Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2023, 02:04

General

  • Target

    Purchase order (2).exe

  • Size

    2.1MB

  • MD5

    8fb77e0a72fd58877460ae734179d388

  • SHA1

    2dba24ec72dcd704d98d96de2b93d4c9c3f82f26

  • SHA256

    61af5cbcf8452d49cd6a2f9e562bebcd55a560a68aba7bf1d591f01bbb9c0290

  • SHA512

    d3dd24ad1ebd82ff276b9c07a5597a7154045fa1ab94325691c4f4f7ad6a3930b16f6d1b6d20349874091ee5fa518f79acbdf52f67ab1d09ac2d94ae66740a20

  • SSDEEP

    49152:XVSZZ9WBVVjJNOUrrbsyc2TP0DHEwb3zxG6R:hrrDwbzxG

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Drops startup file 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Purchase order (2).exe
    "C:\Users\Admin\AppData\Local\Temp\Purchase order (2).exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ipconfig /release
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2984
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /release
        3⤵
        • Gathers network information
        PID:2636
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACcAaAB0AHQAcABzADoALwAvAGcAbwBvAGcAbABlAC4AYwBvAG0AJwA=
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://google.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2488
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2476
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ipconfig /renew
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2752
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /renew
        3⤵
        • Gathers network information
        PID:2904
    • C:\Users\Admin\AppData\Local\Temp\Purchase order (2).exe
      "C:\Users\Admin\AppData\Local\Temp\Purchase order (2).exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1756

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

          Filesize

          914B

          MD5

          e4a68ac854ac5242460afd72481b2a44

          SHA1

          df3c24f9bfd666761b268073fe06d1cc8d4f82a4

          SHA256

          cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

          SHA512

          5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          1KB

          MD5

          a266bb7dcc38a562631361bbf61dd11b

          SHA1

          3b1efd3a66ea28b16697394703a72ca340a05bd5

          SHA256

          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

          SHA512

          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

          Filesize

          252B

          MD5

          d7a1776b9f0b6a531c8a26770c1e25f8

          SHA1

          c973afd09c88b765b6c4c188125ef9a3e565e82b

          SHA256

          d56d422fdcf9907a509836dc524187386119e336f30ec4f8473150f439c0afce

          SHA512

          73a62d5ab5448e6173e9c690ea722e4bb4c5ccfde7056efb2de9b919c7c9f9a797f2baa7259dce500ea67261f002b482fda0e77bd57330623fb0c816b8df3f12

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          2b6002504c39e575b25effa36b793cbe

          SHA1

          c0f7ae1c3df3c3fa250dd592729d2b09d591aab2

          SHA256

          ddf6650ebcaf2d2fa7c19fc2f3870f47308f820b7a6c584a55677662d0e82202

          SHA512

          14003abcf1c54fb3ba844cdd71ab8ab63906c62fb28ee6ded6283b29cc4ccf9b8eb52a858cc41ce6e8643687528418f8c775b912fe1eefc6649f41a306bf012f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          00bc919575ee5f3c3a01f8710877a1be

          SHA1

          712770fe05b012564143a8c411129d96d99ef0ff

          SHA256

          7ca73e891101525228fa8bb4f2f111ef9e5b4291a8bbfcec8d8b5bcbc5ec556a

          SHA512

          b277fda8d33211b516fb9600a64d395169c12a72e45bc60378bbe209a316d5188b71e49562ea19dbcf49e9e9ce656b568fb76ba6e8a14ce6c3eb5a510d526575

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          9a98beef0474b6ea83f87cb88d2883b4

          SHA1

          5eedf16083b03e6883458f45590c252bc6e7f21b

          SHA256

          faedbc83e38b1b2e2314c08aa32db2db67c5bee7676562e6ed9458258c7a1476

          SHA512

          0755fc1a2ca57214e3b6553bcf4b439cc5471ad5c3438b8730a288aab1a23c446f36b54a1f94d2be58fb060ecf569c531fa26a22cd19fac6a27eb233c930a8e5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          ba2084dd1fa7a079305814d953973d79

          SHA1

          3b0d6acc9afcfb0ad3bbc1bd6b079724ae4f3cb1

          SHA256

          4667858d170e9b2331dabecea24c62dfe6ee26fda415de68c27c8dda8b2e222f

          SHA512

          e0ff0aca3de1b1a972d9e0cec6c68458b1995fe280f2f65fa267ae1deeac7682a763b942ac3a04138eef5a502f89f04897779d87dc6d75b003d159b7b5e9bb1b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          6c5cc76c9078dc7097684cb67c16b029

          SHA1

          e9adc62ec67d882c0305ad3f969b1d6eb752df04

          SHA256

          7f0ea6bf2a6bf1cb09ca173207bf19c2027056a080cd3a96691eca3a0b5a8f8f

          SHA512

          197ec40342859c4a35653484db8d577d8ef342dc2a748f1c4a46d13641ff04ad0142d1ca2bf3b2366286df40dbe764e22aa98cfecc4719f7769a0846553f8aae

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          f748e1f51fd4bf6f42bf39aab6ab8a4c

          SHA1

          3e88bc700f51e18cf056271ab4e1a3962f9ef256

          SHA256

          deec2ee1ec277b5131a69d5b54d37d5c979f8991ae158651e73241f657c51426

          SHA512

          06fa5208c19928c0dc5c21febfe06c4dda365011de85313990e66136249dbc6bed5732f2958132936889ffe032e142b7b8018689327515af3fa4c9b94aa6d895

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          3bf591a4b0bb417eb1906c3be8c7d7ef

          SHA1

          e75aeaee9ca2a98c75168c2145125a9623c5e351

          SHA256

          8c7fe978d7b8fb613eafb1a1ea2300e25c86120f759e31e23ca56c0b4163f76c

          SHA512

          410c5bcaefabbd25ca8dbc8468eaacb7ab8b5b430db24956a64b95f19780a5ae2e275c7f08e09b0e7a63c3c9becf89f1eaf1fafec211d26d9819b851c2a935b2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          eb63f1c4da13cf0ce68e4e71b808de68

          SHA1

          19f21cf04cb8685dc5cd226627e8c7d34bb9ae95

          SHA256

          49c204850e69f3718bea14eaa28ea60f1824a37f5d3f4b4de68eba7f2a3aafa6

          SHA512

          b58ae048c5adedd35bacbe7a0144bcc594b1b83bb79168cc8b2d9d7dfbd452ea77a0c55dd7282a2e2311975a3c20f40f8d130cdc8950311ff0a5375e0748dd93

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          eb63f1c4da13cf0ce68e4e71b808de68

          SHA1

          19f21cf04cb8685dc5cd226627e8c7d34bb9ae95

          SHA256

          49c204850e69f3718bea14eaa28ea60f1824a37f5d3f4b4de68eba7f2a3aafa6

          SHA512

          b58ae048c5adedd35bacbe7a0144bcc594b1b83bb79168cc8b2d9d7dfbd452ea77a0c55dd7282a2e2311975a3c20f40f8d130cdc8950311ff0a5375e0748dd93

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          115648f33081a94f765a9e41a83e19e0

          SHA1

          c3bff4ecc88a415e91ffcd47e7b438ee496d3e9d

          SHA256

          68f1765144cb25dce29b1560a27da4a0b70937a77dba279045f56a58719076ab

          SHA512

          27a7f6fbfa7cf6a1ec8ccf1b0ac6e73c9ffeed119da890d3c2ec3f18168b002d76d3a20b8543f6d47d6641b0b5231c8c537a38aa984fdc1cfc0aedb2196a2106

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          7a7bb498d94b0e1311bcd140a44a7136

          SHA1

          a6551b3293781b3f463a044215755c1a6c0c25e6

          SHA256

          b84fbcb5874ec32759f0daf65ecd71ce98d3629faa02672cb95cc0bc007a7a91

          SHA512

          f8f7f1f6706e795d122da407c3ef3983de2cfcf7e14e6deb9d0529c942997ccd397d1f2f9d115dedf8b599696ac21f572668ee090d9d1613851e7a00b09c0010

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          feae51df94fb203c998afbc6a718ebb2

          SHA1

          ad1014978bae1d2ee86bdede71e42b2f6cbbafa2

          SHA256

          8788f9e110f6301120f34811327498ba4268e51eeb26d35741ddaf8b55ec354c

          SHA512

          94f3e33258c498ac6ff04dd6bdd865d57e967c73fbcffd2ab4493bdfb1b7d87ea579997006fb5adbdb86b734a7db7905aa9f14c4f672d3ca3b769f4ef66c90ef

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          cfaa983b416e297048f8bfefb78aca54

