Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 04:59

General

  • Target

    RFQ.exe

  • Size

    1.4MB

  • MD5

    a88b0ddc1c80b37e8af7ca017929bf88

  • SHA1

    601ae4b9be7c6619680d6ac19e4dae3acb572464

  • SHA256

    9b6c97ad4d3d563b1bf7330e0aef16649514a1e0ac422bf99368bbb5a0069c4c

  • SHA512

    a776e6d0db9c16ed2b2ce90ed06f3cdc4101e05399503c201a8c409a3d4b8b846d7a6dce5ca634199946962a6655788b7d6bed44509e76bd69a7590c3dbbe927

  • SSDEEP

    24576:ozsSzxWeyf1eLZajkRqxnTf/7UeCL4EryZNK0P+:ozsUW5fJkUnTfDUe04Ee7bW

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

154.216.16.54:6092

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-YJ70D0

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    true

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RFQ.exe
    "C:\Users\Admin\AppData\Local\Temp\RFQ.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\RFQ.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1836
    • C:\Users\Admin\AppData\Local\Temp\RFQ.exe
      "C:\Users\Admin\AppData\Local\Temp\RFQ.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\ProgramData\Remcos\remcos.exe
        "C:\ProgramData\Remcos\remcos.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2076
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Remcos\remcos.exe"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:380
        • C:\ProgramData\Remcos\remcos.exe
          "C:\ProgramData\Remcos\remcos.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:492
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\System32\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:940
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2252
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:2
                7⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:1620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Remcos\remcos.exe

    Filesize

    1.4MB

    MD5

    a88b0ddc1c80b37e8af7ca017929bf88

    SHA1

    601ae4b9be7c6619680d6ac19e4dae3acb572464

    SHA256

    9b6c97ad4d3d563b1bf7330e0aef16649514a1e0ac422bf99368bbb5a0069c4c

    SHA512

    a776e6d0db9c16ed2b2ce90ed06f3cdc4101e05399503c201a8c409a3d4b8b846d7a6dce5ca634199946962a6655788b7d6bed44509e76bd69a7590c3dbbe927

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6B2043001D270792DFFD725518EAFE2C

    Filesize

    579B

    MD5

    f55da450a5fb287e1e0f0dcc965756ca

    SHA1

    7e04de896a3e666d00e687d33ffad93be83d349e

    SHA256

    31ad6648f8104138c738f39ea4320133393e3a18cc02296ef97c2ac9ef6731d0

    SHA512

    19bd9a319dfdaad7c13a6b085e51c67c0f9cb1eb4babc4c2b5cdf921c13002ca324e62dfa05f344e340d0d100aa4d6fac0683552162ccc7c0321a8d146da0630

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6B2043001D270792DFFD725518EAFE2C

    Filesize

    252B

    MD5

    57f79b30dbb304a989dbd059217503de

    SHA1

    e11e5e9b47746ecda20a0f205523e58397b86a1d

    SHA256

    e218a52ca9425c080eb3b31841f480234d3c30ff03030969db86bf2bfb4b206a

    SHA512

    579aa140c9eaea6ad96ab933e6ced824a073d7189f4bd46b183c6cb0b72d21ae682f25b3c424971baa0b095226343e1f2277df5a130ef6ec9ea55389ad6a3b80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b05448b83c354e3340c1ff769d3e65e4

    SHA1

    34e177f9d76688725e53fd24a04992f16b5949f1

    SHA256

    6cb91812a744efa173eba4aee13a92fffe83f776170f300eb9e4e7a5dd29bc21

    SHA512

    52a1e0eabd66956d5509e4b2ed2963f423ad07dd9d4be7a5deb46419a86186dc2ff437510f87b5ac4662bab420555461e53d5e8c411c2f408aaa52852be70071

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    41b522c69cbf56d262cf050b553cd9dd

    SHA1

    eeaa54619f6b9f7d156fff0a6dd83e92d23d275a

    SHA256

    0a33d7f3e8f1eea7085b72ad0d9813457410f920f4f7fcaf8708a9d40af86721

    SHA512

    2cd56d2180641f3f5e58d74635c60a00d766c126a39b6d3ae79a5a5f8c47cde69b5ff726befebf0335de44f8ac66b5c291b010cf449eda758786ad485ac26e87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7452c35096ebe631f9dff6f3e2b20c44

    SHA1

    550a79e47caa95cbdc60134af90962433ecdb423

    SHA256

    b632cff4afa29205f0c9f748c52a6d5a0f7a4268ee57d4e449434292dd4f300c

    SHA512

    73802f0b75bc9c825955088e472b29222bbadb684b049fef91a2ca067f849f76ceadbe48d6d6880e224d475d5bfcfdf0e5d2c28effb9595d97aba59a833c3549

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    da2fcb2138b15b149c87df21c09c27a5

