Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2023 18:29

General

  • Target

    payment status.exe

  • Size

    611KB

  • MD5

    b3cb7b5092ec2f49be062a87a6335041

  • SHA1

    273ee251d431823cc65e1b9e177c34b36da3b578

  • SHA256

    8fc8d08ac95f945b863195ee3556c1e756754faff354db781a67a9323b4c06fc

  • SHA512

    04b1751627bd0d63cf9aa137738a7c28f0c5d827d2d69dfce45d3075321af5f25d09b51b10203d103ce585ae288f8a2cb3826f9fa780a1f630c8c0cd135e6f5b

  • SSDEEP

    12288:suod5zlZmSVaFl3LLTIhbH5TtOBoLFv0X1iMM0pwsNdRjH1y92Tneg:kzOSEXL/IhbHnuMF8X1iFsFH1y92ag

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Drops startup file 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\payment status.exe
    "C:\Users\Admin\AppData\Local\Temp\payment status.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ipconfig /release
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2644
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /release
        3⤵
        • Gathers network information
        PID:2732
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACcAaAB0AHQAcABzADoALwAvAGcAbwBvAGcAbABlAC4AYwBvAG0AJwA=
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2552
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://google.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:476
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:476 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:392
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ipconfig /renew
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2564
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /renew
        3⤵
        • Gathers network information
        PID:2988
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    4ecf50e6209415e70a611cd4df2bdff4

    SHA1

    48db5a70f80ffbd6d4002cb8aa9d4f5c0781a097

    SHA256

    a423de9eccf73e9de92aa34f64e27627476f8fcaac63462509b1e28a0bae3894

    SHA512

    32b929813a013b034201823dc4c65171b98e9d2bf4bdd43741bc941eeb4a48755a0f87226380adda1e726d60db413c1b97e10fe234e03f16f9ee7f2d9d50401d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b6d6548c49a11b031b66470852d18197

    SHA1

    4db11d2bdb573e7bba48efd7b2f29c306f0885e5

    SHA256

    48c239d8511ef56a1d0ffe966d0428838d4a694da6ddaaed5cbb22eaaa65c916

    SHA512

    0eaade9ad2ed8b70b6d1fe70d6a95719699d73667e0e6ea73aff338c28a2330e9e850529877abbcfd21fb079fb06cd62b32b0f2f380bafe8ebbddef737b8407d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9b459e02048d9e08213338941075060c

    SHA1

    517a42f0673db9ebcdf0d0018c11ae9e2d23686f

    SHA256

    132c549532fa7672015f4fc48a18b7c31262242e08ece35e5e42d63db4ae4eb1

    SHA512

    54acc6553afc91b9e0b79f244e8ae30bea954409bb69a621bf65838e150875a7847af5b55598b8b289aa535758e73242cd12da1fb6014730e9fd7b2e558cb437

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7d1e6b0795ed59dfbbe696ae3af3527f

    SHA1

    27f170312c5df6514c93ba766ec40fe47e7c3deb

    SHA256

    d9e17ee71be1647eb6063155829a2c29ff44c3c978e6675049ff8a88c5328927

    SHA512

    d5509dec954dbedd657a65c379735978c3848c33099d29e3e13437063ca4f1ff961d67510dec7aacd2921bb48f7d842f6b9ac8cf39ec3a3df9ce9f1085842e41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d8460441bf28d4143e286fd90383b960

    SHA1

    2185e00d42186a58b2f88c78089f0357a34c7b6a

    SHA256

    c8d294e55aa9540d6e29223d431e567f194f9da49c8518dea74cfdf4be902c1a

    SHA512

    49a5d53e90ea8cd5e99ecd1712fad177524414085816f5df6e71fcf0d1a5335379bc0a1376bc00464b147715648a7d32163fbf3ecc7083a01aab31c8bbf2827b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    36339db31ec9ddef0cf180c22299bf87

    SHA1

    c9d5b0eb953a4303343445cb6a8e7b00b1c1fd4b

    SHA256

    3f2fc3675c54c3620296033a34a81f913d72eca67fbd194fa738acd7b40f7c58

    SHA512

    8d7021d99a501564028a930496bea84c0d2d18303337e3ccac2a287ed9aa042daca0d530a56e188ad4eb21104c909d0bc6d68fc2a3b9e2ff9063c8e3b9a32533

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e2ebcbb276dbaf398b232569fad3dd8a

    SHA1

    a7e5b8fdb999dddc3b5efa5bf57c9a8fbb756c79

    SHA256

    ff9bb547ea17dbb18a1888942e82b2c030c14768f220179a76c83c8cd331d20e

    SHA512

    5cc623b65ddfaa074c0e0ad3cc5c58456973a931e3b146a144b24d7c9a723c7d53f3779ffa6ac1568a3ae2ffe3079c2708e22484a361b09ccd2a5dd31208d1a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    71c7c3ee1338c7278265501484554ded

    SHA1

    ae347a3a84230b0bcfc17afbfca64445624a987d

    SHA256

    6ba92e0df7a415002b3c18236f1bd2b57dde096d180160eb7dd75196561b1e6c

    SHA512

    73572b8861b81a77b301cd41c924a03f35565a8b715787ad60ae17dbaf9e37af95e53c763932ec967cea5e2dcf5d897f1119f99ec9ede5415d6f52922628e7eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b32e00c478fb3453990170a0e0c39e1b

    SHA1

    a34c530957a51f43df7f39ec63fe57530ec92bd9

    SHA256

    b312036ce33e2fdc8cf0c2440996b60bf491db041de4b14bdb7dd0d4ddb7c0d3

    SHA512

    bf7cef6b82d99ff330fa93828d438ce2f64011f7de08796d3abf2c3cfb0c9b3fb0106a828ef19ba2583c19de19a6674952856f248635baefd9e57c26b09cbd90

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    39194c39ae63e8d5f55e8f672c75d11d

    SHA1

    dc7d10181a60a2101c3a4337a9582c259eb1862d

    SHA256

    ac5674701ec7a26707793aecaf2c0e57756e61bd96815e86c6522962f83f8719

    SHA512

    466c7e490bf8d2e24d302deb6d1e26b9b9ae63b04034e32a8bb18b5c458c0f8e7087d41d8d5519bb206ed3ea72155e46705452620d361d7260c877ad01ffc9a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    53bb8c38f252ce4b358b1a589250445e

    SHA1

    396c79b3e1084dea1cdab6fd4e932b90094a3ad8

    SHA256

    35e5c7fcb4f6df82080842eb065d2d641abba43c3491d22385a4700b9183040b

    SHA512

    916e1c5a9acdba1cee362ddfa5e5edf30dd667cf87743435a88992e92229d4af0fcedea576da6dd4f8e82aced17f7584a69a5630dcf1d915a7e0745c4af7694f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b613c3ce116b7ee890d26344b4e4e909

    SHA1

    a62283d2be9add6e1457c28fed17c484992a70d8

    SHA256

    ee576d2d160653d87265c599945c7b2f3e3ef8f9959faa6279c6375bf5282f21

    SHA512

    c67d3e7a14a9398291f89e6a5cb4b700456ac3175c45b99e7c1078ec820d35d639eb42804c2ffe8cd5bdca3cdc36cc913dee5667e5f5ffc2760b91371b70673c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    79962c24382ba6f46eefee736977b560

    SHA1

    c0e85e1eb7be7723da14fb001d81a7f7aaed35d4

    SHA256

    560108e58375110d1af9585a439023f6be620ee84a318a690dab18b67f68b210

    SHA512

    444fc2e435f0898d340529b8a244c20e05b861d034e631309e9b3af81e21176e864c0937d211a57ed43f6936f0b516983ad17ee3f507061aa49f64d300044739

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5725949f1cfed41b5f1c8868fe7c4f7a

    SHA1

    6b19bf0128799036636fb99630b8ffc78b7d25cf

    SHA256

    23022235e3f12273c691f2260ef224c105940538ea3f0a98d05d9d4edd9a35f0

    SHA512

    0d3d394951fd3b1a24675bfb13fde40dc96580bac4f4f77d7ca59e91a265b0cd61d7700abec89cf4569dc18c8f9b9ecf3a15585b663743b2b8a794d490a62215

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    840eb6e1af78c9f7e4a5d6c2ec5135b0

    SHA1

    95ceb1c25ef475304260200fc40cc7efecf2f820

    SHA256

    3a029f2dc084617ff04b911a72a35d7cee39e408a932523970da8058853ff5eb

    SHA512

    57bf606bbee4041751272cb3382195f88a3d272877caeb11a053a2e2371e86feb29e5b06f46316007d41407bd4a1e990f139ffdd779306a00f0d6412a0fc95cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1ff0e2be150a7870cf9ebf2c4c679529

    SHA1

    391dd8dc2514ce240068eb0fb181e6a533fe711f

    SHA256

    45ba0e415702fa3494e76422afb1e029eeb1535d300c89e7750271d8bb22f2be

    SHA512

    6a25d0640b7bfe07e3de0a73d65553d500394095205d00cb1ba0ff597d891ad84b8c675a2cbfcd031ea2aee689c3ea253aaa3e9ad1e92d4bc33bc6a8f01f2222

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6f203af391d544fac6d46253b91d012f

    SHA1

    0a4756086c9b47c8ee40d51cbe48093353dc3906

    SHA256

    e90820f189ca7a27d1f783653ad32201127303b01427b95ba159be24ebec4b11

    SHA512

    e0724572c8d51e6054e9053fea4848466e53cee68a42988a858a101db75b637815bab42da4e7eb40bd0504b6c1389ee1a7df12f09f80bbaff2c46ffb99c4dfe0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4a889e14339c96f04a6f4c0ea0ecf897

    SHA1

    df096d35270684a323db88ac6e1db7fc2226762a

    SHA256

    392ddabdd6ee6928fdd4e8f0007c978ff9748d233a0f43891aec2b2371b40b28

    SHA512

    6bff7a46c3a165ec229e9a6a5e00abc91ed410297170a53846a33c332582c34bddf3d36bad68bcfe5d5de84e700a468f0b15fc762c2315fee573776f2d3c2755

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    47d5543d8b8999aef4dde9d4f8ce36af

    SHA1

    e76b2d92907d384b89dd8a0540b92b2963df308f

    SHA256

    bd4e152fe97ec98a351a3aa64a3fc00a7c9589ed3bac5549fc763ff270e6f2d6

    SHA512

    717e15aeaccf4081cdf9d6c42b3d3d189f2406ac8fd75786ee5121135bcbb694b2186fdb4fcd3f00398db5355ed0d0360d68ccc8f1cb15aed8cfda1cad21c173

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\bqa1h19\imagestore.dat

    Filesize

    5KB

    MD5

    9bb5406a9e65719de8ebe37c79bab43c

    SHA1

    e90d2cf5db4a54940b8322b8a883d53e751b52fc

    SHA256

    d0a2316ffbed37d4c6ae6e115e056ba8c50558dedab50e0dcd4c4b439eb8f64b

    SHA512

    9588073dd81539288cef1a161b1c074bf5e56b941bfa75ae100057660749047240568078fad6c0a4129a5af46814108518a1b0109aed5edc3ab0990b59ba7657

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BOB1G6ZJ\favicon[1].ico

    Filesize

    5KB

    MD5

    f3418a443e7d841097c714d69ec4bcb8

    SHA1

    49263695f6b0cdd72f45cf1b775e660fdc36c606

    SHA256

    6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

    SHA512

    82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

  • C:\Users\Admin\AppData\Local\Temp\Cab1AE1.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar1AF4.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Local\Temp\Tar1B5A.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/1316-120-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1316-115-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1316-125-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1316-122-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1316-114-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1316-118-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1316-117-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1316-116-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2072-7-0x0000000074BA0000-0x000000007528E000-memory.dmp

    Filesize

    6.9MB

  • memory/2072-5-0x00000000046F0000-0x0000000004730000-memory.dmp

    Filesize

    256KB

  • memory/2072-1-0x0000000074BA0000-0x000000007528E000-memory.dmp

    Filesize

    6.9MB

  • memory/2072-2-0x00000000007C0000-0x0000000000818000-memory.dmp

    Filesize

    352KB

  • memory/2072-3-0x0000000000260000-0x00000000002A0000-memory.dmp

    Filesize

    256KB

  • memory/2072-4-0x00000000022D0000-0x0000000002310000-memory.dmp

    Filesize

    256KB

  • memory/2072-124-0x0000000074BA0000-0x000000007528E000-memory.dmp

    Filesize

    6.9MB

  • memory/2072-8-0x0000000000260000-0x00000000002A0000-memory.dmp

    Filesize

    256KB

  • memory/2072-0-0x0000000000300000-0x000000000039E000-memory.dmp

    Filesize

    632KB

  • memory/2072-6-0x0000000004730000-0x000000000477C000-memory.dmp

    Filesize

    304KB

  • memory/2552-13-0x000000006FD10000-0x00000000702BB000-memory.dmp

    Filesize

    5.7MB

  • memory/2552-14-0x000000006FD10000-0x00000000702BB000-memory.dmp

    Filesize

    5.7MB

  • memory/2552-15-0x0000000002710000-0x0000000002750000-memory.dmp

    Filesize

    256KB

  • memory/2552-16-0x0000000002710000-0x0000000002750000-memory.dmp

    Filesize

    256KB

  • memory/2552-17-0x000000006FD10000-0x00000000702BB000-memory.dmp

    Filesize

    5.7MB