Analysis

  • max time kernel
    21s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2025, 02:49

General

  • Target

    Kubba.exe

  • Size

    676KB

  • MD5

    332aa2564ed356587d489977705fb53a

  • SHA1

    333847db1556bd2845e616cdbcda32452204e817

  • SHA256

    6d73791cb1c08f5c2c98760bee7cc2fce021b022e2e420ad2e18588daf37c045

  • SHA512

    92b47205a445f0af0505fcfc23cbd0cc2a8bb769969ea8975cac054940a63a5a8674ed4fe82e5527b92347db0ff9c4e384a77d053792dc9954f00723237516c5

  • SSDEEP

    12288:0Y/WcAdxdOYu0IDH4DUAemK9n4ycm5hMFHeG5r5ICyx27ZTJ2lp5siBeFsk:0Y/WcGxdO+IDhAerd7+r5xAwRJ2lpTqZ

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

196.251.115.182:2404

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-J42W19

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Guloader family
  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Detected Nirsoft tools 4 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 2 IoCs

    Password recovery tool for various web browsers

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Kubba.exe
    "C:\Users\Admin\AppData\Local\Temp\Kubba.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:3228
    • C:\Users\Admin\AppData\Local\Temp\Kubba.exe
      "C:\Users\Admin\AppData\Local\Temp\Kubba.exe"
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\ProgramData\Remcos\remcos.exe
        "C:\ProgramData\Remcos\remcos.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2292
        • C:\ProgramData\Remcos\remcos.exe
          "C:\ProgramData\Remcos\remcos.exe"
          4⤵
            PID:1168
            • C:\Windows\SysWOW64\recover.exe
              C:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\falwdtygybvbhwswlap"
              5⤵
                PID:4448
              • C:\Windows\SysWOW64\recover.exe
                C:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\falwdtygybvbhwswlap"
                5⤵
                  PID:6120
                • C:\Windows\SysWOW64\recover.exe
                  C:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\falwdtygybvbhwswlap"
                  5⤵
                    PID:1928
                  • C:\Windows\SysWOW64\recover.exe
                    C:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\falwdtygybvbhwswlap"
                    5⤵
                      PID:4688
                    • C:\Windows\SysWOW64\recover.exe
                      C:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\qcqoeljhujngkcgaucbmglq"
                      5⤵
                        PID:5820
                      • C:\Windows\SysWOW64\recover.exe
                        C:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\swvhfetbirfluicelnogrykcnn"
                        5⤵
                          PID:1256
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c "C:\ProgramData\Remcos\remcos.exe"
                  1⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3488
                  • C:\ProgramData\Remcos\remcos.exe
                    C:\ProgramData\Remcos\remcos.exe
                    2⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    PID:5720
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c "C:\ProgramData\Remcos\remcos.exe"
                  1⤵
                  • Suspicious use of WriteProcessMemory
                  PID:5516
                  • C:\ProgramData\Remcos\remcos.exe
                    C:\ProgramData\Remcos\remcos.exe
                    2⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    PID:2316
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c "C:\ProgramData\Remcos\remcos.exe"
                  1⤵
                    PID:388
                    • C:\ProgramData\Remcos\remcos.exe
                      C:\ProgramData\Remcos\remcos.exe
                      2⤵
                        PID:924
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c "C:\ProgramData\Remcos\remcos.exe"
                      1⤵
                        PID:3076
                        • C:\ProgramData\Remcos\remcos.exe
                          C:\ProgramData\Remcos\remcos.exe
                          2⤵
                            PID:4340
                            • C:\ProgramData\Remcos\remcos.exe
                              C:\ProgramData\Remcos\remcos.exe
                              3⤵
                                PID:5580

                          Network

                          MITRE ATT&CK Enterprise v16

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\ProgramData\Remcos\remcos.exe

                            Filesize

                            676KB

                            MD5

                            332aa2564ed356587d489977705fb53a

                            SHA1

                            333847db1556bd2845e616cdbcda32452204e817

                            SHA256

                            6d73791cb1c08f5c2c98760bee7cc2fce021b022e2e420ad2e18588daf37c045

                            SHA512

                            92b47205a445f0af0505fcfc23cbd0cc2a8bb769969ea8975cac054940a63a5a8674ed4fe82e5527b92347db0ff9c4e384a77d053792dc9954f00723237516c5

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                            Filesize

                            1KB

                            MD5

                            517b42c897481d3ef87c7d3590dc4556

                            SHA1

                            52db14d62d6e762bf4ee6458d4e562abffe66dd1

                            SHA256

                            8b03de3b33087141fa82c1e1cd7e6c704a47d755316c62cbaa63b5eb84192af5

                            SHA512

                            86c0d25d1825b6dbf3b415ec3e5ce87a55177bf9c9e6ff176dd98b8a44fe9082ae457d2b8c01c4f24c0e1e530c99307bce3c5600f1d1c9964e24551d99175b11

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_D1B2C3FDC4CC18AB2F25B2BB5E2D4A02

                            Filesize

                            471B

                            MD5

                            1d4632adbc075ecbc910f1dc1ea7aab7

                            SHA1

                            aefef0d5a36d2ccbb0269d89acd7607c185563b9

                            SHA256

                            da21852c5ec264fdf502462af387cc11b877e6df1a9cf6aa11634f084bde188f

                            SHA512

                            e024a6cc7f80cf0b70479bb3d98593f7b2ee07ecf37eaa892a828f889614cdce3a6a3cb203a02d7150b593f2f48e9bf1e80635b07f2fe6d2a7f5685f6b9fe34b

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_767BFDABB86D2457BE4D67797F01BA7C

                            Filesize

                            471B

                            MD5

                            1682d9a317fb0ef78c8f96dc125f7c39

                            SHA1

                            774f79aa6262843fe9a4a54b978c66d485d18a05

                            SHA256

                            97f950c9a3dfd9f27b81d1c77f10e0f1788384bb25fb76d94fcbf94a80525988

                            SHA512

                            5dccd2aa4eda7edb42e133e6a1d45bba89f9a12add0d4e867fc07a03c819c28ffd89f8b56213b4eb9580cc944f9d1ac05757ed93ecb68a3343e0d060ddfd3bb4

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                            Filesize

                            410B

                            MD5

                            bb3d402eaa348edc6216510723fa9edd

                            SHA1

                            eb353fa470795b84949ba0d0e0768622c29645e9

                            SHA256

                            db9f9546c0b9ffaf3f2400b5066481df3e13daa8cbd7c781c545f88fe26b7bf8

                            SHA512

                            2d1b4d9e0544fd01750a25ba820f5d4dfe8c1e01693f0f36f5f912245ee7b1947409f9a861ba0071cac38caa51feddf302cdb45fad96d69344ec0d71b38ee917

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_D1B2C3FDC4CC18AB2F25B2BB5E2D4A02

                            Filesize

                            402B

                            MD5

                            1d621eb15ab5203d17b3362bbc92255a

                            SHA1

                            686027b736470a58cad43c93df3ca45c1b4e060e

                            SHA256

                            a30fb02def470705e39cbd3b98bb43dc76459c9c37169cc31d5a63cd8fe5617d

                            SHA512

                            28e20fcd359915fcad4842cb3960e28bdb1c52097ad5b6d358dccdd99e5dbf9d3a035f4bc723d44cca3803bf3446c268fa9b190676c8f5f7d7eb069ec4657dde

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_767BFDABB86D2457BE4D67797F01BA7C

                            Filesize

                            406B

                            MD5

                            ccee262d9518e74f0939014a15adb1e2

                            SHA1

                            d5d0ead1ffef4d8d2421508d231fcf7d33b6f72e

                            SHA256

                            57d18e8e8a70ecad22da2517b9536a1bc0f9b4288e3536650616bdfbdac18710

                            SHA512

                            6afc540b8ab27473d68d5130c36a3d3313c330d5739cdce83966ca71e31429249e2fcf91c99e26e2c53a1507473967b97752cbd756b02915cc2f641de3aabb1b

                          • C:\Users\Admin\AppData\Local\Temp\nse77C2.tmp\System.dll

                            Filesize

                            12KB

                            MD5

                            cff85c549d536f651d4fb8387f1976f2

                            SHA1

                            d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e

                            SHA256

                            8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8

                            SHA512

                            531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88

                          • C:\Users\Admin\hjemmefronter\Synthetase54\Xylophagan\Bagwash.Vas

                            Filesize

                            342KB

                            MD5

                            54eeb211f2c4c70869673e021074ee0e

                            SHA1

                            4287659180864df64e2a79c5af9024ef1545c9ba

                            SHA256

                            edbd395f51ebbd89112dfdd14e1d69010e28d0e82fcf12b9df1633c2d7850c46

                            SHA512

                            2584ba6ba63ff831ba2cc11da771df77fc4e254287561c184af83bd02b858f6a7d625da2664619984f2f5b785e25af037d06521d484f3a23b51c3a7acc5c27a8

                          • C:\Users\Admin\hjemmefronter\Synthetase54\Xylophagan\Lamper.jpg

                            Filesize

                            97KB

                            MD5

                            76aa50f1e0bcb4ed44e0da686fb1115a

                            SHA1

                            c2083f4218ab03cb5dd7e1fa12cc5b026a2b63fb

                            SHA256

                            d7e7113a11841604012fdcb8037ca28de5161a3b9ccffcb8440fba1847e128d8

                            SHA512

                            9e295d7881d9e7341f1082221bb5f5ebeee0fa9cb02c6c5ae58194037be23611e5e3a910101afa7509467445a430f459fb3c54016e2874df45781882a0498be4

                          • C:\Users\Admin\hjemmefronter\Synthetase54\Xylophagan\Nonvitreous.Ens

                            Filesize

                            51KB

                            MD5

                            954e674acf3dd9eb2071954b08f6cdca

                            SHA1

                            46a6cc706e97f17eb7f20114def5d7f5a4a7692a

                            SHA256

                            66da0f0edf2b1b158729486c7c5ca48cce7490c36ffdd4d794da528d8f033f85

                            SHA512

                            b95a07d56fa9948622407391179bae4ac5af9101a34fb914208535a27f236b5c14b581800f063841bd13c3483ccda6826715260774d4c4da18a6091c434a787c

                          • C:\Users\Admin\hjemmefronter\Synthetase54\Xylophagan\blev.sic

                            Filesize

                            321KB

                            MD5

                            2bd23a1fe1db40048da512bea4500417

                            SHA1

                            983f7443e7c4c8a37cc92b06b9aefee6e6bf57b9

                            SHA256

                            f90b84e5e4fad7afcec2a9f9d29fbacde444ff121f6b1801c2dce6748fb05068

                            SHA512

                            e0ce68c81576f52643b59ac448b949617810a62f9b093073304a443d879ab671b006a58c0e50b29197bf053c4d8c01670a3b9efe0d564dd9dd85e160bd281509

                          • C:\Users\Admin\hjemmefronter\Synthetase54\Xylophagan\colleens.txt

                            Filesize

                            370B

                            MD5

                            313a9633a58de00315d4b8a88456dbd4

                            SHA1

                            ac8642ba8fc5ad947be76992b388ba90c1f4f29d

                            SHA256

                            cab61979083d60310c85253bc87b5047a40869b56f1d78885f45556a809f47e8

                            SHA512

                            c274194f91eff6525d039f602bce9294ebfd805ee1382946a3f89fdf6e6c7e315ff50462c54c51a80da97de66c75e2b450d626b28ac31f391c85f9a6de1f87d1

                          • C:\Users\Admin\hjemmefronter\Synthetase54\Xylophagan\fagkyndige.ini

                            Filesize

                            39B

                            MD5

                            cfc5144c3a75d5f817151ecf6e59b0f3

                            SHA1

                            324399c734ad798dd6f1eead4534f6f9e6bbdd21

                            SHA256

                            e8ec675329b6f0e7223548d4dae4fe8787e077ea654913ab4509d927ad5e0bba

                            SHA512

                            1e91beba4352d45e4a784956c4b2c7cd19f3cc38bece8aa1f0729e4a4b6f334d8b55ff1083bf42c942b7c755740adae4e316654828c4c004bc838671505b2adb

