Analysis

  • max time kernel
    125s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-12-2024 20:38

General

  • Target

    bible.txt

  • Size

    225KB

  • MD5

    98b8b1156c117525c118b45b2d3dbb06

  • SHA1

    82e9026c65919215effd3b1a2419250d04d52889

  • SHA256

    1efdf886a13a5beabfb3071f9ec40c35cbd98d87792894bc272fab8718c2a5b6

  • SHA512

    b043033b6e7e339d24de655092770a22616be15fba71697e3c42f1296225936704f303e1f27da7a4d122a3f403ccc9db95631920245fe332848c78b2c3a5a768

  • SSDEEP

    3072:b34/ch8l09xOXYnh8B0b3it9za72jnSSLIamumy0nC/xgjizOuV5m37mqzN09khO:b7he0+RVptmy0CpLb5yLO

Malware Config

Extracted

Family

remcos

Botnet

WaveSourceLeaked

C2

204.10.194.175:4444

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-46FS9Q

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 9 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Adds Run key to start application 2 TTPs 18 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 22 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 15 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 7 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\NOTEPAD.EXE
    C:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\bible.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:2852
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0x98,0x104,0x7ffb42cfcc40,0x7ffb42cfcc4c,0x7ffb42cfcc58
      2⤵
        PID:2140
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2116,i,9957940539928019819,1878479242104547451,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2112 /prefetch:2
        2⤵
          PID:3380
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1912,i,9957940539928019819,1878479242104547451,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2148 /prefetch:3
          2⤵
            PID:3620
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2284,i,9957940539928019819,1878479242104547451,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2608 /prefetch:8
            2⤵
              PID:3472
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3132,i,9957940539928019819,1878479242104547451,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:1
              2⤵
                PID:3096
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3148,i,9957940539928019819,1878479242104547451,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3308 /prefetch:1
                2⤵
                  PID:2224
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3872,i,9957940539928019819,1878479242104547451,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4580 /prefetch:1
                  2⤵
                    PID:1768
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4804,i,9957940539928019819,1878479242104547451,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4824 /prefetch:8
                    2⤵
                      PID:2696
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4880,i,9957940539928019819,1878479242104547451,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4820 /prefetch:8
                      2⤵
                        PID:1580
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4864,i,9957940539928019819,1878479242104547451,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4700 /prefetch:8
                        2⤵
                          PID:1436
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5036,i,9957940539928019819,1878479242104547451,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4824 /prefetch:8
                          2⤵
                            PID:1960
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5056,i,9957940539928019819,1878479242104547451,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4368 /prefetch:8
                            2⤵
                              PID:2208
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4892,i,9957940539928019819,1878479242104547451,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4528 /prefetch:8
                              2⤵
                                PID:1240
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4796,i,9957940539928019819,1878479242104547451,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3708 /prefetch:2
                                2⤵
                                  PID:4304
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=3852,i,9957940539928019819,1878479242104547451,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5152 /prefetch:1
                                  2⤵
                                    PID:5080
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=3344,i,9957940539928019819,1878479242104547451,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3352 /prefetch:1
                                    2⤵
                                      PID:3420
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=3320,i,9957940539928019819,1878479242104547451,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4532 /prefetch:1
                                      2⤵
                                        PID:3948
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=5040,i,9957940539928019819,1878479242104547451,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3256 /prefetch:1
                                        2⤵
                                          PID:3244
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=4860,i,9957940539928019819,1878479242104547451,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5212 /prefetch:1
                                          2⤵
                                            PID:4268
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=5328,i,9957940539928019819,1878479242104547451,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5236 /prefetch:1
                                            2⤵
                                              PID:3984
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=5108,i,9957940539928019819,1878479242104547451,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5096 /prefetch:1
                                              2⤵
                                                PID:1612
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=5464,i,9957940539928019819,1878479242104547451,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3196 /prefetch:1
                                                2⤵
                                                  PID:1644
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=3232,i,9957940539928019819,1878479242104547451,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3284 /prefetch:8
                                                  2⤵
                                                    PID:1004
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=4436,i,9957940539928019819,1878479242104547451,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5584 /prefetch:8
                                                    2⤵
                                                      PID:3596
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4540,i,9957940539928019819,1878479242104547451,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5704 /prefetch:8
                                                      2⤵
                                                        PID:3212
                                                      • C:\Users\Admin\Downloads\WaveSourceInstaller.exe
                                                        "C:\Users\Admin\Downloads\WaveSourceInstaller.exe"
                                                        2⤵
                                                        • Checks computer location settings
                                                        • Executes dropped EXE
                                                        • Adds Run key to start application
                                                        • System Location Discovery: System Language Discovery
                                                        • Modifies registry class
                                                        PID:2004
                                                        • C:\Windows\SysWOW64\WScript.exe
                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
                                                          3⤵
                                                          • Checks computer location settings
                                                          • System Location Discovery: System Language Discovery
                                                          PID:376
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /c "C:\ProgramData\Remcos\remcos.exe"
                                                            4⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:1388
                                                            • C:\ProgramData\Remcos\remcos.exe
                                                              C:\ProgramData\Remcos\remcos.exe
                                                              5⤵
                                                              • Executes dropped EXE
                                                              • Adds Run key to start application
                                                              • Suspicious use of SetThreadContext
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious behavior: MapViewOfSection
                                                              PID:4180
                                                              • \??\c:\program files (x86)\internet explorer\iexplore.exe
                                                                "c:\program files (x86)\internet explorer\iexplore.exe"
                                                                6⤵
                                                                  PID:2488
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4988,i,9957940539928019819,1878479242104547451,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5512 /prefetch:8
                                                          2⤵
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:3588
                                                      • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                        "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                        1⤵
                                                          PID:3276
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                          1⤵
                                                            PID:612
                                                          • C:\Windows\System32\rundll32.exe
                                                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                            1⤵
                                                              PID:4768
                                                            • C:\Users\Admin\Downloads\WaveSourceInstaller.exe
                                                              "C:\Users\Admin\Downloads\WaveSourceInstaller.exe"
