Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2023, 02:04

General

  • Target

    Purchase order (2).exe

  • Size

    2.1MB

  • MD5

    8fb77e0a72fd58877460ae734179d388

  • SHA1

    2dba24ec72dcd704d98d96de2b93d4c9c3f82f26

  • SHA256

    61af5cbcf8452d49cd6a2f9e562bebcd55a560a68aba7bf1d591f01bbb9c0290

  • SHA512

    d3dd24ad1ebd82ff276b9c07a5597a7154045fa1ab94325691c4f4f7ad6a3930b16f6d1b6d20349874091ee5fa518f79acbdf52f67ab1d09ac2d94ae66740a20

  • SSDEEP

    49152:XVSZZ9WBVVjJNOUrrbsyc2TP0DHEwb3zxG6R:hrrDwbzxG

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Drops startup file 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Purchase order (2).exe
    "C:\Users\Admin\AppData\Local\Temp\Purchase order (2).exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ipconfig /release
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2984
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /release
        3⤵
        • Gathers network information
        PID:2636
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACcAaAB0AHQAcABzADoALwAvAGcAbwBvAGcAbABlAC4AYwBvAG0AJwA=
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://google.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2488
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2476
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ipconfig /renew
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2752
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /renew
        3⤵
        • Gathers network information
        PID:2904
    • C:\Users\Admin\AppData\Local\Temp\Purchase order (2).exe
      "C:\Users\Admin\AppData\Local\Temp\Purchase order (2).exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    d7a1776b9f0b6a531c8a26770c1e25f8

    SHA1

    c973afd09c88b765b6c4c188125ef9a3e565e82b

    SHA256

    d56d422fdcf9907a509836dc524187386119e336f30ec4f8473150f439c0afce

    SHA512

    73a62d5ab5448e6173e9c690ea722e4bb4c5ccfde7056efb2de9b919c7c9f9a797f2baa7259dce500ea67261f002b482fda0e77bd57330623fb0c816b8df3f12

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2b6002504c39e575b25effa36b793cbe

    SHA1

    c0f7ae1c3df3c3fa250dd592729d2b09d591aab2

    SHA256

    ddf6650ebcaf2d2fa7c19fc2f3870f47308f820b7a6c584a55677662d0e82202

    SHA512

    14003abcf1c54fb3ba844cdd71ab8ab63906c62fb28ee6ded6283b29cc4ccf9b8eb52a858cc41ce6e8643687528418f8c775b912fe1eefc6649f41a306bf012f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    00bc919575ee5f3c3a01f8710877a1be

    SHA1

    712770fe05b012564143a8c411129d96d99ef0ff

    SHA256

    7ca73e891101525228fa8bb4f2f111ef9e5b4291a8bbfcec8d8b5bcbc5ec556a

    SHA512

    b277fda8d33211b516fb9600a64d395169c12a72e45bc60378bbe209a316d5188b71e49562ea19dbcf49e9e9ce656b568fb76ba6e8a14ce6c3eb5a510d526575

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9a98beef0474b6ea83f87cb88d2883b4

    SHA1

    5eedf16083b03e6883458f45590c252bc6e7f21b

    SHA256

    faedbc83e38b1b2e2314c08aa32db2db67c5bee7676562e6ed9458258c7a1476

    SHA512

    0755fc1a2ca57214e3b6553bcf4b439cc5471ad5c3438b8730a288aab1a23c446f36b54a1f94d2be58fb060ecf569c531fa26a22cd19fac6a27eb233c930a8e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ba2084dd1fa7a079305814d953973d79

    SHA1

    3b0d6acc9afcfb0ad3bbc1bd6b079724ae4f3cb1

    SHA256

    4667858d170e9b2331dabecea24c62dfe6ee26fda415de68c27c8dda8b2e222f

    SHA512

    e0ff0aca3de1b1a972d9e0cec6c68458b1995fe280f2f65fa267ae1deeac7682a763b942ac3a04138eef5a502f89f04897779d87dc6d75b003d159b7b5e9bb1b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6c5cc76c9078dc7097684cb67c16b029

