Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2023 18:53

General

  • Target

    payment confirmation.exe

  • Size

    787KB

  • MD5

    bc093d7923b582bc37b09a814940a4e4

  • SHA1

    4ff679166f942395b2d335757f759f39fe8dcdd4

  • SHA256

    d9961b923d5187cab6c6216a4de0f61a03a24fd3cf6765a5c3eb0963e05f580c

  • SHA512

    4f1eb3dd9df2bb7f80a47d39083522c3255102bed9c29fefda6513f4a0224287138c64911360acec8140f76f8b2d483d14f28a30ea12d66661015d3592401af7

  • SSDEEP

    12288:QWodJz/ZGPpglaJwnQieFtD6Ba+FdEmp2UdAmhu1qCvRUULCeNPSiyyjK:QzEpglw53t2I02wfU1PnNPd8

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Drops startup file 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\payment confirmation.exe
    "C:\Users\Admin\AppData\Local\Temp\payment confirmation.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2568
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACcAaAB0AHQAcABzADoALwAvAGcAbwBvAGcAbABlAC4AYwBvAG0AJwA=
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2616
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://google.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2768
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2768 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:268
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2592

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    38ac33d15e46ef9d7848de79fc70f6fb

    SHA1

    d1e0519ed4af8bcbede9b86ef8d526fad2598819

    SHA256

    689a662776742bb7d132314be27e49f6bff10c9a51cfc01f93a01f24fbb5ec7d

    SHA512

    6c89a6f69fce1ae0478d3158efe234acc01d864832ab01923adeb7b258c346d2da3956f6e040ccf896daebee8912147627f3535ebb61459b3d594c87febe8add

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3dede4f2a44c68409e030351c0ac56de

    SHA1

    c3f915477b1d0f18f104a8678c60a47f0cf5a728

    SHA256

    36403b874c2a436f446374f9f5f15df166786726d81e662c9e0aa010b70bdf56

    SHA512

    5f91871f79d56314edd61199d48c71e311ce4468dfa3ee409b24f497383a8794d07cbf4e78a29c1b8292f869445ce73efb6449279d6ff98ba4a0836538847d8d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c3b793a5afc38ec70072ee23ea32fe04

    SHA1

    f2de89225c63ea25c51bf3a6dbe98a22e42c38d7

    SHA256

    13259a393dee8921b4917e380de57cb2ce423be27d3217850bb0b80ffff64261

    SHA512

    91e91c8e87101342038c8eca86a34e358a78d389978ac73f30211dd0a293fe19452f292fa4380fa4c3650f02b2b904bcc037f01535a51db11685f46d44b10e96

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cba35d02bd459e0ec8983d5f70b6efe5

    SHA1

    fe3eba59f05c637c250c81fa53b5aa421850b7d8

    SHA256

    343948f2ae32077225bfee35e495aa54ce766e08ca5bf906f44e027fc3362faf

    SHA512

    da0377616d7f4d01b1dab6f7369cd9db37368c604b7ddb7c100c94949ae244b1185d2e1fc00c7cdfdcbf80650773478a12a3aceb820507ecb96923f15187032e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4ad30bc08de454598ab3e88eb0077d32

    SHA1

    93817e49cc98a65870c36028d31eca97a3978bfc

    SHA256

    608f037556b23d44545eb850b2629fdac1fb52654a0ed7bbec4dade655eec7af

    SHA512

    6a7a6abc0ca150dd656e8a1830675cd3ff39354ef16824e829551c65b25622fa15b1f660664a2394af19357674307fd9221824c304bc39445670c0f9e970f43d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3446f90fca77e0141e953abb797cca92

    SHA1

    5a2e0432bd9c77fac0214b2d2610863ea9bf2335

    SHA256

    b2597e7473cbb4084a0403f7b48432f609171a711fb2ae410480f236b79f0dd3

    SHA512

    377e18b69215813bbf81e3e16d317527fd9e5fc617312dcead95acac4b06e6fbb97f2fa1c0f5934aff9c89b5494a89ad1d196c302ed65727f2d953c4fcc233bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8db8cd438de1e3d31f7d4bbd9b5dfff7

    SHA1

    70580d5b30cda64b89d0cdcf89fc0005f5b00b57

    SHA256

    8fad3f67c24ff9628bc6af2b00ea003da974dbff5d0b7194594f11d99a02dda0

    SHA512

    152a9434c1745936fe12d8f98627d99837255ec1b9e51603bb8ff4ff3cfc40fc30b1c261781e2e0c2f6beee46c884e5521d1af1bfdbf790cde49e7e604e5171e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e30553d36460bf0690fa3bf29ad575c0

    SHA1

    4a9946120bc7ccde1bc745513678fb588ae8cc9c

    SHA256

    df96ed04b88566af0b22b19dc2114596e9ac7ab319a1c0dda4ee7900c57c3b94

    SHA512

    06dc64eb3d81431ffd4eba29a7a06cfc4f8dea9b24db5a5bf8cf87fa1d4ce2aa5d193583db2d928cea5558bc5757eaf5691275203d0d8ab0f2011ebe27e9125d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f2d0ab4216fbd924aeee7f02ee2b5038

