Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2023 10:03

General

  • Target

    Balance payment.exe

  • Size

    392KB

  • MD5

    9380d44800fbdf3899fe1d04af533d1f

  • SHA1

    a052510980763e83d19c3f9824ea58a5f4eab2b3

  • SHA256

    0b6b634a3d763601e989506f485f0bbbb9aa0b739f34d5566069bfd7bdc05904

  • SHA512

    8e2e205984f1672df25d4c78fca631290706e793677f480b0d088e60bdbef6b91b5e7752175cef0d85fc6c381adf39c64cb3ba6c4578ddbd5b7a79dff9f7be99

  • SSDEEP

    6144:WSodkdIGvvJXFj+3vsW5qeP0sCuTiw14LqcCiNMF2eR2BQ1hZnhG5rO/lGFNzTbn:WSFdIGZVjukc044NCiSx71HsKGXJSA

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Drops startup file 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Balance payment.exe
    "C:\Users\Admin\AppData\Local\Temp\Balance payment.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ipconfig /release
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2948
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /release
        3⤵
        • Gathers network information
        PID:2220
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACcAaAB0AHQAcABzADoALwAvAGcAbwBvAGcAbABlAC4AYwBvAG0AJwA=
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2784
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://google.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2884
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2884 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1460
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ipconfig /renew
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2564
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /renew
        3⤵
        • Gathers network information
        PID:2428
    • C:\Users\Admin\AppData\Local\Temp\Balance payment.exe
      "C:\Users\Admin\AppData\Local\Temp\Balance payment.exe"
      2⤵
        PID:1620
      • C:\Users\Admin\AppData\Local\Temp\Balance payment.exe
        "C:\Users\Admin\AppData\Local\Temp\Balance payment.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1924

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      914B

      MD5

      e4a68ac854ac5242460afd72481b2a44

      SHA1

      df3c24f9bfd666761b268073fe06d1cc8d4f82a4

      SHA256

      cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

      SHA512

      5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      252B

      MD5

      2126d2e51a8dc3c1ffaa0f380b5c2460

      SHA1

      a932e37fa74e97927eecc03fc1133802ee775300

      SHA256

      0aefd179f94988a9a4734598d9e843da055c1fc9d14a43993d78509f2b94c7fd

      SHA512

      b58e5c22b27bcf0a1703629360ef0639de2dfcafc2a6a844e6418dea22e09f99beabfed108a462411e5df647cdadae10d85d0b63c430e2bc85aa0ae693e6d1b5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      9ec258ef6ce008d07f826d3ed972d59c

      SHA1

      de614ec8accb5758c176fccc0c06a933354ac568

      SHA256

      83e38d918796980fe802b3e296d2479c98cf87ef3405fb96d9cb7411a7a191b3

      SHA512

      d5d294d88a404ce34bd9ee8452a596a5d2a11ed74244fae2734ac62687cedd7559e860ce968ef1104e5efbba5ff7ef01be30e9858347ce291306acb22220e1ad

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6ae3990e09ddddb8ef044c4a7842a830

      SHA1

      4a01f8bbd4905e5289bf02278ebcd6feb19be016

      SHA256

      4e1d9dad871ac51f94bd8f20bbc39a10c60cc8c766a5564aaf0472160fc61051

      SHA512

      29ec924b5f8deba2bbe15c812c32cadc66dd85ac40756b6b32e1743426e4dd53928381f20f558227b0cb12b06fc310d4af301dd99975b5d8dff70fe298e4b7d1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f0337c1abf2bb1b3e034e2cfec3167fd

      SHA1

      8ed7beb84b8b1d5883f6b092a039014e35b9c8ea

      SHA256

      9b4618f5f8f9a4952ceb2be72d04b84292b815cf98bc70b699ef3c18d61a7d55

      SHA512

      b1479a9dd9f73de63181fb7b3b18089557f3890650aff101eb215963cb7e63a4eabe465999f3e1c44e886fb154923c092ee9a807ee9ce1d710593d540755213e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d765ea03a9b0a39f86a99554b1ef4de2

      SHA1

      be87537af2ec1c42eb6695c7c606ca32102e2c8a

      SHA256

      7cb72c5c8af1d4e6516a9914a93150e711442dac64b5d4464c2de2a973864ec3

      SHA512

      bdb101d73bc84412f9533f9655949d560c7d9be412f7bb95988f4f6a8c5a45a282efc8080034f29812d94db79f566715521f902ccd55f72b28aa0c4e8fb6eb1d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f9ab8962e4a4fd68c3378ef75a64cde9

      SHA1

      ade4ecd870a5f230b12f820acedf6839667a845a

      SHA256

      bf9f5f7f015e51216248f4e5639295c51aee881f0840523d7c1b34f8952806f3

      SHA512

      8d47e4fe8182999da348584e4f59cf0a0a495095bbe8c8739607f277ccb24d43e0ad4b004d23bfb396d0a2ad81e6d8469be2b63f061f96d6387fe1413b1ed572