    SHA1

    9de29550d21640f054c8808c0ba9ef67a5f10227

    SHA256

    e1d1ec2da4e5a998c40cc52fc4693924e3ea21f8ce1c6e3fce4d60b9e03a0746

    SHA512

    8596d6ab5a13ad7823847c76c56e9a1ac8bc3ae7d41ba64350083472e112d158e0869e655d8a6873621622df0014f4fefddaa140cd67a3fd3fdf26681fcb63cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    63aae08936d1bd32dfb17f628f87b9a4

    SHA1

    87ec7e926d4bf7dfa48d983c7994c23dac8301b7

    SHA256

    a25eb17fe6a8a0ddf548383ecc35e072a3457de9f255554c609ee8062eae8d2d

    SHA512

    bbdb9fdbc6c378638f3401000ea8eeabb6efc0cbf0d601c91f0a902b8705888989389f2758d83ba54f6ddbf3a69ac9947ff7874ac835f73da3749b234878c6f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c3d5c8c6372475acefad15002c03bcb

    SHA1

    864c028a1a83f41d01ee61dc3bee57289b704210

    SHA256

    58599f5740ae41499bd9ae61d6368828c0d4a9c4966258edd4bfb8661703af5d

    SHA512

    1bcf087eadfeea13c364b9f402a4f9f48ebbd342adcdcc9534ab0a0290a74d1ffd701b7bf4e12177281b0038de58287eb22cd96e9d94204c1a22664bf1d8c0cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1cbab5bd23572b5e6255417229707f3d

    SHA1

    39d6c1d1a0813b801de2a622b46a7c2209f3faec

    SHA256

    12104aaf59b980a8063d072f28957e4a5dd5c6866acf97c1a9377fe7dfcd8e9f

    SHA512

    95a4fadf67d06235ee7fae4a862d51613a1d0dffef0aedd55086f8eb77da6759f3ace130a0556a99aefce68315a9483f7c122a3754573d2a11b52a118df7f03a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    58b9968ba4c8342f89f63ad4f8cc597e

    SHA1

    ce8c8abce962093abc54811c8fb3862bad4b9f74

    SHA256

    3161c578af1eac707a33773734f3b81572d288039cfb9e561477b5ebbadd15bf

    SHA512

    0d4d1608e2eb5774df8ccd83365fae4fb9bc30a506d3c3c72cb88d94c9956adf473e7649d74409c440406ac3006ed12ed9e8dd81edc64497184fa7713525691f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c42f43366eeaa092b38ec05cc56d1ca9

    SHA1

    6f2f5a4167099091cfee6bcbc127166054e20fd5

    SHA256

    c9ad1f068a6971689d997f1d41421776e585a59046d7fed0a2273e9a79a4f6dc

    SHA512

    414de5605ff3ca0804ca07bea45b521234b1919e74ead6b46c00142ac1d1355216a80e4cec6a9e909396e169cfb82c073c1c208b705d1170e5e296bafc38ec55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    313a2f51468b2e76679ddbe57b523ee6

    SHA1

    805e9b17d5cecda94ad40714e46947f0f67310f0

    SHA256

    55a46546a087cdfd2de646ba3ea3bfa7a194e63baa38ff2bb2b6ed1ac725c499

    SHA512

    8c96181234f14c6a9149ba226dd0aebb34193aad94ab6db9aa35b82f1d33d48a5b575cf1b8268ceffd7cdfdab1bcde3bbe9ab5c31746e7878f5d7a7a81007958

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6d51449c054e828e540919de6d84550f

    SHA1

    d5e50ae962032e477beac7cfc91f739998ba3c47

    SHA256

    628090fec0cf3bed38f205ba241d6872e984d48701bc811931724acfa26b0e3b

    SHA512

    da14863da0caab3cc36d5fd30d8c30f90a11ed26ca99cd0e29fce39583991f2ef44d64f9cbf3cb1dce8e3471f885a961ae81b4f22685cc6a66dc8b56edd8e5b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b14f6434f438ceedea097356704ac45

    SHA1

    c9f321ae110b6e9b4abf16b61a7f7cd3ae0b1f6b

    SHA256

    f471b486e269a301a40593dda83b3f632f8dc5f72b61e34715252b05c67a7e83

    SHA512

    d7b956115fa7037d828cb73dea0dd71696a00b5d2c7502ac418840cb61536fe34c08fbca9cc9eb2d3762aa3ee641beeea097864017777c77ba3b22185b55bc08

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fb7d505a03873d75f7b7d5a85d7d75c7

    SHA1

    0888e89fca24852535f1a4fdeb7da08f9041f5df

    SHA256

    f9cc9ccea983f0e4f699a30f3eb0af98f50d3ba7e44632dd72ecdf2abb0e1197

    SHA512

    551e12b00184ec8faf5487d9d4398b6f0d760eb26e869e0765c231b045bdf92ee75aabc0959d108b9a1098a9ead1efa59099ddf530826399db424ec1c1815046

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    70e32c0c5b52f32c5f886536b742cb12

    SHA1

    441821b69f9abd82fa542aab46772a0810fe7e57

    SHA256

    592249dbda8cefc9bbe793d6100e2535a1a6fac801e1095165f15072f46ebee0

    SHA512

    d75b728328e14a24b7687258b01fb883719f750d9dd4883a31602758e5aadf7505f4c52109df2588580bdfddbe431d0e63bbc41a874baeb12d016644ca5c8878