    SHA1

    569eb30e7bc4341640cfd53c3bf16405d9374dc0

    SHA256

    e33087c17dd861883134fe28519ca024ff8e3e69d1cf6aa0e1d22ae4865637b3

    SHA512

    7306780673417c35e6e338ed53e6012d60fb25f77d1037223bcd85fba37a37b3db4fc747cfdaccc4cd5d13eeff91165e0c8669da9cd53366c271cdf4ce0f7726

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c05f6dfad66d48e5c5268c25c7855c65

    SHA1

    9ecb43099c5d58aa585811a056768ee83cc7c78f

    SHA256

    17f99ce9e3899fbc3a7d5a4426d6cbf8dfcdc5f20027fb8b9c392bc8fce4ef1c

    SHA512

    81a7a37f10d4ff6e1d92841657f1de01c288b77d69f35d8184d01dd6edc725f950951114b2b5c4322868e892144593c4629bbeef20c07cbb22eb0c4f25bcc3ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ade0d4c9854186937866e03bb47c79f1

    SHA1

    89122793b2abdb9d75dda9250c2d332b861056f9

    SHA256

    3b300e76fd2a32a53c9aa521c8a52563580249c12a535cb365b0aca630885fb1

    SHA512

    e2f2ed492d0e3fa9876e44fdedc54f3e4ad7baf216e03f095dc1a45552061cb46f87579b45fb603a501702240fe32b3b5d9b2498cc3dab1405a8db03008ca58e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c3a940924282fc63a72e08ebb473929c

    SHA1

    69986b938bd693b6ef727eef00d043007e23ba62

    SHA256

    7053ac65167a43bb34443d108bb81dcaadb5dd11955fc970df313df69e983e61

    SHA512

    419208ff1ca8977bd9270ef3f8ce10ae959b5cd8ee853a4818c023d769b64ef0cb7254967d86cfc20807e1ccc466d070302d8df3d03b17cf527ed7de0d4d65e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    091cf1c4753b9727c045fa3623e8a026

    SHA1

    88f9cd816ef48e88f367db0a901d07eb97562286

    SHA256

    2f173c19487ef5d3fa351b6f3a37e8d08c52e87ba36024981e15ae2f5d7a685b

    SHA512

    ebdf007159a33abec363dbc388609f4a145b91232db2545731639955bf9063895c28e994b36106b88b834228e7146e6290b179d1da8e583095b48b5935f21e82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e60c092da702dcc7fcbe94aff0a46681

    SHA1

    3ab68fb1eeb9e4e3be9e5a15dd86aacdbe859290

    SHA256

    1e32c2653d7045931983dec70e954082fd8ef4ce6f397e55d3a355e1ae3c74b4

    SHA512

    985adbe136ffd9d51ad2b7bbdc50cffecd5191169fa2ea13c9860cc96643d67a31b9ec0da87a58dcd8d97bbcdb75f725c0379b11ac93bc097fbc4b4d92bb0ae4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4dafe439900a4e6b3cb150612ecad644

    SHA1

    55135d7cdd19f09715ea027909e5c0a1dc7446b0

    SHA256

    73e108ee192ac414dfc10d53371c2692e36b225fdafac1836f750e157280ddeb

    SHA512

    859a2a9a725c8d9eb4d04b93e1a4169961d44aa51d0cc708313b0c99a40724c3cd173db633afc236be29b09daab6aa0e5c2dedb618724381b62a9a8876a7f92c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4f70a76bec99671b2691d5a68bb3489d

    SHA1

    61df0e9066f9955543e3e91c498dbf0555eeb6fe

    SHA256

    fb7985b4ce224fd593706f40c06be17ef682ddda4f0ac3fa092a07f1c7843ad0

    SHA512

    7a3152439457f48f3287ad9b351b92d624979184fa0be7cacd6fd2d15c9bf99274178ae64d938b80018fb072d914d2e19fec8e6e2b505d0554ce37cc6cf07300

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    802cdeb6356cb646635dab50e1a46613

    SHA1

    3aa6e9cfe363e18411517ec34a0dc0f0d0cb6f83

    SHA256

    5a6ca3fd3ea8e301c45bb3cc5caa6c008adf4468a9045186839b42693d63a885

    SHA512

    c072795ce04dcaba49fbf4969c4c9fe645fcb7bd8181c2ab8381ec83ab5fcd7fbc4c20c476d2a03aafdb928fa5e7516fcf734067719dd9f2e96e1cbd3ae26c7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    af1144e4e3520d4a1c82279a6930a595

    SHA1

    f6b9f23a458432b39a8a3eafc010f5f157905220

    SHA256

    a14f3a12260733f125f68bd0b6e0db8836f2fc0a7911fd463721a6067001daf8

    SHA512

    9ed41cb128d50f80ec197dd460f453f49da77bdc4d9cb017187c8b47140b047ee58e9ad82d36fa9697d8ca1c65ec8d45137e6aebf18dd8ffaae25b7e4339d5e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9e87775060b128819c5d707b60702bdb