                                                              1⤵
                                                              • Checks computer location settings
                                                              • Executes dropped EXE
                                                              • Adds Run key to start application
                                                              • System Location Discovery: System Language Discovery
                                                              • Modifies registry class
                                                              PID:3988
                                                              • C:\Windows\SysWOW64\WScript.exe
                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
                                                                2⤵
                                                                • Checks computer location settings
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2460
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe" /c "C:\ProgramData\Remcos\remcos.exe"
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:3880
                                                                  • C:\ProgramData\Remcos\remcos.exe
                                                                    C:\ProgramData\Remcos\remcos.exe
                                                                    4⤵
                                                                    • Executes dropped EXE
                                                                    • Adds Run key to start application
                                                                    • Suspicious use of SetThreadContext
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious behavior: MapViewOfSection
                                                                    PID:772
                                                                    • \??\c:\program files (x86)\internet explorer\iexplore.exe
                                                                      "c:\program files (x86)\internet explorer\iexplore.exe"
                                                                      5⤵
                                                                        PID:1920
                                                              • C:\Users\Admin\Downloads\WaveSourceInstaller.exe
                                                                "C:\Users\Admin\Downloads\WaveSourceInstaller.exe"
                                                                1⤵
                                                                • Checks computer location settings
                                                                • Executes dropped EXE
                                                                • Adds Run key to start application
                                                                • System Location Discovery: System Language Discovery
                                                                • Modifies registry class
                                                                PID:4748
                                                                • C:\Windows\SysWOW64\WScript.exe
                                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
                                                                  2⤵
                                                                  • Checks computer location settings
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:1448
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /c "C:\ProgramData\Remcos\remcos.exe"
                                                                    3⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:4316
                                                                    • C:\ProgramData\Remcos\remcos.exe
                                                                      C:\ProgramData\Remcos\remcos.exe
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Adds Run key to start application
                                                                      • Suspicious use of SetThreadContext
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious behavior: MapViewOfSection
                                                                      PID:2744
                                                                      • \??\c:\program files (x86)\internet explorer\iexplore.exe
                                                                        "c:\program files (x86)\internet explorer\iexplore.exe"
                                                                        5⤵
                                                                        • Adds Run key to start application
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Modifies registry class
                                                                        PID:3792
                                                                        • C:\Windows\SysWOW64\WScript.exe
                                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
                                                                          6⤵
                                                                          • Checks computer location settings
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:2256
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe" /c "C:\ProgramData\Remcos\remcos.exe"
                                                                            7⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:3000
                                                                            • C:\ProgramData\Remcos\remcos.exe
                                                                              C:\ProgramData\Remcos\remcos.exe
                                                                              8⤵
                                                                              • Executes dropped EXE
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:2480
                                                                              • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                                                                "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
                                                                                9⤵
                                                                                • Modifies Internet Explorer settings
                                                                                • Suspicious use of FindShellTrayWindow
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:4876
                                                                                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4876 CREDAT:17410 /prefetch:2
                                                                                  10⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Modifies Internet Explorer settings
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:1708
                                                              • C:\Users\Admin\Downloads\WaveSourceInstaller.exe
                                                                "C:\Users\Admin\Downloads\WaveSourceInstaller.exe"
                                                                1⤵
                                                                • Executes dropped EXE
                                                                PID:1884
                                                              • C:\Windows\system32\taskmgr.exe
                                                                "C:\Windows\system32\taskmgr.exe" /4
                                                                1⤵
                                                                • Checks SCSI registry key(s)
                                                                • Checks processor information in registry
                                                                • Modifies registry class
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of FindShellTrayWindow
                                                                • Suspicious use of SendNotifyMessage
                                                                PID:392
                                                              • C:\Users\Admin\Downloads\WaveSourceInstaller.exe
                                                                "C:\Users\Admin\Downloads\WaveSourceInstaller.exe"
                                                                1⤵
                                                                • Checks computer location settings
                                                                • Executes dropped EXE
                                                                • Adds Run key to start application
                                                                • System Location Discovery: System Language Discovery
                                                                • Modifies registry class
                                                                PID:4280
                                                                • C:\Windows\SysWOW64\WScript.exe
                                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
                                                                  2⤵
                                                                  • Checks computer location settings
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:848
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /c "C:\ProgramData\Remcos\remcos.exe"
                                                                    3⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:3280
                                                                    • C:\ProgramData\Remcos\remcos.exe
                                                                      C:\ProgramData\Remcos\remcos.exe
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Adds Run key to start application
                                                                      • Suspicious use of SetThreadContext
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious behavior: MapViewOfSection
                                                                      PID:3512
                                                                      • \??\c:\program files (x86)\internet explorer\iexplore.exe
                                                                        "c:\program files (x86)\internet explorer\iexplore.exe"
                                                                        5⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:3056
                                                              • C:\Windows\System32\enb1sa.exe
                                                                "C:\Windows\System32\enb1sa.exe"
                                                                1⤵
                                                                  PID:1068