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e04f7f3bb12e64f60f8453c67301fee3

      SHA1

      2b1fe69e894ea9522ffc2ec0402ad620b3a66a4b

      SHA256

      0b78de3643b04a424d190e8ac001b2ba49bbfad0f59a0dba3c811d326db3d8f9

      SHA512

      158e3641d4025f525cc2dd8c5c3e1590a74f10e289ed5ce4d1ea062158417cf60a99e6004e344b5c49312f34b4b209b945a8381d97b56d0a7ea2fda94cdf0133

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      da3aa6d38437861f67f7ba823c212e6c

      SHA1

      ec47f6d829441e7cbd58da3526fe854fc41a7eec

      SHA256

      d8dc9029b52b5d003974a022178f9e7ac0535dffbc654f2a9431e0bd77840e1f

      SHA512

      e967a9eca98bb1b0a54891282dafd5c1a6bec408fe48b466ad58cfc3b83e452c7a839b9c28ef552753a83c9dbeb08b1d7331b6bfcfe59c3d56a41a416dce35d9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      61afa4eaf9568aa79c65a845d7d32ed1

      SHA1

      3872ef063404e727dfb76e7104a59c4b85c2749d

      SHA256

      bdf9885894bb212a30cdf505ba0b9c34bcef672f019f0d01d3bfb767b06da167

      SHA512

      48ebd3d5d91e8fe5178df15447bae703f84d638a935f64a1303704d510f2e343bc33da5694babc054ce2d26b450589608c76def3001eafe40709acd5eaee6bcd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      eadc2378dde0682faf42083c50b45c73

      SHA1

      32e784e91ca7c2de627abea1c9e1efdc56800f5e

      SHA256

      98dc30d2bec979c5fe2482503b514148b19116b5ce02fac87de08c509f625a58

      SHA512

      b690e64b39512e5a950f6d7692a6aef443c8476d8ed1b1f3df6a42bbbddeee36fcc7b7efe6b45db4c55a95418f2d4ccb3351d5bf9414a996d56d1657e4ae2b40

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      3ccb82c17b7ebb4e3b6e63ad3e0d223e

      SHA1

      026f688d837b4c66fec64f21cdf4523ed8ce383f

      SHA256

      3b9453dcd0756096365bb6d9d319a9c393cd2c20439d62e8ad3d68677b221b8c

      SHA512

      6668d4398c88863a1fcb89c43c5126d52acf5c123a9000a1c37e0448d61688d7eac63e4407bd774e8b515589e1b6ceb5131b3dd902493c88053d6ada23042505

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      88442681de2d65d5cd2004040ea678cd

      SHA1

      2affb17053f1f4dc43aab604d7957ee6b98e58c9

      SHA256

      7c0a070b4c061b6d38f361668dd1242685395cd8596c5f9d1208c9d586f784f0

      SHA512

      c682fdfa2c88a411bb1d80a80ab478978dc5def3c4f7193e3c3c499fad1261dc021633969191a82c209d08bfabc0ea90480f9d10e20762b5d91d14ac312083ae

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      74571a1e0f983e4f77c1fff4dd576bc6

      SHA1

      1650ecb14d788180c9392fa3e9c457457bb6e35e

      SHA256

      609b2408cef9d7e28b3dcdb3307a02e778181f003231cb45c1719f4cadf35548

      SHA512

      ae4953ade0ee054e960d428dad6a4a80a845dc81b2c76bc94e66def2a0d14bb570c759a64cfb31341f03117299c3f464818d716152d5f88a1bd771ce73668130

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      68e152eeae4ea1895efa064224945ee8

      SHA1

      ddf6d0d73aa7bf6292618c6236320bafeda12744

      SHA256

      a46c83d7750d937869ad7ae522ed01ef8b23c5e90dbb7ece5ee4e05331f9b74d

      SHA512

      858c4a318430e879f442b87b16e53ff20022e9dd09b5efa5dd1901703c5706e9b20cffc28b06a9b9f9ae0de088342f0f5b55a239494dd0b1029f33e7c9d3cb64

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f80f95dd485e82ebf31a16655fa78e33

      SHA1

      61f9c9e473061fb9129c066c4131908b8f8efb44

      SHA256

      efdb265d79e7963e1ef502cb4c38b872f4ef2d68fe184f85b3a08eafcf916ae0

      SHA512

      1ddb670490e9f26fc10171bf4fa2d83efd5cc95f386f0a6539759618bb8103c8e50a48808013b6a4e4f5d15373407e603f34d407e00bbc32c410d2190c73af44

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      34d4e7ea67c2f4ae2e5a06c11d2aeb11

      SHA1

      c611dfae5609b3b274058682ec34847f1b7e8b7a

      SHA256

      4f366a46552374f7c5a2a9612017f75ad98d64051c62865e0eaac6d44590ae54

      SHA512

      60073702636b604628c276cc023524660514135b7a1e565fadfa3196948d7f995b45bfac49647962649db1190ff3c33dbde3743d4c6a3644e384cd20a0ed0af9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      85b342fb640b6842fe5482a87cffbaaf

      SHA1

      2b6f9c8d4fc97deaae60cd8c15df14e97a109bff

      SHA256

      080ecd88b27e0081f5766647c323002aa3413507c9fab64b115d642c221e7f6d

      SHA512

      26e236d9a7044371256dbab464faf5b3a17a3f074c5ee759a0c8817e831761a58d4a5ca2bd27949a3ead649b785970a37835ef4deb68734b9efc66fbec4b162b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      330acb1a34006e7aef7abf15b32ba849

      SHA1

      52320a1480ec1c48e0a3d0a68cd88e715e59a348

      SHA256

      4d7ada9c9d7ca8ddd667ddcb7036369a58080a4b5c55a3c3165b3b835e56fce5

      SHA512

      0ef2c58296cb0578e48551c48310a4d58dd1a4f60362fdf4e808fdd7b2dc2643769edf09027b0bb9ffc403fe23e6accab749574fed0907e42c6e322b24fc044a

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\bqa1h19\imagestore.dat

      Filesize

      5KB

      MD5

      0bec86c9770e7a1257827ee6de4a6deb

      SHA1

      58b52c35caea842b0298d865bec837e204c3a498

      SHA256

      44e9d075cefd8c54daf46ff53251da987de0e850e56df06e6a32687e662c62cf

      SHA512

      20fe959b9801b1b822738930a8b6bd90d3a935b8ec5497a5cee4423a79ff2e755b733bdd3c16c138974d8bf5686edc16c18812622078e65d6c839e23df966834

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BOB1G6ZJ\favicon[1].ico

      Filesize

      5KB

      MD5

      f3418a443e7d841097c714d69ec4bcb8

      SHA1

      49263695f6b0cdd72f45cf1b775e660fdc36c606

      SHA256

      6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

      SHA512

      82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

    • C:\Users\Admin\AppData\Local\Temp\Cab365D.tmp

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\Tar366F.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • C:\Users\Admin\AppData\Local\Temp\Tar3702.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • memory/1924-606-0x0000000074B00000-0x00000000751EE000-memory.dmp

      Filesize

      6.9MB

    • memory/1924-607-0x00000000004F0000-0x0000000000530000-memory.dmp

      Filesize

      256KB

    • memory/1924-72-0x0000000074B00000-0x00000000751EE000-memory.dmp

      Filesize

      6.9MB

    • memory/1924-71-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1924-68-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1924-73-0x00000000004F0000-0x0000000000530000-memory.dmp

      Filesize

      256KB

    • memory/1924-65-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1924-62-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1924-63-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/1924-61-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1924-59-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1924-56-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2784-13-0x000000006FDD0000-0x000000007037B000-memory.dmp

      Filesize

      5.7MB

    • memory/2784-14-0x000000006FDD0000-0x000000007037B000-memory.dmp

      Filesize

      5.7MB

    • memory/2784-18-0x000000006FDD0000-0x000000007037B000-memory.dmp

      Filesize

      5.7MB

    • memory/2784-17-0x0000000002620000-0x0000000002660000-memory.dmp

      Filesize

      256KB

    • memory/2784-16-0x0000000002620000-0x0000000002660000-memory.dmp

      Filesize

      256KB

    • memory/2784-15-0x0000000002620000-0x0000000002660000-memory.dmp

      Filesize

      256KB

    • memory/2980-69-0x0000000074B80000-0x000000007526E000-memory.dmp

      Filesize

      6.9MB

    • memory/2980-1-0x0000000074B80000-0x000000007526E000-memory.dmp

      Filesize

      6.9MB

    • memory/2980-8-0x0000000004780000-0x00000000047C0000-memory.dmp

      Filesize

      256KB

    • memory/2980-7-0x0000000074B80000-0x000000007526E000-memory.dmp

      Filesize

      6.9MB

    • memory/2980-6-0x0000000004730000-0x000000000477C000-memory.dmp

      Filesize

      304KB

    • memory/2980-5-0x00000000007F0000-0x0000000000830000-memory.dmp

      Filesize

      256KB

    • memory/2980-4-0x0000000000550000-0x0000000000590000-memory.dmp

      Filesize

      256KB

    • memory/2980-3-0x00000000047C0000-0x0000000004818000-memory.dmp

      Filesize

      352KB

    • memory/2980-2-0x0000000004780000-0x00000000047C0000-memory.dmp

      Filesize

      256KB

    • memory/2980-0-0x00000000002E0000-0x0000000000348000-memory.dmp

      Filesize

      416KB