    SHA1

    0070c5e50c11f4cdab0559f3b8924aefc3e563b5

    SHA256

    c373d87be216ea72042fb620d6c4498caf8b17243c7c05efe3feb17c57689c36

    SHA512

    b5bb3a9f42ffc8a99132c1176e5b936d4fbf83faab928e5d2797e67f102d337e3947a840d282fe12cc0e1617ab14203e4ad233f4872054330cb7a614246ccb96

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    021871a4bf7fb3bcb292054bc86e5fe8

    SHA1

    10a2773081f766e6822c14fca4ee7caad5f4ab52

    SHA256

    2480b4349c4a4a451a6af28e7c16cb7a4038b3be615bba36151dae28b8c5ebd2

    SHA512

    1d93c7389bca7e444fd550940ad572429878a441d01fa8551aeebd62082cdaa22393537d657393accee4d42256f078578b74f55e29c93b80d529d591f5dcd0e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9fc33bad185f41beaa5418f1fcbd4e8b

    SHA1

    6a9216da9fc989807897b7de6f9c163778de54b9

    SHA256

    2184045ed97103ade8c17ff54b5c71c411ff7dcce7023ea4c2365cf99f103e7a

    SHA512

    d834d150c9ab2372740f67ca866031b0436bbee657236f19f75dc0e2407e657ba4a2bcadeb618ae0b3a21cc607f39f1bff85af249e915dcb96197770a1d714a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    84936cdad9bd051e5651a92e7b923450

    SHA1

    63971f6ed9762f0cf83924c16a369a9223a7fbe6

    SHA256

    1c97f8ec8d7877990197e19a652b97778c2355f96adca267f48651b23ffbd871

    SHA512

    3c07f158ff1c2ba751f87bfa18e3eaf27e492b21247b9434d40ef600523e5c9a3fcdb0b5e7ca9bc6a7af85f8a0656071e43c5908f2f32cad6f24d62124b08b98

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\32uxyeo\imagestore.dat

    Filesize

    5KB

    MD5

    df5c4f2bd13162e4537349db8bcc33a5

    SHA1

    681daefd7240e25bbaa0638b85339db5b8d09011

    SHA256

    00dd187d7d4a418cccce46052d5f04180a09a69f1ca22a8f89343ed3d50b2a18

    SHA512

    89fdaf1dc08b87d635ec772b56e53b6c77b79556ae5cc4a9b7870bf1f657b3af541f449b11fe301d5fef6f4cbccbdc97b74fe0472eca7976edd09bc2ba29e230

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2WGHIKMU\favicon[1].ico

    Filesize

    5KB

    MD5

    f3418a443e7d841097c714d69ec4bcb8

    SHA1

    49263695f6b0cdd72f45cf1b775e660fdc36c606

    SHA256

    6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

    SHA512

    82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

  • C:\Users\Admin\AppData\Local\Temp\Cab1E5.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar1E8.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Local\Temp\Tar29A.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/2568-0-0x0000000000210000-0x00000000002DA000-memory.dmp

    Filesize

    808KB

  • memory/2568-1-0x0000000074BD0000-0x00000000752BE000-memory.dmp

    Filesize

    6.9MB

  • memory/2568-2-0x0000000000570000-0x00000000005C8000-memory.dmp

    Filesize

    352KB

  • memory/2568-3-0x0000000004610000-0x0000000004650000-memory.dmp

    Filesize

    256KB

  • memory/2568-4-0x00000000006C0000-0x0000000000700000-memory.dmp

    Filesize

    256KB

  • memory/2568-5-0x0000000000700000-0x0000000000740000-memory.dmp

    Filesize

    256KB

  • memory/2568-6-0x0000000002050000-0x000000000209C000-memory.dmp

    Filesize

    304KB

  • memory/2568-7-0x0000000074BD0000-0x00000000752BE000-memory.dmp

    Filesize

    6.9MB

  • memory/2568-21-0x0000000074BD0000-0x00000000752BE000-memory.dmp

    Filesize

    6.9MB

  • memory/2568-8-0x0000000004610000-0x0000000004650000-memory.dmp

    Filesize

    256KB

  • memory/2592-17-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2592-16-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2592-15-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2592-13-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2592-14-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2592-19-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2592-22-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2592-24-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2616-25-0x000000006FCA0000-0x000000007024B000-memory.dmp

    Filesize

    5.7MB

  • memory/2616-26-0x000000006FCA0000-0x000000007024B000-memory.dmp

    Filesize

    5.7MB

  • memory/2616-27-0x0000000001C40000-0x0000000001C80000-memory.dmp

    Filesize

    256KB

  • memory/2616-28-0x0000000001C40000-0x0000000001C80000-memory.dmp

    Filesize

    256KB

  • memory/2616-29-0x000000006FCA0000-0x000000007024B000-memory.dmp

    Filesize

    5.7MB