    SHA1

    e9adc62ec67d882c0305ad3f969b1d6eb752df04

    SHA256

    7f0ea6bf2a6bf1cb09ca173207bf19c2027056a080cd3a96691eca3a0b5a8f8f

    SHA512

    197ec40342859c4a35653484db8d577d8ef342dc2a748f1c4a46d13641ff04ad0142d1ca2bf3b2366286df40dbe764e22aa98cfecc4719f7769a0846553f8aae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f748e1f51fd4bf6f42bf39aab6ab8a4c

    SHA1

    3e88bc700f51e18cf056271ab4e1a3962f9ef256

    SHA256

    deec2ee1ec277b5131a69d5b54d37d5c979f8991ae158651e73241f657c51426

    SHA512

    06fa5208c19928c0dc5c21febfe06c4dda365011de85313990e66136249dbc6bed5732f2958132936889ffe032e142b7b8018689327515af3fa4c9b94aa6d895

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3bf591a4b0bb417eb1906c3be8c7d7ef

    SHA1

    e75aeaee9ca2a98c75168c2145125a9623c5e351

    SHA256

    8c7fe978d7b8fb613eafb1a1ea2300e25c86120f759e31e23ca56c0b4163f76c

    SHA512

    410c5bcaefabbd25ca8dbc8468eaacb7ab8b5b430db24956a64b95f19780a5ae2e275c7f08e09b0e7a63c3c9becf89f1eaf1fafec211d26d9819b851c2a935b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eb63f1c4da13cf0ce68e4e71b808de68

    SHA1

    19f21cf04cb8685dc5cd226627e8c7d34bb9ae95

    SHA256

    49c204850e69f3718bea14eaa28ea60f1824a37f5d3f4b4de68eba7f2a3aafa6

    SHA512

    b58ae048c5adedd35bacbe7a0144bcc594b1b83bb79168cc8b2d9d7dfbd452ea77a0c55dd7282a2e2311975a3c20f40f8d130cdc8950311ff0a5375e0748dd93

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eb63f1c4da13cf0ce68e4e71b808de68

    SHA1

    19f21cf04cb8685dc5cd226627e8c7d34bb9ae95

    SHA256

    49c204850e69f3718bea14eaa28ea60f1824a37f5d3f4b4de68eba7f2a3aafa6

    SHA512

    b58ae048c5adedd35bacbe7a0144bcc594b1b83bb79168cc8b2d9d7dfbd452ea77a0c55dd7282a2e2311975a3c20f40f8d130cdc8950311ff0a5375e0748dd93

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    115648f33081a94f765a9e41a83e19e0

    SHA1

    c3bff4ecc88a415e91ffcd47e7b438ee496d3e9d

    SHA256

    68f1765144cb25dce29b1560a27da4a0b70937a77dba279045f56a58719076ab

    SHA512

    27a7f6fbfa7cf6a1ec8ccf1b0ac6e73c9ffeed119da890d3c2ec3f18168b002d76d3a20b8543f6d47d6641b0b5231c8c537a38aa984fdc1cfc0aedb2196a2106

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7a7bb498d94b0e1311bcd140a44a7136

    SHA1

    a6551b3293781b3f463a044215755c1a6c0c25e6

    SHA256

    b84fbcb5874ec32759f0daf65ecd71ce98d3629faa02672cb95cc0bc007a7a91

    SHA512

    f8f7f1f6706e795d122da407c3ef3983de2cfcf7e14e6deb9d0529c942997ccd397d1f2f9d115dedf8b599696ac21f572668ee090d9d1613851e7a00b09c0010

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    feae51df94fb203c998afbc6a718ebb2

    SHA1

    ad1014978bae1d2ee86bdede71e42b2f6cbbafa2

    SHA256

    8788f9e110f6301120f34811327498ba4268e51eeb26d35741ddaf8b55ec354c

    SHA512

    94f3e33258c498ac6ff04dd6bdd865d57e967c73fbcffd2ab4493bdfb1b7d87ea579997006fb5adbdb86b734a7db7905aa9f14c4f672d3ca3b769f4ef66c90ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cfaa983b416e297048f8bfefb78aca54

    SHA1

    48c31c63aecb63446bbd4e57f4954add5ebc8528

    SHA256

    8f1b85fb97cea1830ed41841fb8c4070eef4a03b59a9b1d516b7ef8729c397f0

    SHA512

    21285050df235b564920649875c8568cc2ba46fd6fda7ffd4fad4164b6c89900f822355bd173409b81f2b6778d9e4d9bd9a4ced4c2fb352fffa5dfb1ecb2fa1e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    695b467cc20ac5c3c8b700ed27f78e84

    SHA1

    b0162d597c0bdd0065183c63475a1737ebd05ea6

    SHA256

    7b39c078a7af61bbf009be37a03e99dffa4109e96c0bed9778aed6b084096114

    SHA512

    a9bc705d1623a85c5bf5e3e960d58e90e20fe52d7776a4a8e446623f208684c7d3a1ef668305fee614ac70f9b18afec0bd5ec528d68921ddc1c2fd68776a3d20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0da141ef0c1f703192a50af4a3528f10

    SHA1

    da0864548e3f7b83f287d026a7fcb3380bb6fe00

    SHA256

    175bcd12efb30318ccf553569f901909bc128dd47395cbe2216537bce03fe673

    SHA512

    f774c66d1e7d109ad49de67e4b83a1e931e975218955b20a9d652b6d2fb9acb2e577a6cc9ef93c6de2672a62b1ee5ed24be4349b17807795f3d8f3ca0cde764f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4e16b389e630d1cbfb28141114f20be1

    SHA1

    88a517d60ff7b457ab0ccf927ee82311679753d4

    SHA256

    b20a8236ebf6ee508b97f47a92d1e88aaa6ff930a7e5e5604dbb30920b4487b5

    SHA512

    d36fba250d59d9c36dcbf6df5ac03f970eda2f0edc5e0ba5638aa56700e6598e90bb1833a5a6e6571339dd5126d52e9308499eaeb765ee0575dac8db65d71aee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8bc6958da449c0540d400356467c75b1

    SHA1

    2bc51689468485cfc4eda5d4b8b94fdbe8ab90bd

    SHA256

    9737dd844439982e7298db9c240c8d027e89beeac30be4e835d19c285c2ee46f

    SHA512

    7eed2e3a44e976850f9171ba65fa90c2a128e50a1aa6b6a6a3b518a6888748ef15a002e770d9ea8e5bdcee99d3243c184f29231a34646ac15c5fa2b433c4a2ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    81a11548d1dbaa47c8d1e86b5136b1d7

    SHA1

    c415c759a26041fc027c30298d95349db570eede

    SHA256

    59236e7288ded68bb084b5fb453945ba308979d25e798269784694dee02ed252

    SHA512

    a6a41e14625e9678f1d9904c3f2dc686c49598cdf50cf1bdb81a0d22aed31905363730aa2016d96f32e218e2f4301bc2bf50fcc2583f3c002010a403c176b496

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7e32f7c5a528ffce10d20707cbaef85f

    SHA1

    c8485c0994d27db559f07e2483c4e13be70f338b

    SHA256

    66c633c4c5f1b266f31516cb5fe2aedbe165747c1135e180dc77f2a29211113f

    SHA512

    a4a61778c99f6e633431b0fb53a4fe206f9e03a7e3444a4fa0ba320a1b55e9d52783defae0dfc7a295ea65fd4063dd2e00c6a74fd381f42bc2d53f08c7a0d68a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c34a6b897314c7698564c1b793c11764

    SHA1

    03156ccd4124750c194a0b9509565fcac2898713

    SHA256

    f5052e491633fe9bfa8be41634e2a67c2c2e13586ba8879a01eaa173c81c7a30

    SHA512

    b3ac31bca5443aa9deb4f0f3670593038b64f1d735c619bd9215469f8f8db2bebbd12dd611bdb7e79694b50cee0c5d94241116152a5b50504cd338a3974464bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6e320018105179d9d9b9a6160639d4e9

    SHA1

    cb9d67a7931fa18a2fabae0384b19213b9b60727

    SHA256

    e0361e6076b64884684c172da09ec1a4276cb2ea78d275a533d4ca034004be4e

    SHA512

    1021d475e2a2174136f9209b42c9a01bcd2e211b08b5a34d48b40c4c7cde105dc2e7c02307c08c238fd67f3150cad807042eb9f5d41fbc699f6c876c0a2ae539

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    7658691607cb202eb9a20ae6ed3cc4d1

    SHA1

    52eb197867d18bc958b47c77384d1e5b77240c96

    SHA256

    6ef4ea026e7d00c206f26531f0d8cfa73f9675b7b4b0094a278e1570d32e361d

    SHA512

    8e3b241ad636e552e10ba278100ea8fb8f3d20e49987bfa288c65b88d59469b9f42fd4ddc2543baa85e4c292acd1fd757189f378f374f84143b5848d2295de0e

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\rpg4tgz\imagestore.dat

    Filesize

    5KB

    MD5

    f5046910152e3bf8988dd1e9868a699c

    SHA1

    7f066a6d09ec0ad44dd6ed9361e0c43ecbe28aa1

    SHA256

    2c9056cf5268128fabbf6f2921eac3abad42412ef544e24511fd0f70cc0fd56a

    SHA512

    f895d0eba03a1372383c3f96833178c5e86aa1071c2fa8c58d5add5ade7416727a6b4dfe01c484ab419aeb13e51ef88da493d4a2bcd01a2ca9663069b1c1baa5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3FH71F1O\favicon[1].ico

    Filesize

    5KB

    MD5

    f3418a443e7d841097c714d69ec4bcb8

    SHA1

    49263695f6b0cdd72f45cf1b775e660fdc36c606

    SHA256

    6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

    SHA512

    82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

  • C:\Users\Admin\AppData\Local\Temp\CabF99C.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarF9AE.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • memory/1756-60-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1756-61-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1756-71-0x0000000074300000-0x00000000749EE000-memory.dmp

    Filesize

    6.9MB

  • memory/1756-70-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1756-67-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1756-85-0x0000000004F00000-0x0000000004F40000-memory.dmp

    Filesize

    256KB

  • memory/1756-65-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1756-63-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1756-56-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1756-563-0x0000000074300000-0x00000000749EE000-memory.dmp

    Filesize

    6.9MB

  • memory/1756-564-0x0000000004F00000-0x0000000004F40000-memory.dmp

    Filesize

    256KB

  • memory/1756-58-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1932-5-0x00000000009B0000-0x00000000009F0000-memory.dmp

    Filesize

    256KB

  • memory/1932-4-0x00000000006D0000-0x0000000000710000-memory.dmp

    Filesize

    256KB

  • memory/1932-1-0x00000000749F0000-0x00000000750DE000-memory.dmp

    Filesize

    6.9MB

  • memory/1932-7-0x00000000749F0000-0x00000000750DE000-memory.dmp

    Filesize

    6.9MB

  • memory/1932-3-0x0000000004D00000-0x0000000004D40000-memory.dmp

    Filesize

    256KB

  • memory/1932-8-0x0000000004D00000-0x0000000004D40000-memory.dmp

    Filesize

    256KB

  • memory/1932-6-0x0000000000B90000-0x0000000000BDC000-memory.dmp

    Filesize

    304KB

  • memory/1932-2-0x0000000000310000-0x0000000000368000-memory.dmp

    Filesize

    352KB

  • memory/1932-68-0x00000000749F0000-0x00000000750DE000-memory.dmp

    Filesize

    6.9MB

  • memory/1932-0-0x00000000013E0000-0x0000000001604000-memory.dmp

    Filesize

    2.1MB

  • memory/2736-13-0x000000006FC70000-0x000000007021B000-memory.dmp

    Filesize

    5.7MB

  • memory/2736-14-0x000000006FC70000-0x000000007021B000-memory.dmp

    Filesize

    5.7MB

  • memory/2736-15-0x0000000002570000-0x00000000025B0000-memory.dmp

    Filesize

    256KB

  • memory/2736-16-0x000000006FC70000-0x000000007021B000-memory.dmp

    Filesize

    5.7MB