                                                                Network

                                                                MITRE ATT&CK Enterprise v15

                                                                Replay Monitor

                                                                Loading Replay Monitor...

                                                                Downloads

                                                                • C:\ProgramData\Remcos\remcos.exe

                                                                  Filesize

                                                                  814KB

                                                                  MD5

                                                                  5e5f63cd0ca3ee94c61a2db20ce33fc9

                                                                  SHA1

                                                                  c90ea9645c7cc1ad7553675a7ecdf880b1fb4621

                                                                  SHA256

                                                                  219280ffebd3d771102fc3a7f26529e5e9161366e3a5de2f8943d81dda7756bf

                                                                  SHA512

                                                                  b36df698f1cbe52df754db9fcfba7e6811b6fc74f44a89378ce29356630f66a10d526402e9d133f8ab608bb614e2214945c0b732b4db3d0cad3d3665e062edcb

                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                  Filesize

                                                                  649B

                                                                  MD5

                                                                  fcdda1cce84d9988467ccc6ed06adb7f

                                                                  SHA1

                                                                  5a675ed7e1deef7ab46390e5a4367b230857ac81

                                                                  SHA256

                                                                  dbdf68e71174449a4e086a810018aefe2c106f22f2961442e6c50ed8b92a3d8c

                                                                  SHA512

                                                                  2850ecbe307a5e3bb87afc3126437d0905e1d81f50159ad1c6989881ee0a57d3df710ca2cc1fefdfccccf1b4bd989ada0880dc40e9b6ce832bf26f1e50e658c1