          SHA1

          48c31c63aecb63446bbd4e57f4954add5ebc8528

          SHA256

          8f1b85fb97cea1830ed41841fb8c4070eef4a03b59a9b1d516b7ef8729c397f0

          SHA512

          21285050df235b564920649875c8568cc2ba46fd6fda7ffd4fad4164b6c89900f822355bd173409b81f2b6778d9e4d9bd9a4ced4c2fb352fffa5dfb1ecb2fa1e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          695b467cc20ac5c3c8b700ed27f78e84

          SHA1

          b0162d597c0bdd0065183c63475a1737ebd05ea6

          SHA256

          7b39c078a7af61bbf009be37a03e99dffa4109e96c0bed9778aed6b084096114

          SHA512

          a9bc705d1623a85c5bf5e3e960d58e90e20fe52d7776a4a8e446623f208684c7d3a1ef668305fee614ac70f9b18afec0bd5ec528d68921ddc1c2fd68776a3d20

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          0da141ef0c1f703192a50af4a3528f10

          SHA1

          da0864548e3f7b83f287d026a7fcb3380bb6fe00

          SHA256

          175bcd12efb30318ccf553569f901909bc128dd47395cbe2216537bce03fe673

          SHA512

          f774c66d1e7d109ad49de67e4b83a1e931e975218955b20a9d652b6d2fb9acb2e577a6cc9ef93c6de2672a62b1ee5ed24be4349b17807795f3d8f3ca0cde764f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          4e16b389e630d1cbfb28141114f20be1

          SHA1

          88a517d60ff7b457ab0ccf927ee82311679753d4

          SHA256

          b20a8236ebf6ee508b97f47a92d1e88aaa6ff930a7e5e5604dbb30920b4487b5

          SHA512

          d36fba250d59d9c36dcbf6df5ac03f970eda2f0edc5e0ba5638aa56700e6598e90bb1833a5a6e6571339dd5126d52e9308499eaeb765ee0575dac8db65d71aee

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          8bc6958da449c0540d400356467c75b1

          SHA1

          2bc51689468485cfc4eda5d4b8b94fdbe8ab90bd

          SHA256

          9737dd844439982e7298db9c240c8d027e89beeac30be4e835d19c285c2ee46f

          SHA512

          7eed2e3a44e976850f9171ba65fa90c2a128e50a1aa6b6a6a3b518a6888748ef15a002e770d9ea8e5bdcee99d3243c184f29231a34646ac15c5fa2b433c4a2ec

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          81a11548d1dbaa47c8d1e86b5136b1d7

          SHA1

          c415c759a26041fc027c30298d95349db570eede

          SHA256

          59236e7288ded68bb084b5fb453945ba308979d25e798269784694dee02ed252

          SHA512

          a6a41e14625e9678f1d9904c3f2dc686c49598cdf50cf1bdb81a0d22aed31905363730aa2016d96f32e218e2f4301bc2bf50fcc2583f3c002010a403c176b496

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          7e32f7c5a528ffce10d20707cbaef85f

          SHA1

          c8485c0994d27db559f07e2483c4e13be70f338b

          SHA256

          66c633c4c5f1b266f31516cb5fe2aedbe165747c1135e180dc77f2a29211113f

          SHA512

          a4a61778c99f6e633431b0fb53a4fe206f9e03a7e3444a4fa0ba320a1b55e9d52783defae0dfc7a295ea65fd4063dd2e00c6a74fd381f42bc2d53f08c7a0d68a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          c34a6b897314c7698564c1b793c11764

          SHA1

          03156ccd4124750c194a0b9509565fcac2898713

          SHA256

          f5052e491633fe9bfa8be41634e2a67c2c2e13586ba8879a01eaa173c81c7a30

          SHA512

          b3ac31bca5443aa9deb4f0f3670593038b64f1d735c619bd9215469f8f8db2bebbd12dd611bdb7e79694b50cee0c5d94241116152a5b50504cd338a3974464bf

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          6e320018105179d9d9b9a6160639d4e9

          SHA1

          cb9d67a7931fa18a2fabae0384b19213b9b60727

          SHA256

          e0361e6076b64884684c172da09ec1a4276cb2ea78d275a533d4ca034004be4e

          SHA512

          1021d475e2a2174136f9209b42c9a01bcd2e211b08b5a34d48b40c4c7cde105dc2e7c02307c08c238fd67f3150cad807042eb9f5d41fbc699f6c876c0a2ae539

