50970000-0x0000013D50972000-memory.dmp

        Filesize

        8KB

      • memory/5004-178-0x00000000009C0000-0x0000000000A42000-memory.dmp

        Filesize

        520KB

      • memory/5004-180-0x00000000009C0000-0x0000000000A42000-memory.dmp

        Filesize

        520KB

      • memory/5004-181-0x00000000009C0000-0x0000000000A42000-memory.dmp

        Filesize

        520KB

      • memory/5004-179-0x00000000009C0000-0x0000000000A42000-memory.dmp

        Filesize

        520KB

      • memory/5004-176-0x00000000009C0000-0x0000000000A42000-memory.dmp

        Filesize

        520KB

      • memory/5004-173-0x00000000009C0000-0x0000000000A42000-memory.dmp

        Filesize

        520KB

      • memory/5004-168-0x00000000009C0000-0x0000000000A42000-memory.dmp

        Filesize

        520KB

      • memory/5004-172-0x00000000009C0000-0x0000000000A42000-memory.dmp

        Filesize

        520KB

      • memory/5004-177-0x00000000009C0000-0x0000000000A42000-memory.dmp

        Filesize

        520KB

      • memory/5044-42-0x0000028849100000-0x0000028849200000-memory.dmp

        Filesize

        1024KB