                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000007

                                                                  Filesize

                                                                  215KB

                                                                  MD5

                                                                  d79b35ccf8e6af6714eb612714349097

                                                                  SHA1

                                                                  eb3ccc9ed29830df42f3fd129951cb8b791aaf98

                                                                  SHA256

                                                                  c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365

                                                                  SHA512

                                                                  f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a

                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                  Filesize

                                                                  336B

                                                                  MD5

                                                                  528fc49a14e7d530d0e149ba600ed85f

                                                                  SHA1

                                                                  46756f7d914d56e5410e81a6809c23bbc6882470

                                                                  SHA256

                                                                  3904ce88500b0471c668c6fe5419a8464329957cc9e01f0043f754ddb11e39e0

                                                                  SHA512

                                                                  8291e94d7c7e2d1f5d8f2486ecbc5605ceb8a6edb54bf2cc346bbcc2481a05cb03ebf887c80b87851b153c18d8c9c11a0a219839556758df2e9eeb73364a99ad

                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json

                                                                  Filesize

                                                                  851B

                                                                  MD5

                                                                  07ffbe5f24ca348723ff8c6c488abfb8

                                                                  SHA1

                                                                  6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                                  SHA256

                                                                  6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                                  SHA512

                                                                  7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json

                                                                  Filesize

                                                                  854B

                                                                  MD5

                                                                  4ec1df2da46182103d2ffc3b92d20ca5

                                                                  SHA1

                                                                  fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                                  SHA256

                                                                  6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                                  SHA512

                                                                  939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                  Filesize

                                                                  5KB

                                                                  MD5

                                                                  52fc4a94746bcf07da09e3c2b51f1d29

                                                                  SHA1

                                                                  7f4730d0ef31bd7506d6d3a7c5516300c6b09eb5

                                                                  SHA256

                                                                  bae2778a9a04735164b9f27b5c9f5066315ab3796d43dda4ec9da113fd82ebc0

                                                                  SHA512

                                                                  6e8d488cb529f1e7ba6dfaf4409ebabb2fbce99aba010b76aaed3916c011bef464fe17f792c64c243be3c04d02b5390522a12dc745250ed9faf2b96aced757bb

                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                  Filesize

                                                                  2B

                                                                  MD5

                                                                  d751713988987e9331980363e24189ce

                                                                  SHA1

                                                                  97d170e1550eee4afc0af065b78cda302a97674c

                                                                  SHA256

                                                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                  SHA512

                                                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                  Filesize

                                                                  858B

                                                                  MD5

                                                                  1ac26286cbdc2602d3c3bc6e3310a413

                                                                  SHA1

                                                                  7400ab3f2f7498610e97c055985186cbc5c4f3d0

                                                                  SHA256

                                                                  be6e6cc78fc27727fbe5664564045a141ab4bfd72f87f3d224a2a79ae7630018

                                                                  SHA512

                                                                  be0ec546ff6279a2b306bcc498ac080c46616638a4f3116dd9ca802469f0dd6c19815a081386d066205961a317bb1f8f660e985606b8d4dd6fcad9d6ed1b49e6

                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                  Filesize

                                                                  356B

                                                                  MD5

                                                                  d0e9bc5f6e561ecce82d5e01c6e7daa6

                                                                  SHA1

                                                                  1bd79622dcb906ffa3033c5817ea50d69dc7d809

                                                                  SHA256

                                                                  c41dce8d6b7ca74fe7fc4c9614dd5a7caf1f898608f646730ee87b14fd9e0707

                                                                  SHA512

                                                                  e58603d20dc0b3460f388907c54e7bf63b84110ba9481d40932f91ccbc6f9cc944d43b3c410e40a8f9a47d0416b9ba3ec3b1e4aa04c3214dafec55d86d4e4430

                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                  Filesize

                                                                  10KB

                                                                  MD5

                                                                  6807944f9c26d41c316d714632b01a85

                                                                  SHA1

                                                                  01c0f3ef104088e8255b749637fa8c1eb6e11e50

                                                                  SHA256

                                                                  1f12931befbb6d2b51522026a70e39b674027a72d5b01ae2bf22b61aa443c4eb

                                                                  SHA512

                                                                  06a476337aa33ca3eaedff5340573e5c67282c09e11580725f43edbde4d3c7462d685ce8f7713107fbec9d195f61a526785f7f3250d885e6454df738b477874e