                          • C:\Users\Admin\hjemmefronter\Synthetase54\Xylophagan\myocardium.set

                            Filesize

                            394KB

                            MD5

                            e394eba898e6c64de87228a8e2f86480

                            SHA1

                            56d3342568f90282edcb24da3d79559316d1f181

                            SHA256

                            f2eaac6d269bf7ba5e033a525359ea1865dcb4008f8d320fa1883e90705b74f2

                            SHA512

                            bd99eaf068ac0309ddf6ebfe7862dcd33b5fbb4cb350a7f18791d984600e70978e00348a32e0e8157e8a145eb50c18dd9617684ae3f009932eacdc67ba115413

                          • C:\Users\Admin\hjemmefronter\Synthetase54\Xylophagan\noncontestable.sys

                            Filesize

                            356KB

                            MD5

                            1c0e5e3fad38ad4c071145b0c91b1c75

                            SHA1

                            d4332d34c719454b251de7fea2f7ebf74e9ce59f

                            SHA256

                            c9d19087bf0a5cce7b23a791be76d2ed701b7dce69f86baefaa99e7a19fb1567

                            SHA512

                            9b71e0ac39de87e365d87df4052922d545f90e9b899b962459b9f9e5598a19a36ce247e03cc916d76feef53c5a54a6ae7bb8694e08cfa28822a522f2782a6689

                          • C:\Users\Admin\hjemmefronter\Synthetase54\Xylophagan\noncontestable.sys

                            Filesize

                            128KB

                            MD5

                            3baea18c0f478cccea8a471cdfd3c839

                            SHA1

                            696d089f86e93217b7b2c7ca9e867b03f0314d2d

                            SHA256

                            688bfc610d0021755782c957a75dd8e385a8bb74bbed3aec0f9931003c9d1d38

                            SHA512

                            eb182210fb659c6751c306fb68851e409970f64b3784b1ed13c3c39a3606e04d3ad99456809cf940162062626dff6c032f279077cdb8df42b1ae38c1f963b1ca

                          • C:\Users\Admin\hjemmefronter\Synthetase54\Xylophagan\opkast.jpg

                            Filesize

                            8KB

                            MD5

                            a798defe4bd96ce304a2b64ba9db9451

                            SHA1

                            ebe61d1bb9f882db6779e125239c94e24fa31ac8

                            SHA256

                            4c4e725a9de497a0171cb912ae1039cf782bdda0791bc15e6960c643f36282b7

                            SHA512

                            6e5b183e0fd717c7f56318f6cb8b2e273c5541d1c0205cb9af317d66a062613c9d5e08d601ed8164c6bb785349482f2406db34254bc886898a165b3608aebd69

                          • C:\Users\Admin\hjemmefronter\Synthetase54\Xylophagan\wineshop.ini

                            Filesize

                            616B

                            MD5

                            059cb6042549f01a636176876a196d29

                            SHA1

                            434624b61da12f82cd9dd001cf89071e289d6692

                            SHA256

                            c937269a7ddc6b76b73dd9cbd9e64b318665f2c622b00a7ab6e8d0cc31583c2c

                            SHA512

                            6fdd35b9bd2494f7a4831779cf5e55aa7620cc41c08915aca25279dc071f2016e6960c9c50a4d709a64a7b2d01234b11144e82159ad8a671535cade0c66ee208

                          • memory/1168-134-0x00000000016C0000-0x0000000002C48000-memory.dmp

                            Filesize

                            21.5MB

                          • memory/1168-199-0x0000000000460000-0x00000000016B4000-memory.dmp

                            Filesize

                            18.3MB

                          • memory/1168-196-0x0000000000460000-0x00000000016B4000-memory.dmp

                            Filesize

                            18.3MB

                          • memory/1168-195-0x0000000033E10000-0x0000000033E29000-memory.dmp

                            Filesize

                            100KB

                          • memory/1168-194-0x0000000033E10000-0x0000000033E29000-memory.dmp

                            Filesize

                            100KB

                          • memory/1168-191-0x0000000033E10000-0x0000000033E29000-memory.dmp

                            Filesize

                            100KB

                          • memory/1168-122-0x00000000016C0000-0x0000000002C48000-memory.dmp

                            Filesize

                            21.5MB

                          • memory/1168-209-0x0000000000460000-0x00000000016B4000-memory.dmp

                            Filesize

                            18.3MB

                          • memory/1168-197-0x0000000000460000-0x00000000016B4000-memory.dmp

                            Filesize

                            18.3MB

                          • memory/1168-213-0x0000000000460000-0x00000000016B4000-memory.dmp

                            Filesize

                            18.3MB

                          • memory/1168-207-0x0000000000460000-0x00000000016B4000-memory.dmp

                            Filesize

                            18.3MB

                          • memory/1168-212-0x0000000000460000-0x00000000016B4000-memory.dmp

                            Filesize

                            18.3MB

                          • memory/1168-211-0x0000000000460000-0x00000000016B4000-memory.dmp

                            Filesize

                            18.3MB

                          • memory/1168-130-0x0000000000460000-0x00000000016B4000-memory.dmp

                            Filesize

                            18.3MB

                          • memory/1168-208-0x0000000000460000-0x00000000016B4000-memory.dmp

                            Filesize

                            18.3MB

                          • memory/1168-210-0x0000000000460000-0x00000000016B4000-memory.dmp

                            Filesize

                            18.3MB

                          • memory/1256-184-0x0000000000400000-0x0000000000424000-memory.dmp

                            Filesize

                            144KB

                          • memory/1256-183-0x0000000000400000-0x0000000000424000-memory.dmp

                            Filesize

                            144KB

                          • memory/1256-182-0x0000000000400000-0x0000000000424000-memory.dmp

                            Filesize

                            144KB

                          • memory/2620-38-0x00000000016C0000-0x0000000002C48000-memory.dmp

                            Filesize

                            21.5MB

                          • memory/2620-33-0x00000000016C0000-0x0000000002C48000-memory.dmp

                            Filesize

                            21.5MB

                          • memory/2620-22-0x0000000077988000-0x0000000077989000-memory.dmp

                            Filesize

                            4KB

                          • memory/2620-23-0x00000000779A5000-0x00000000779A6000-memory.dmp

                            Filesize

                            4KB

                          • memory/2620-41-0x0000000000460000-0x00000000016B4000-memory.dmp

                            Filesize

                            18.3MB

                          • memory/2620-50-0x0000000000460000-0x00000000016B4000-memory.dmp

                            Filesize

                            18.3MB

                          • memory/2620-51-0x0000000077901000-0x0000000077A21000-memory.dmp

                            Filesize

                            1.1MB

                          • memory/2620-35-0x0000000000460000-0x00000000016B4000-memory.dmp

                            Filesize

                            18.3MB

                          • memory/3228-19-0x00000000745F5000-0x00000000745F6000-memory.dmp

                            Filesize

                            4KB

                          • memory/3228-17-0x0000000003290000-0x0000000004818000-memory.dmp

                            Filesize

                            21.5MB

                          • memory/3228-18-0x0000000077901000-0x0000000077A21000-memory.dmp

                            Filesize

                            1.1MB

                          • memory/3228-21-0x0000000003290000-0x0000000004818000-memory.dmp

                            Filesize

                            21.5MB

                          • memory/4688-175-0x0000000000400000-0x000000000047D000-memory.dmp

                            Filesize

                            500KB

                          • memory/4688-174-0x0000000000400000-0x000000000047D000-memory.dmp

                            Filesize

                            500KB

                          • memory/5580-198-0x00000000016C0000-0x0000000002C48000-memory.dmp

                            Filesize

                            21.5MB

                          • memory/5580-205-0x00000000016C0000-0x0000000002C48000-memory.dmp

                            Filesize

                            21.5MB

                          • memory/5580-206-0x0000000000460000-0x00000000016B4000-memory.dmp

                            Filesize

                            18.3MB

                          • memory/5820-176-0x0000000000400000-0x0000000000462000-memory.dmp

                            Filesize

                            392KB

                          • memory/5820-177-0x0000000000400000-0x0000000000462000-memory.dmp

                            Filesize

                            392KB

                          • memory/5820-179-0x0000000000400000-0x0000000000462000-memory.dmp

                            Filesize

                            392KB