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          242B

          MD5

          7658691607cb202eb9a20ae6ed3cc4d1

          SHA1

          52eb197867d18bc958b47c77384d1e5b77240c96

          SHA256

          6ef4ea026e7d00c206f26531f0d8cfa73f9675b7b4b0094a278e1570d32e361d

          SHA512

          8e3b241ad636e552e10ba278100ea8fb8f3d20e49987bfa288c65b88d59469b9f42fd4ddc2543baa85e4c292acd1fd757189f378f374f84143b5848d2295de0e

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\rpg4tgz\imagestore.dat

          Filesize

          5KB

          MD5

          f5046910152e3bf8988dd1e9868a699c

          SHA1

          7f066a6d09ec0ad44dd6ed9361e0c43ecbe28aa1

          SHA256

          2c9056cf5268128fabbf6f2921eac3abad42412ef544e24511fd0f70cc0fd56a

          SHA512

          f895d0eba03a1372383c3f96833178c5e86aa1071c2fa8c58d5add5ade7416727a6b4dfe01c484ab419aeb13e51ef88da493d4a2bcd01a2ca9663069b1c1baa5

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3FH71F1O\favicon[1].ico

          Filesize

          5KB

          MD5

          f3418a443e7d841097c714d69ec4bcb8

          SHA1

          49263695f6b0cdd72f45cf1b775e660fdc36c606

          SHA256

          6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

          SHA512

          82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

        • C:\Users\Admin\AppData\Local\Temp\CabF99C.tmp

          Filesize

          61KB

          MD5

          f3441b8572aae8801c04f3060b550443

          SHA1

          4ef0a35436125d6821831ef36c28ffaf196cda15

          SHA256

          6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

          SHA512

          5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

        • C:\Users\Admin\AppData\Local\Temp\TarF9AE.tmp

          Filesize

          163KB

          MD5

          9441737383d21192400eca82fda910ec

          SHA1

          725e0d606a4fc9ba44aa8ffde65bed15e65367e4

          SHA256

          bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

          SHA512

          7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

        • memory/1756-60-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/1756-61-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/1756-71-0x0000000074300000-0x00000000749EE000-memory.dmp

          Filesize

          6.9MB

        • memory/1756-70-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/1756-67-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/1756-85-0x0000000004F00000-0x0000000004F40000-memory.dmp

          Filesize

          256KB

        • memory/1756-65-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/1756-63-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/1756-56-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/1756-563-0x0000000074300000-0x00000000749EE000-memory.dmp

          Filesize

          6.9MB

        • memory/1756-564-0x0000000004F00000-0x0000000004F40000-memory.dmp

          Filesize

          256KB

        • memory/1756-58-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/1932-5-0x00000000009B0000-0x00000000009F0000-memory.dmp

          Filesize

          256KB

        • memory/1932-4-0x00000000006D0000-0x0000000000710000-memory.dmp

          Filesize

          256KB

        • memory/1932-1-0x00000000749F0000-0x00000000750DE000-memory.dmp

          Filesize

          6.9MB

        • memory/1932-7-0x00000000749F0000-0x00000000750DE000-memory.dmp

          Filesize

          6.9MB

        • memory/1932-3-0x0000000004D00000-0x0000000004D40000-memory.dmp

          Filesize

          256KB

        • memory/1932-8-0x0000000004D00000-0x0000000004D40000-memory.dmp

          Filesize

          256KB

        • memory/1932-6-0x0000000000B90000-0x0000000000BDC000-memory.dmp

          Filesize

          304KB

        • memory/1932-2-0x0000000000310000-0x0000000000368000-memory.dmp

          Filesize

          352KB

        • memory/1932-68-0x00000000749F0000-0x00000000750DE000-memory.dmp

          Filesize

          6.9MB

        • memory/1932-0-0x00000000013E0000-0x0000000001604000-memory.dmp

          Filesize

          2.1MB

        • memory/2736-13-0x000000006FC70000-0x000000007021B000-memory.dmp

          Filesize

          5.7MB

        • memory/2736-14-0x000000006FC70000-0x000000007021B000-memory.dmp

          Filesize

          5.7MB

        • memory/2736-15-0x0000000002570000-0x00000000025B0000-memory.dmp

          Filesize

          256KB

        • memory/2736-16-0x000000006FC70000-0x000000007021B000-memory.dmp

          Filesize

          5.7MB