                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                  Filesize

                                                                  10KB

                                                                  MD5

                                                                  92bc2763e3e14238f9e97e999cc08f1f

                                                                  SHA1

                                                                  58a3ec78b97231f276b8543a51491e91379f2850

                                                                  SHA256

                                                                  21ec756c9ef8df9592356abfacfafd85aa0024ded3981db1ec7a76ebb6cc129f

                                                                  SHA512

                                                                  f521c1ca1cc7f587b425eedd713fe5d7fc0cc46bc069031d1870f07070eb71c365b9d33da3edeef7a59a9c82ece97067af4afc9abf06f1406addb1310ace5113

                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                  Filesize

                                                                  10KB

                                                                  MD5

                                                                  2c6f22f4aeda6bb36bc1fe751d0b43bc

                                                                  SHA1

                                                                  475f9d820fb2c5f50f4741b1b59f571a3f9a9327

                                                                  SHA256

                                                                  27e546a9878ce1f11f6091ab18120ca113b9d5ea30dafc1a0658925b104a9490

                                                                  SHA512

                                                                  be2cda184c2bac5293e1d3b6af81cd47d69ebd0e9cf066c2f4198a1230dcbe976e60f76c37348a1673c117fcae39979451118c63d0e14391cb782caeeb785c37

                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                  Filesize

                                                                  10KB

                                                                  MD5

                                                                  3459b7e4fa66ca569e3803aa48d2cc7d

                                                                  SHA1

                                                                  83984792a37130d718718da165fcb6ee344cdc09

                                                                  SHA256

                                                                  5748b700b16df8c10f0a877a16e32b0ec76003c2f384e8f2e2b195227d7982b0

                                                                  SHA512

                                                                  53116a77103df2e2ff99893897bb84238f91a71cb17884f890468d3552693d09ab66f00af70cbe080281638a9466ef8467eede2ebdeadf3d306a3a492f34c747

                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                  Filesize

                                                                  10KB

                                                                  MD5

                                                                  b2d54fb4273b0ebed77c00ba282aba79

                                                                  SHA1

                                                                  b622e45107ba04fa8fd6248c7416997a338734c6

                                                                  SHA256

                                                                  97691c50fd05f96a51fbb2ff25afca9e6ffb01d4eaab54c287421b9d97e7e8a8

                                                                  SHA512

                                                                  8ee7c48dcf0f47959b58ffb0d067d9da51ad7950ec3b1e9719980ddff1ab76e5552f9818f98accfe292d36b1e050082b0ae93ff8a5fca80e46f10c681fce7546

                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                  Filesize

                                                                  10KB

                                                                  MD5

                                                                  9acfabbb916ea0e8985a1a2ea1ae66a9

                                                                  SHA1

                                                                  657e1d9145d106e9bc0a7176338d60329d5dd7dd

                                                                  SHA256

                                                                  b94c3badb95ba5f93fb8c0249c4e1576c1dbef9319b73a037a820798d5513996

                                                                  SHA512

                                                                  c6ae836aa8858be7f17ed4ff3e66be3e3f143a4f23715913a37c7915db79e2479c367dcc15631b982d1d93bfb608f4d3e93f9514c85b54e12c83e70125391e45

                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                  Filesize

                                                                  10KB

                                                                  MD5

                                                                  9a3b62434970c6115c37e9dd192772cd

                                                                  SHA1

                                                                  a7c06486a7a32d174100bf5341f05c00a4119004

                                                                  SHA256

                                                                  e8cbc9072ecb0adb65c05b4b304cf6140cd503dc8f6a1efcdec472b7fe5361b3

                                                                  SHA512

                                                                  ae311926c04ba9472aee7b41c75357342154fe91ab9ae4e632274e502a125bafaf0a00123f966732fc5e7099762d9dfe243c942d94e09c0ff6e142c3188e2cb5

                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                  Filesize

                                                                  9KB

                                                                  MD5

                                                                  9ffcb40c79b06f3bd42f2045ef84f040

                                                                  SHA1

                                                                  fd9bb9c762a517408ffeb423f20706850572b96e

                                                                  SHA256

                                                                  af04e6141cf817e68fb5161f8833def513703162bf5fdfd728f295584b4e929a

                                                                  SHA512

                                                                  9078b2b0ba190cc1fd0f074d19b6aeceab8119e4905e54eb262906f66de21253b63eea09d693c5f45ce24a0d281278c80fb3a17260258d59a72198de29812693

                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                  Filesize

                                                                  15KB

                                                                  MD5

                                                                  83a4df5fa85f0f96bc795cf915c60692

                                                                  SHA1

                                                                  24ff0ad5722db2b37aa300480240833bb7634991

                                                                  SHA256

                                                                  c30cafae01c0e9ae8ca1bc095bb147cc33b110ed6aa50641483a203bec1db6b2

                                                                  SHA512

                                                                  4ab430330ccac2850c0e7ea9bc61dd19339adfc88aaddb9bf3b27e1c2108f691562bca97c0318c1fefe4ea0e400c8c2bd729b148b91e04dc4c3c4aaff46d726d

                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                  Filesize

                                                                  72B

                                                                  MD5

                                                                  3f7f8fa8f6fa8d5cfc380cf442b30dbf

                                                                  SHA1

                                                                  2259c183092459da2092ab93ffea7050a7fcf4ea

                                                                  SHA256

                                                                  cc291630ea00f848c5b76a6a357c0cf9c61220d8ff235325f9f38c303092a8d7

                                                                  SHA512

                                                                  088621e61f95edfeda3ca89ebcfb86338a7fcee8822c04baeb47e240fc3c954d6d5d11342e9901519dda7776860a66c1e11e86b8f53697f3678a3f7c77d7e984

                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                  Filesize

                                                                  231KB

                                                                  MD5

                                                                  7ee9aef08afa987c6b77e29b7ec9c356

                                                                  SHA1

                                                                  dd60600026a011504069e2ae94dacf4f146c63b6

                                                                  SHA256

                                                                  3678dbc2fe6c2c2da058a71543d87be065cd9f4caea136cd19b64a3eab332038

                                                                  SHA512

                                                                  36d0face12e425008c236d6f60fde93743cde3a50cbf7518daf6f5f3e1dbac42f43138fc8712f364cc89be9a873b5bd8f0b0f6524eab0b4166d210b2c1091272

                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                  Filesize

                                                                  231KB

                                                                  MD5

                                                                  753a8021d8f7aad491982088b899994a

                                                                  SHA1

                                                                  74e082a0c01fc17ce82fcc865d013a34f76d1bc3

                                                                  SHA256

                                                                  94d224601668a7d0e127b7fdee51191f66b274e13e8842d10f827a22daf4ce8d

                                                                  SHA512

                                                                  9b20495a58d6fd017833eea5384f9dc30b940c24ea828df45d71f0a0e68357e0607e2b3a116febd314d7f8627a699470f11b9c45c6db4134d98d3c376cbc8d35

                                                                • C:\Users\Admin\AppData\Local\Temp\install.vbs

                                                                  Filesize

                                                                  386B

                                                                  MD5

                                                                  1ec6289c6fd4c2ded6b2836ed28cbeb5

                                                                  SHA1

                                                                  c4e08195e6c640eb8860acc03fda1d649b4fe070

                                                                  SHA256

                                                                  6efdc40f9eb217f879607614e928b65bff759e424f3efb31faceb2a043c32dc2

                                                                  SHA512

                                                                  20bc46f4dee22f75f15c402c7c2eaee60fff7dd92548050585571dcbefd59485cc249c06bc3f1aac7a138e5ae67c0c3918b46ffa24c8b0f1b092e2f6b6e21288

                                                                • C:\Users\Admin\AppData\Local\Temp\scoped_dir1476_132487727\CRX_INSTALL\_locales\en\messages.json

                                                                  Filesize

                                                                  711B

                                                                  MD5

                                                                  558659936250e03cc14b60ebf648aa09

                                                                  SHA1

                                                                  32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                                  SHA256

                                                                  2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                                  SHA512

                                                                  1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                                • C:\Users\Admin\AppData\Local\Temp\scoped_dir1476_132487727\dcffa81e-1949-4eb6-aa99-0f97d1db418f.tmp

                                                                  Filesize

                                                                  150KB

                                                                  MD5

                                                                  14937b985303ecce4196154a24fc369a

                                                                  SHA1

                                                                  ecfe89e11a8d08ce0c8745ff5735d5edad683730

                                                                  SHA256

                                                                  71006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff

                                                                  SHA512

                                                                  1d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c

                                                                • C:\Users\Admin\Downloads\WaveSourceInstaller.exe

                                                                  Filesize

                                                                  469KB

                                                                  MD5

                                                                  e468b718e67495ea73c85d8258059adf

                                                                  SHA1

                                                                  dcad70f5c39ab85f900ef1288067dbf51eaeb503

                                                                  SHA256

                                                                  fa9f629254a8bbe915bbd587c0c060de580a18992103858a1d16686de8bd717e

                                                                  SHA512

                                                                  b4eb6cc848b5ebfc6bab7e1cc033ec468bc8cf2fed72ea912f9fc60d6eaab75664f4627646960dccab2aceefeab9c5acbd2fe1b57d992c62358929b4d840dedb

                                                                • memory/392-642-0x00000135E7950000-0x00000135E7951000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/392-648-0x00000135E7950000-0x00000135E7951000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/392-643-0x00000135E7950000-0x00000135E7951000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/392-636-0x00000135E7950000-0x00000135E7951000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/392-638-0x00000135E7950000-0x00000135E7951000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/392-637-0x00000135E7950000-0x00000135E7951000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/392-646-0x00000135E7950000-0x00000135E7951000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/392-644-0x00000135E7950000-0x00000135E7951000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/392-647-0x00000135E7950000-0x00000135E7951000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/392-645-0x00000135E7950000-0x00000135E7951000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/1920-590-0x0000000000740000-0x00000000007BF000-memory.dmp

                                                                  Filesize

                                                                  508KB

                                                                • memory/1920-591-0x0000000000740000-0x00000000007BF000-memory.dmp

                                                                  Filesize

                                                                  508KB

                                                                • memory/2488-565-0x0000000000910000-0x000000000098F000-memory.dmp

                                                                  Filesize

                                                                  508KB

                                                                • memory/2488-566-0x0000000000910000-0x000000000098F000-memory.dmp

                                                                  Filesize

                                                                  508KB

                                                                • memory/3056-660-0x0000000000910000-0x000000000098F000-memory.dmp

                                                                  Filesize

                                                                  508KB

                                                                • memory/3056-661-0x0000000000910000-0x000000000098F000-memory.dmp

                                                                  Filesize

                                                                  508KB

                                                                • memory/3056-663-0x0000000000910000-0x000000000098F000-memory.dmp

                                                                  Filesize

                                                                  508KB

                                                                • memory/3056-664-0x0000000000910000-0x000000000098F000-memory.dmp

                                                                  Filesize

                                                                  508KB

                                                                • memory/3056-662-0x0000000000910000-0x000000000098F000-memory.dmp

                                                                  Filesize

                                                                  508KB

                                                                • memory/3056-674-0x0000000000910000-0x000000000098F000-memory.dmp

                                                                  Filesize

                                                                  508KB

                                                                • memory/3056-675-0x0000000000910000-0x000000000098F000-memory.dmp

                                                                  Filesize

                                                                  508KB

                                                                • memory/3056-677-0x0000000000910000-0x000000000098F000-memory.dmp

                                                                  Filesize

                                                                  508KB

                                                                • memory/3056-697-0x0000000000910000-0x000000000098F000-memory.dmp

                                                                  Filesize

                                                                  508KB

                                                                • memory/3056-696-0x0000000000910000-0x000000000098F000-memory.dmp

                                                                  Filesize

                                                                  508KB

                                                                • memory/3792-604-0x0000000001140000-0x00000000011BF000-memory.dmp

                                                                  Filesize

                                                                  508KB

                                                                • memory/3792-603-0x0000000001140000-0x00000000011BF000-memory.dmp

                                                                  Filesize

                                                                  508KB