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    afa7c161b51f4eba65ce2cced31a136a

    SHA1

    32304bb6d96f1c3f9ca675e1c4df89022a56ac46

    SHA256

    8c4371b998e4441a4a692a933103c6ceb71b716c0a895b0d4286f752c0803d98

    SHA512

    3b4341bd23f32c9cfd58f573d45e3f2d0ecd968a8fc169098a0f55d9b0ee0d57ff3df1880a10e02e7ec0a0a3f8eae945766102bc340da6b623cca28420ae0fe3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    56f84ab29aa555172c8bb1347048887d

    SHA1

    fefa19823f5a6287f9fb71cda5b70d80526a9b8e

    SHA256

    95941ac290bff6b35ab6917cfb2f93a6991d1a809e3d8a158b7c81b64b02e0ab

    SHA512

    e6925812d4c228f927607ba213add88425ffb58d2b9090aaf3bb3e47d887ceba4e6a6a47c8783fcbfe6627a4020fafa7db62fe67a18183ef2469c8b47967bf09

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    61ca1b7c47e443c83c75e90cd2e557e5

    SHA1

    4553928e4d5fd59a620ad2c0f7743829a8c5540e

    SHA256

    52e0375cdb2bb4a84aa7e43daee2c07df2eb8510725b07769845ac7b41db0bab

    SHA512

    e4b98a76cf41bc1c6a3d2c61e35995f13cdc742b850e572543bac6393d1549b610d9fd9a515a386e4cfa1882b60fa2e097c73426ef3ebe74aa52cc8565942a2b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    811bf330c3e82281b34cafeb298c13b7

    SHA1

    f863b754e0872f8ab5f9df51c1ab0c7c8c3cdde7

    SHA256

    7eb0438a12a52715be11f56c258db4f1967bfa3565ce6fbc6c69a60632bdbc51

    SHA512

    8c72efd9fc1a22971709f28b1da2018906cafdbc5147f87e4e958e015255cfc6f9717b4a12e9d087b5bae8765700cfea7da7c7b509add591c0f18da04dcbd18c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    28acfb07c405c70d4e3599aabc120f41

    SHA1

    8f0bf68b9257f54b931eb7cc0a72d50c1c6ea2c2

    SHA256

    d5d799eab95101e8379f9d51e3899b93089c327213d84d8250a8ced8e5800ace

    SHA512

    53e26d39bff0bccaacef251f5b83ba20c00edc1cefe7af6b16376be1747065f7ee9da9158248bcc3cd2cd16d4336ed539dbf145a127fd165c8fb09c8fad5eac3

  • C:\Users\Admin\AppData\Local\Temp\CabCF22.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD001.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    1c1361d1c312895db356ded14f627e1a

    SHA1

    c71dc0ef976c6fe66d93405d67c6f078fb4af053

    SHA256

    92b8e3852842e81a495f2f166ee065cca073199b0a4dfc38b94940b90d2e759f

    SHA512

    b7c9c07983f12cefd0292a9776964d78277d59dfbed7b2c87a2806e878b390d335a55f0cd293660ae15f2913c4bc0b9e2b9093acce4fab91f34371bc2e6789de

  • memory/492-47-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/492-44-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/940-49-0x00000000002A0000-0x0000000000400000-memory.dmp

    Filesize

    1.4MB

  • memory/940-48-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/940-50-0x00000000002A0000-0x0000000000400000-memory.dmp

    Filesize

    1.4MB

  • memory/940-51-0x00000000002A0000-0x0000000000400000-memory.dmp

    Filesize

    1.4MB

  • memory/2076-28-0x0000000000A30000-0x0000000000B90000-memory.dmp

    Filesize

    1.4MB

  • memory/2076-31-0x0000000000490000-0x00000000004A2000-memory.dmp

    Filesize

    72KB

  • memory/2096-6-0x00000000053A0000-0x0000000005464000-memory.dmp

    Filesize

    784KB

  • memory/2096-0-0x000000007432E000-0x000000007432F000-memory.dmp

    Filesize

    4KB

  • memory/2096-1-0x0000000000BA0000-0x0000000000D00000-memory.dmp

    Filesize

    1.4MB

  • memory/2096-2-0x0000000074320000-0x0000000074A0E000-memory.dmp

    Filesize

    6.9MB

  • memory/2096-21-0x0000000074320000-0x0000000074A0E000-memory.dmp

    Filesize

    6.9MB

  • memory/2096-3-0x0000000000270000-0x0000000000282000-memory.dmp

    Filesize

    72KB

  • memory/2096-4-0x000000007432E000-0x000000007432F000-memory.dmp

    Filesize

    4KB

  • memory/2096-5-0x0000000074320000-0x0000000074A0E000-memory.dmp

    Filesize

    6.9MB

  • memory/2672-8-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2672-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2672-15-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2672-17-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2672-19-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2672-11-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2672-10-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2672-9-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2672-26-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2672-7-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2672-12-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB