Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250207-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/02/2025, 12:27

General

  • Target

    af2d72fc2c8e4b4a6b7be2d7b5806d37ffc13b27d2a210ffffcc8c963862e184.exe

  • Size

    2.6MB

  • MD5

    a5bee6a7836dcd947ff0159da4ca0b29

  • SHA1

    9f86f98d5777bc73753cc5a70a2f259b8e1b9e82

  • SHA256

    af2d72fc2c8e4b4a6b7be2d7b5806d37ffc13b27d2a210ffffcc8c963862e184

  • SHA512

    6afc31772009ed4ee6e4ba9733b563bc379a47491cea633054cdce4e6f8798456d202171f212b3572e6d88c90d6d8a1ffff5f484707e5186e0b170ab6f8167e7

  • SSDEEP

    49152:PYbdYAm4zEbdYAm4zXbdYAm4zKbdYAm4zFbdYAm4zB3An3AI3AJ3AiW538r/39vG:PSdrWdrrdrAdr1drlA3AaAtAuv9vpn43

Malware Config

Extracted

Family

remcos

Botnet

mranon2025G

C2

eddy2025.ddns.net:2606

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    word32.exe

  • copy_folder

    Word

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    data.dat

  • keylog_flag

    false

  • keylog_folder

    Update

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    !"$£%&1112222/&HGFDSVC%$/&%&uty%/&%/UjygthUJ-GL327K

  • screenshot_crypt

    true

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Downloads MZ/PE file 1 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • System policy modification 1 TTPs 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\af2d72fc2c8e4b4a6b7be2d7b5806d37ffc13b27d2a210ffffcc8c963862e184.exe
    "C:\Users\Admin\AppData\Local\Temp\af2d72fc2c8e4b4a6b7be2d7b5806d37ffc13b27d2a210ffffcc8c963862e184.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\Users\Admin\AppData\Local\Temp\af2d72fc2c8e4b4a6b7be2d7b5806d37ffc13b27d2a210ffffcc8c963862e184.exe
      "C:\Users\Admin\AppData\Local\Temp\af2d72fc2c8e4b4a6b7be2d7b5806d37ffc13b27d2a210ffffcc8c963862e184.exe"
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2924
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI5IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU5ODUiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODQ0NDQzNjAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MDI0MDM4NzY2Ii8-PC9hcHA-PC9yZXF1ZXN0Pg
    1⤵
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    PID:1660
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{24F2BE75-AFD6-4863-BF84-E173451D2113}\MicrosoftEdge_X64_133.0.3065.69.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{24F2BE75-AFD6-4863-BF84-E173451D2113}\MicrosoftEdge_X64_133.0.3065.69.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4184
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{24F2BE75-AFD6-4863-BF84-E173451D2113}\EDGEMITMP_46FBB.tmp\setup.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{24F2BE75-AFD6-4863-BF84-E173451D2113}\EDGEMITMP_46FBB.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{24F2BE75-AFD6-4863-BF84-E173451D2113}\MicrosoftEdge_X64_133.0.3065.69.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2024
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{24F2BE75-AFD6-4863-BF84-E173451D2113}\EDGEMITMP_46FBB.tmp\setup.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{24F2BE75-AFD6-4863-BF84-E173451D2113}\EDGEMITMP_46FBB.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{24F2BE75-AFD6-4863-BF84-E173451D2113}\EDGEMITMP_46FBB.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff64b516a68,0x7ff64b516a74,0x7ff64b516a80
        3⤵
        • Executes dropped EXE
        PID:3868
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{24F2BE75-AFD6-4863-BF84-E173451D2113}\EDGEMITMP_46FBB.tmp\setup.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{24F2BE75-AFD6-4863-BF84-E173451D2113}\EDGEMITMP_46FBB.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=1
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:4248
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{24F2BE75-AFD6-4863-BF84-E173451D2113}\EDGEMITMP_46FBB.tmp\setup.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{24F2BE75-AFD6-4863-BF84-E173451D2113}\EDGEMITMP_46FBB.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{24F2BE75-AFD6-4863-BF84-E173451D2113}\EDGEMITMP_46FBB.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff64b516a68,0x7ff64b516a74,0x7ff64b516a80
          4⤵
          • Executes dropped EXE
          PID:408
      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --msedge --channel=stable --register-package-identity --verbose-logging --system-level
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3228
        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff7f05c6a68,0x7ff7f05c6a74,0x7ff7f05c6a80
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          PID:4532
      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1336
        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff7f05c6a68,0x7ff7f05c6a74,0x7ff7f05c6a80
          4⤵
          • Executes dropped EXE
          PID:1932
      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --msedge --channel=stable --update-game-assist-package --verbose-logging --system-level
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:4472
        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff7f05c6a68,0x7ff7f05c6a74,0x7ff7f05c6a80
          4⤵
          • Executes dropped EXE
          PID:116
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k AppReadiness -p -s AppReadiness
    1⤵
      PID:1120
    • C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe
      "C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe" /InvokerPRAID: Microsoft.MicrosoftOfficeHub prelaunch
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2920
    • C:\Windows\system32\wwahost.exe
      "C:\Windows\system32\wwahost.exe" -ServerName:Microsoft.MicrosoftOfficeHub.wwa
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2244

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{24F2BE75-AFD6-4863-BF84-E173451D2113}\EDGEMITMP_46FBB.tmp\setup.exe

      Filesize

      6.8MB

      MD5

      bdb1aecedc15fc82a63083452dad45c2

      SHA1

      a074fcd78665ff90ee3e50ffcccad5f6c3e7ddcb

      SHA256

      4ea0907c3fc2c2f6a4259002312671c82e008846d49957bb3b9915612e35b99f

      SHA512

      50909640c2957fc35dd5bcac3b51797aa5daa2fb95364e69df95d3577482e13f0c36a70ae098959cb9c2aaeb4cfe43025c1d8d55b5f8858b474bcb702609749d

    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

      Filesize

      3.9MB

      MD5

      4aaa893417cccc147989f876c6a7b295

      SHA1

      b1e35c83518bb275924ead0cd6206bf0c982d30f

      SHA256

      2c38e3c3f18e2d3fb7f04336356b9b5186cabe06b3343beec318ef0def1a9eeb

      SHA512

      109e0c88977fae65a4950fc38393ca32a70d68ef41aeb75b28e6566e0fa626e32e31be38308e7ed5b6a8ba1f56fb5f2133a07aa8bb643224c3dbb089ce9cfd0e

    • C:\Program Files\msedge_installer.log

      Filesize

      98KB

      MD5

      37f16434c6aa9bff9cc440edf9826d6e

      SHA1

      2e089a696ed3abfe38d59f22a5ca6266d08fdc32

      SHA256

      935d363d3979fcecd8fcde8131988ec4656328892867278bb183040544ae64b7

      SHA512

      f5cbd8aa9110911b70d1559b002f79bc427df28fa9f8c15ee95b05826acd62df06cfa0f6c04dc764e09474f071b8c2fa15e517145981d2a070052910ed224074

    • C:\Program Files\msedge_installer.log

      Filesize

      99KB

      MD5

      7a0ad5fae95a59acf138f926badea77b

      SHA1

      54a2eb502ea4cb719a8a68c488db4d08ed693c4c

      SHA256

      93bcd99ed39cbd1c3d9c9f8c39bb187e49c966987166917243b40ae427f4ca51

      SHA512

      90c648e7c1c2341c7ee5cad90be9c6f5367cc99f86521ae4cc8ebb44b92056f7c56fb2f04a51ea90893d6154ed4fb50fd11fde0fbd3301c49ac0bc03ded572c3

    • C:\Program Files\msedge_installer.log

      Filesize

      105KB

      MD5

      eaecf5cf04d1724fbc69c1ed6b647b47

      SHA1

      1dafc7a6b359f0d272e54fb4b0b586ae5a3573db

      SHA256

      f93cfcfa666cf3b234fc584e5928f867494c6b810fb5c336d5512bfca056068f

      SHA512

      f6dc0e76ef2878ce8ebd89b9a48255442c7bfce8f064b09c89541ea58f7678a603fc845267d445b3d83b7c694f25d3ca16c39e1f38fe2e1034ccd5b9dbc9a572

    • C:\Program Files\msedge_installer.log

      Filesize

      72KB

      MD5

      c4a2a4df57f8aad01cf94d14190050a8

      SHA1

      cc13ec8ef5d658bff770a39f5ace82c13feb5c58

      SHA256

      9366ccd88e7d3ac6ad71e81f329458cecb82ada9ed094ccd8837e6568225cc03

      SHA512

      d00d17971236175e1919b47bd730a1060267338cdbe6f5c382fb5a7973fdb449ce6cab508df3c55d1bca07be058f8184a56e7512c34598947f98f1bc9a3ecaf0

    • memory/1324-47-0x0000000003D20000-0x0000000003E20000-memory.dmp

      Filesize

      1024KB

    • memory/1324-53-0x0000000074760000-0x00000000748BD000-memory.dmp

      Filesize

      1.4MB

    • memory/1324-48-0x0000000003D20000-0x0000000003E20000-memory.dmp

      Filesize

      1024KB

    • memory/1324-7-0x0000000074791000-0x0000000074792000-memory.dmp

      Filesize

      4KB

    • memory/1324-0-0x000000000C5B0000-0x000000000C832980-memory.dmp

      Filesize

      2.5MB

    • memory/1324-49-0x0000000003D20000-0x0000000003E20000-memory.dmp

      Filesize

      1024KB

    • memory/1324-52-0x000000000C5B0000-0x000000000C832980-memory.dmp

      Filesize

      2.5MB

    • memory/1324-6-0x0000000001F90000-0x0000000001F91000-memory.dmp

      Filesize

      4KB

    • memory/1324-37-0x0000000074760000-0x00000000748BD000-memory.dmp

      Filesize

      1.4MB

    • memory/1324-46-0x0000000003D20000-0x0000000003E20000-memory.dmp

      Filesize

      1024KB

    • memory/1324-3-0x00000000776D2000-0x00000000776D3000-memory.dmp

      Filesize

      4KB

    • memory/1324-10-0x0000000074760000-0x00000000748BD000-memory.dmp

      Filesize

      1.4MB

    • memory/2920-144-0x0000021F32340000-0x0000021F32589000-memory.dmp

      Filesize

      2.3MB

    • memory/2920-143-0x0000021F30D70000-0x0000021F30D78000-memory.dmp

      Filesize

      32KB

    • memory/2920-141-0x0000021F16B70000-0x0000021F16B7E000-memory.dmp

      Filesize

      56KB

    • memory/2920-142-0x0000021F30D40000-0x0000021F30D4A000-memory.dmp

      Filesize

      40KB

    • memory/2924-50-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/2924-58-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/2924-59-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/2924-60-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/2924-63-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/2924-66-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/2924-65-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/2924-67-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/2924-68-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/2924-56-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/2924-54-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/2924-55-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/2924-38-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/2924-40-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/2924-45-0x00000000776D2000-0x00000000776D3000-memory.dmp

      Filesize

      4KB

    • memory/2924-51-0x00000000004D0000-0x00000000004D1000-memory.dmp

      Filesize

      4KB

    • memory/2924-43-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/2924-44-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/2924-35-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/2924-36-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/2924-177-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/2924-178-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB