Analysis

  • max time kernel
    153s
  • max time network
    281s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    06/01/2025, 12:09 UTC

General

  • Target

    Microsoft.Bcl.AsyncInterfaces.xml

  • Size

    17KB

  • MD5

    0737b770ba5d854d4887a8f4d9c8de04

  • SHA1

    40a8a356d807d71c102c91d68ad1a0ad6e3fdda6

  • SHA256

    ca53d9b1bbea04c30db4186b015b7c57dce7c5ecdf1cfac9e4afe9ffcf6910f0

  • SHA512

    39a48874d547f714922f4864d3a34c842ac0898b09040796a9046182c093e3ca70f1d20f5d616721129e8d7f6a1f1fdeb3c8277c6bb2eb53b6dc8ea5966003c7

  • SSDEEP

    384:XgOpngSae6jWuTPP/xM2fB8qnmltJ5XZzRzgqW81Fu3DRmfCh7sE+siDBQsFaIs7:0FQa+TDm

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 60 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Microsoft.Bcl.AsyncInterfaces.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:652
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft.Bcl.AsyncInterfaces.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3040
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3040 CREDAT:17410 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3572

Network

  • flag-us
    DNS
    13.86.106.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    13.86.106.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    68.159.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    68.159.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    181.129.81.91.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    181.129.81.91.in-addr.arpa
    IN PTR
    Response
  • GET
    https://ieonline.microsoft.com/ie/known_providers_download_v1.xml
    Request
    GET /ie/known_providers_download_v1.xml HTTP/2.0
    host: ieonline.microsoft.com
    accept: */*
    accept-language: en-US
    ua-cpu: AMD64
    accept-encoding: gzip, deflate
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
    if-modified-since: Thu, 20 Feb 2020 01:30:24 GMT
    cookie: _EDGE_V=1; MUID=32942D843D2A640E1C6D38D63C0D6509; MUIDB=32942D843D2A640E1C6D38D63C0D6509
    Response
    HTTP/2.0 304
    cache-control: private
    set-cookie: _EDGE_S=SID=1644F83D5465647A1F1FED5155DE65B2; domain=.microsoft.com; path=/; HttpOnly
    set-cookie: MUIDB=32942D843D2A640E1C6D38D63C0D6509; expires=Sat, 31-Jan-2026 12:10:53 GMT; path=/; HttpOnly
    x-eventid: 677bc84d889a47d8917fbec6b14b1751
    useragentreductionoptout: A7kgTC5xdZ2WIVGZEfb1hUoNuvjzOZX3VIV/BA6C18kQOOF50Q0D3oWoAm49k3BQImkujKILc7JmPysWk3CSjwUAAACMeyJvcmlnaW4iOiJodHRwczovL3d3dy5iaW5nLmNvbTo0NDMiLCJmZWF0dXJlIjoiU2VuZEZ1bGxVc2VyQWdlbnRBZnRlclJlZHVjdGlvbiIsImV4cGlyeSI6MTY4NDg4NjM5OSwiaXNTdWJkb21haW4iOnRydWUsImlzVGhpcmRQYXJ0eSI6dHJ1ZX0=
    strict-transport-security: max-age=31536000; includeSubDomains; preload
    x-cache: CONFIG_NOCACHE
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 5A8A891E77C24378819FE99C80D74CD3 Ref B: LON04EDGE0813 Ref C: 2025-01-06T12:10:53Z
    date: Mon, 06 Jan 2025 12:10:53 GMT
  • flag-gb
    GET
    https://www.bing.com/favicon.ico
    iexplore.exe
    Remote address:
    88.221.135.32:443
    Request
    GET /favicon.ico HTTP/2.0
    host: www.bing.com
    accept: */*
    ua-cpu: AMD64
    accept-encoding: gzip, deflate
    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
    cookie: SRCHUID=V=2&GUID=1F6693CAA30641E9967A3F9EC95CE5EE&dmnchg=1; SRCHD=AF=NOFORM; _EDGE_V=1; MUID=28DA3C287DD06D2E3FA3297A7CB76C80; SRCHUSR=DOB=20241211; SRCHHPGUSR=SRCHLANG=en; MUIDB=28DA3C287DD06D2E3FA3297A7CB76C80
    Response
    HTTP/2.0 200
    cache-control: public, max-age=15552000
    content-length: 4286
    content-type: image/x-icon
    last-modified: Mon, 01 Jan 1601 00:00:00 GMT
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: FF7F9C6CB1714EC59EFAB3D4C612DCB2 Ref B: LTSEDGE1121 Ref C: 2023-01-04T16:48:40Z
    date: Mon, 06 Jan 2025 12:10:54 GMT
    alt-svc: h3=":443"; ma=93600
    x-cdn-traceid: 0.3d367a5c.1736165454.f336cea
  • flag-us
    DNS
    57.110.18.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    57.110.18.2.in-addr.arpa
    IN PTR
    Response
    57.110.18.2.in-addr.arpa
    IN PTR
    a2-18-110-57deploystaticakamaitechnologiescom
  • flag-us
    DNS
    200.197.79.204.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    200.197.79.204.in-addr.arpa
    IN PTR
    Response
    200.197.79.204.in-addr.arpa
    IN PTR
    a-0001a-msedgenet
  • flag-us
    DNS
    32.135.221.88.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    32.135.221.88.in-addr.arpa
    IN PTR
    Response
    32.135.221.88.in-addr.arpa
    IN PTR
    a88-221-135-32deploystaticakamaitechnologiescom
  • flag-us
    DNS
    fd.api.iris.microsoft.com
    Remote address:
    8.8.8.8:53
    Request
    fd.api.iris.microsoft.com
    IN A
    Response
    fd.api.iris.microsoft.com
    IN CNAME
    fd-api-iris.trafficmanager.net
    fd-api-iris.trafficmanager.net
    IN CNAME
    iris-de-prod-azsc-v2-weu.westeurope.cloudapp.azure.com
    iris-de-prod-azsc-v2-weu.westeurope.cloudapp.azure.com
    IN A
    20.103.156.88
  • flag-us
    DNS
    25.73.42.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    25.73.42.20.in-addr.arpa
    IN PTR
    Response
  • flag-nl
    GET
    https://fd.api.iris.microsoft.com/v4/api/selection?&asid=12D3BF746E7E4D1E80AF26F3445EFEDE&nct=1&placement=88000677&bcnt=30&country=US&locale=en-US&poptin=0&fmt=json&clr=cdmlite&arch=AMD64&concp=0&d3dfl=D3D_FEATURE_LEVEL_12_1&devfam=Windows.Desktop&devosver=10.0.19044.4529&dinst=1733929099&dmret=0&drgng=244&flightbranch=&flightring=Retail&localid=w%3A233C152B-B2FA-7850-F5C8-A4BE11623608&osbranch=vb_release&oslocale=en-US&osret=1&ossku=EnterpriseS&osskuid=125&prccn=2&prccs=4192&prcmf=AuthenticAMD&procm=Intel%20Core%20Processor%20%28Broadwell%29&ram=4095&tinst=Client&tl=1&pat=0&smc=0&sac=0&disphorzres=1280&dispsize=14.7&dispvertres=720&ldisphorzres=1280&ldispvertres=720&moncnt=1&cpdsk=241361&frdsk=204388&lo=37271&tsu=37271
    Remote address:
    20.103.156.88:443
    Request
    GET /v4/api/selection?&asid=12D3BF746E7E4D1E80AF26F3445EFEDE&nct=1&placement=88000677&bcnt=30&country=US&locale=en-US&poptin=0&fmt=json&clr=cdmlite&arch=AMD64&concp=0&d3dfl=D3D_FEATURE_LEVEL_12_1&devfam=Windows.Desktop&devosver=10.0.19044.4529&dinst=1733929099&dmret=0&drgng=244&flightbranch=&flightring=Retail&localid=w%3A233C152B-B2FA-7850-F5C8-A4BE11623608&osbranch=vb_release&oslocale=en-US&osret=1&ossku=EnterpriseS&osskuid=125&prccn=2&prccs=4192&prcmf=AuthenticAMD&procm=Intel%20Core%20Processor%20%28Broadwell%29&ram=4095&tinst=Client&tl=1&pat=0&smc=0&sac=0&disphorzres=1280&dispsize=14.7&dispvertres=720&ldisphorzres=1280&ldispvertres=720&moncnt=1&cpdsk=241361&frdsk=204388&lo=37271&tsu=37271 HTTP/2.0
    host: fd.api.iris.microsoft.com
    accept-encoding: gzip, deflate
    x-sdk-hw-token: t=EwDoAppeBAAUGoFunEzxzyai/T0i5tnZAAR1eX0AAZzDIA4ioVQRG1mpLZRyNTlrVA/Dxv++QnARSdDOuD1dVaBi6fgl9KEOY1AAEnpDY7IB2k/z9AKRFBwExiNxg5WowqBQ+WvGcprxFYNTTkcKe7MzfqC6Q8Ix2lIWsSEZ+j1KHTdPDymkCjhKbYklHkw70H3Vs0QMkkLcHZKiRBBL7HjbDpLjMHZIA4jy/3nnKT7EQQrYGNZ2pP2xaUiT7ssRf28OcU9cMYIHP4ESaAZqEI32T5A8ihZT0ORd36srwHxRqjviWarn5hJirs8t7PrOmB60f2LtWObDkWdARoX2pSUXjUAeQTPDTDLkRmV051ZyiUHa4VzAqU4WvV2i2iQQZgAAECmEY/ASHpt/QEIZWMQll5KwAb189zDI575AM14sZBIpCdmMdEl9ORHrvej3kGJhDIT0r7oex6/539X/CY+QjUuUH1c812eVhgt+mPqbGHdVr/l4zIM2qSN2rxF49sbcKim6cd+S2koGQGV4tGCR7RZkndXkV//gUSbeMDhKdGT1818HyKj47Fttr8hGmpMLMqIVEomqgb4+3F0OQQVUm/qmVt4vzfEEsUKbBYEe4+XL/bIb0qBtzzW8AONLEbdDgD7cZRH5Iw3i42lMut/njkEITSa0DQBlcWvIncA8Uhsh4iyHvuO7CrhL+vJm7RU0yG2+w0eDvhAmRBkfe+JFH5nK5CbGlRyOHiRe5Y0V7pZ1Fo+smMLQl3C3eW/cKBXv/cIsCpd3mznwDe/0dTVfl8FndC9YOrZo7AgqosHHkciPO/5PbwnP83RovmS2uElQUHUp4ZyxndNQWdp1oVTjvajPkFrPZXQMJpLjtDzE85yfl/9pZnCeHkbv0bWeL3+aqqsulolDQuZOye3eENSeFtIVfFxJhzPE3KwPndo9DsM3BzGsxLmUycmq/LWcZZ8ASuJ+OwEVqOd68vWrqu9yZcQ0cNoB&p=
    Response
    HTTP/2.0 200
    cache-control: no-store, no-cache
    pragma: no-cache
    content-length: 131
    content-type: application/json; charset=utf-8
    expires: Mon, 01 Jan 0001 00:00:00 GMT
    server: Microsoft-IIS/10.0
    arc-rsp-dbg: [{"DcoPlusDebug":"Status: Ok"},{"OPTOUTSTATE":"256"},{"REGIONALPOLICY":"0"}]
    accept-ch: UA, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform, UA-Platform-Version
    x-aspnet-version: 4.0.30319
    x-powered-by: ASP.NET
    strict-transport-security: max-age=31536000; includeSubDomains
    date: Mon, 06 Jan 2025 12:11:16 GMT
  • flag-us
    DNS
    53.210.109.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    53.210.109.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    88.156.103.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    88.156.103.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    206.23.85.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    206.23.85.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    161.19.199.152.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    161.19.199.152.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    8.153.16.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.153.16.2.in-addr.arpa
    IN PTR
    Response
    8.153.16.2.in-addr.arpa
    IN PTR
    a2-16-153-8deploystaticakamaitechnologiescom
  • flag-us
    DNS
    13.227.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    13.227.111.52.in-addr.arpa
    IN PTR
    Response
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls, http2
    iexplore.exe
    1.3kB
    8.4kB
    18
    17
  • 88.221.135.32:443
    www.bing.com
    tls, http2
    iexplore.exe
    1.1kB
    4.8kB
    15
    13
  • 88.221.135.32:443
    https://www.bing.com/favicon.ico
    tls, http2
    iexplore.exe
    1.7kB
    9.8kB
    22
    19

    HTTP Request

    GET https://www.bing.com/favicon.ico

    HTTP Response

    200
  • 20.103.156.88:443
    https://fd.api.iris.microsoft.com/v4/api/selection?&asid=12D3BF746E7E4D1E80AF26F3445EFEDE&nct=1&placement=88000677&bcnt=30&country=US&locale=en-US&poptin=0&fmt=json&clr=cdmlite&arch=AMD64&concp=0&d3dfl=D3D_FEATURE_LEVEL_12_1&devfam=Windows.Desktop&devosver=10.0.19044.4529&dinst=1733929099&dmret=0&drgng=244&flightbranch=&flightring=Retail&localid=w%3A233C152B-B2FA-7850-F5C8-A4BE11623608&osbranch=vb_release&oslocale=en-US&osret=1&ossku=EnterpriseS&osskuid=125&prccn=2&prccs=4192&prcmf=AuthenticAMD&procm=Intel%20Core%20Processor%20%28Broadwell%29&ram=4095&tinst=Client&tl=1&pat=0&smc=0&sac=0&disphorzres=1280&dispsize=14.7&dispvertres=720&ldisphorzres=1280&ldispvertres=720&moncnt=1&cpdsk=241361&frdsk=204388&lo=37271&tsu=37271
    tls, http2
    2.7kB
    7.5kB
    19
    14

    HTTP Request

    GET https://fd.api.iris.microsoft.com/v4/api/selection?&asid=12D3BF746E7E4D1E80AF26F3445EFEDE&nct=1&placement=88000677&bcnt=30&country=US&locale=en-US&poptin=0&fmt=json&clr=cdmlite&arch=AMD64&concp=0&d3dfl=D3D_FEATURE_LEVEL_12_1&devfam=Windows.Desktop&devosver=10.0.19044.4529&dinst=1733929099&dmret=0&drgng=244&flightbranch=&flightring=Retail&localid=w%3A233C152B-B2FA-7850-F5C8-A4BE11623608&osbranch=vb_release&oslocale=en-US&osret=1&ossku=EnterpriseS&osskuid=125&prccn=2&prccs=4192&prcmf=AuthenticAMD&procm=Intel%20Core%20Processor%20%28Broadwell%29&ram=4095&tinst=Client&tl=1&pat=0&smc=0&sac=0&disphorzres=1280&dispsize=14.7&dispvertres=720&ldisphorzres=1280&ldispvertres=720&moncnt=1&cpdsk=241361&frdsk=204388&lo=37271&tsu=37271

    HTTP Response

    200
  • 8.8.8.8:53
    13.86.106.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    13.86.106.20.in-addr.arpa

  • 8.8.8.8:53
    68.159.190.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    68.159.190.20.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    181.129.81.91.in-addr.arpa
    dns
    72 B
    147 B
    1
    1

    DNS Request

    181.129.81.91.in-addr.arpa

  • 8.8.8.8:53
    57.110.18.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    57.110.18.2.in-addr.arpa

  • 8.8.8.8:53
    200.197.79.204.in-addr.arpa
    dns
    73 B
    106 B
    1
    1

    DNS Request

    200.197.79.204.in-addr.arpa

  • 8.8.8.8:53
    32.135.221.88.in-addr.arpa
    dns
    72 B
    137 B
    1
    1

    DNS Request

    32.135.221.88.in-addr.arpa

  • 8.8.8.8:53
    fd.api.iris.microsoft.com
    dns
    141 B
    352 B
    2
    2

    DNS Request

    fd.api.iris.microsoft.com

    DNS Response

    20.103.156.88

    DNS Request

    25.73.42.20.in-addr.arpa

  • 8.8.8.8:53
    53.210.109.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    53.210.109.20.in-addr.arpa

  • 8.8.8.8:53
    88.156.103.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    88.156.103.20.in-addr.arpa

  • 8.8.8.8:53
    161.19.199.152.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    161.19.199.152.in-addr.arpa

  • 8.8.8.8:53
    206.23.85.13.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    206.23.85.13.in-addr.arpa

  • 8.8.8.8:53
    8.153.16.2.in-addr.arpa
    dns
    69 B
    131 B
    1
    1

    DNS Request

    8.153.16.2.in-addr.arpa

  • 8.8.8.8:53
    13.227.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    13.227.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UHPNQ2KL\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • memory/652-11-0x00007FF8BD910000-0x00007FF8BDB08000-memory.dmp

    Filesize

    2.0MB

  • memory/652-14-0x00007FF8BD910000-0x00007FF8BDB08000-memory.dmp

    Filesize

    2.0MB

  • memory/652-5-0x00007FF8BD910000-0x00007FF8BDB08000-memory.dmp

    Filesize

    2.0MB

  • memory/652-4-0x00007FF8BD910000-0x00007FF8BDB08000-memory.dmp

    Filesize

    2.0MB

  • memory/652-6-0x00007FF87D990000-0x00007FF87D9A0000-memory.dmp

    Filesize

    64KB

  • memory/652-7-0x00007FF87D990000-0x00007FF87D9A0000-memory.dmp

    Filesize

    64KB

  • memory/652-10-0x00007FF8BD910000-0x00007FF8BDB08000-memory.dmp

    Filesize

    2.0MB

  • memory/652-9-0x00007FF8BD910000-0x00007FF8BDB08000-memory.dmp

    Filesize

    2.0MB

  • memory/652-1-0x00007FF8BD9AD000-0x00007FF8BD9AE000-memory.dmp

    Filesize

    4KB

  • memory/652-13-0x00007FF8BD910000-0x00007FF8BDB08000-memory.dmp

    Filesize

    2.0MB

  • memory/652-12-0x00007FF8BD910000-0x00007FF8BDB08000-memory.dmp

    Filesize

    2.0MB

  • memory/652-2-0x00007FF87D990000-0x00007FF87D9A0000-memory.dmp

    Filesize

    64KB

  • memory/652-8-0x00007FF8BD910000-0x00007FF8BDB08000-memory.dmp

    Filesize

    2.0MB

  • memory/652-16-0x00007FF87D990000-0x00007FF87D9A0000-memory.dmp

    Filesize

    64KB

  • memory/652-19-0x00007FF8BD910000-0x00007FF8BDB08000-memory.dmp

    Filesize

    2.0MB

  • memory/652-20-0x00007FF8BD910000-0x00007FF8BDB08000-memory.dmp

    Filesize

    2.0MB

  • memory/652-18-0x00007FF87D990000-0x00007FF87D9A0000-memory.dmp

    Filesize

    64KB

  • memory/652-17-0x00007FF87D990000-0x00007FF87D9A0000-memory.dmp

    Filesize

    64KB

  • memory/652-15-0x00007FF87D990000-0x00007FF87D9A0000-memory.dmp

    Filesize

    64KB

  • memory/652-3-0x00007FF87D990000-0x00007FF87D9A0000-memory.dmp

    Filesize

    64KB

  • memory/652-0-0x00007FF87D990000-0x00007FF87D9A0000-memory.dmp

    Filesize

    64KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.