Analysis

  • max time kernel
    123s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2023 11:33

General

  • Target

    Balance payment.exe

  • Size

    392KB

  • MD5

    9380d44800fbdf3899fe1d04af533d1f

  • SHA1

    a052510980763e83d19c3f9824ea58a5f4eab2b3

  • SHA256

    0b6b634a3d763601e989506f485f0bbbb9aa0b739f34d5566069bfd7bdc05904

  • SHA512

    8e2e205984f1672df25d4c78fca631290706e793677f480b0d088e60bdbef6b91b5e7752175cef0d85fc6c381adf39c64cb3ba6c4578ddbd5b7a79dff9f7be99

  • SSDEEP

    6144:WSodkdIGvvJXFj+3vsW5qeP0sCuTiw14LqcCiNMF2eR2BQ1hZnhG5rO/lGFNzTbn:WSFdIGZVjukc044NCiSx71HsKGXJSA

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Drops startup file 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Balance payment.exe
    "C:\Users\Admin\AppData\Local\Temp\Balance payment.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2904
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ipconfig /release
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3056
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /release
        3⤵
        • Gathers network information
        PID:2564
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACcAaAB0AHQAcABzADoALwAvAGcAbwBvAGcAbABlAC4AYwBvAG0AJwA=
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2624
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://google.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1696
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1696 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1820
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ipconfig /renew
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2492
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /renew
        3⤵
        • Gathers network information
        PID:2480
    • C:\Users\Admin\AppData\Local\Temp\Balance payment.exe
      "C:\Users\Admin\AppData\Local\Temp\Balance payment.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    59923c67c69a64a3a8ef81fbab43f04c

    SHA1

    2155592aaa8ffc43b540947049889846c22f3a73

    SHA256

    490203d13b44f05a10f34343891aa7f648ebb7a309aa20065a8d2475083d3563

    SHA512

    0e462f8e19d0f5b2e00695735b4e099d2a5a967b675b647e705cc839ec4c07a8459063badd38e1f9b6855a71e3896a65334b76b813d00167932e9fa3bb0de776

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2b9ea1f721da7dc57dca0ed5fbb01c58

    SHA1

    e3b7c8d75b8bbed439917da9d3c859386b81a2e1

    SHA256

    d8aaec06c3a5450d4c954bc5cff3ffa2dae950d286b3e43bd3fc1d468a964327

    SHA512

    80e1120eecc9c233cf7ccf737ae7fe598383a6ca64e7e12234680bd71cf5a172856c5bb66a0143bdb635e7c99e9550cfe16b3802d1cecf0cb4554ed3d0d0ef98

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a50e1e82f657ffc8d991b5ebcb897487

    SHA1

    ae472af8d5e951dedbc72736c8ae2fc36d2b0cdc

    SHA256

    3cc0b88a60cbf72248777f470fdb5dbeb03e4fcc8dd458ea64f8f7912b021a1b

    SHA512

    1c0bbe263793854e2da41ca6e05f6bd264d40d26dc521d4ab59badbba8df2747cdb1f0bfa1d97a4728f7ec7345d4e30a3af783a5a9a156a40af73ad60162b3c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    87e15caa7feecd0adf558757157b6e73

    SHA1

    1b738c85c8accba436ee81e5584fd44c0fd2a838

    SHA256

    030e8a10adc08bdd62e514f21adbcfddad4005d41495d42158bf82c615aa6286

    SHA512

    b6b4ddefee8bee37c207418691441a70850793dea9e304b3e6a48d06968f8603ed162087da344f03553b66300ab9908dc5fc25c1c5ef8c9b18990bab85b3aa92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    faca81e58296d93fc4ce927d57956183

    SHA1

    582e0083d8e64085c061eaf7e51c18cae0e1ff0f

    SHA256

    e09246c8c2df6af7a72c324f4472886483eab3fb3b15972fa6ee63fd82b9cbf9

    SHA512

    377473d0b55feae212bf6e33ab14e00054e87e22bd90b5a5c43cec9e8adfa4cba94579f49a088953c48aefccd002fd2983136b0f4728d0157d5a2f19737d8f20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bccf1f3f7d5a2abcb91b897eb0b6b5ff

    SHA1

    47f4e9f9ad66745f18775874ec242861f2aacb60

    SHA256

    00b81b6d7e6270a5469ae115e0c6fe20094965fe7f92bcdb897b6e97ad5586de

    SHA512

    9940e28f88ab2b4b534e3dc76f8a6dcaa2b76c86a9722059faa6ba8f3a1a2be31cdc61124bfad41d3f68ccb7e520fa1da640e937b612cc356635a95541c34df8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6809ad13f57346018f4e673d924cc033

    SHA1

    8950d5bb622d636c785cff14e915c8b6e6f5f5d2

    SHA256

    0e809f896531ad8dcf6e125c7828e2f9573b9efb5abeef5b4d4e51357301a378

    SHA512

    9fd2ed19dd314d98a212ed0d6a70fa5ea315980a8530fa9f9937b001c8c53bfd899bff4065169feb0db543cd37184cb4a78e2537d34d673ec75eb6828ca748e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    18178d2b9020fb80d4edf9d79d88f254

    SHA1

    f6c63e67699f05ab406196f2e0ee971b66660f2a

    SHA256

    bcf8ea4a8196ec8739418dc6a8a3cc13553577bf56fd0adfec34d94d5831cb66

    SHA512

    a6e412ff54b9713831269f12dac0b411bc1cadc66b8866ef0d6a7f1a84dc809d16decf733f8f3622f784230ff10c26b14bd084828cb1dd15094955773d59ddd6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    09a7eef2ba6f2911fa5a37bda7a8f78f

    SHA1

    14f86e363e64616f26d9f9fc1debde88a3161064

    SHA256

    623cbf836c5cdaa0ae5ee97a2333ab10a418178c614524ac010a3e2ea18d3246

    SHA512

    1773393a2ebdaeafaf35887f4d0fe06b5d7535b86f9349a8a3cd5f0da1589b573b038af18e846939e73cfb3de446229258c71b1ffaee64bf2d18250a321ccbaf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e82a8828f24766c65eff30ccc02488b4

    SHA1

    6eb4941bd0059f5bb5aeadcbea3682e255537d87

    SHA256

    1a3a496da8f6f11c76e697ae3048f5682c8c8e7a2ae416da44572eee09e65814

    SHA512

    c1fec04e67ae6cf1e5dabadfb4259a0553d4aed78ad5f310fc6b47c8eaa28bc043140d2de52e11c6fa9b0437d662f526ae696fa4a8eadfc0f3dbe858560f9140

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1712359b9c911cf5765956a684e63979

    SHA1

    a3bf09d6c8e0c900014f0c9faa6c7135dc083e65

    SHA256

    2da421c32ccfb4a6419e3f274cd3efe7e3ab48de42433edba95fa9e2171e2b38

    SHA512

    95c0385319706cf776b434c9fef0b68634237044fb95f0d9037167015b243b9b6b4e11283ace6af8e46c34e9ca95c7a39f8038fadb4fab89dd6048d9800fadcb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    413160f8775aa8cd0bfda3a1213da6d7

    SHA1

    799976c47e329a29d854b694eb577281360eb7d3

    SHA256

    470e1155593e632422c0be496de7e06a72ce65f94e28e49e2160fe52d2d7756a

    SHA512

    8a05a5ca0c9a7d58a73554205bd9179604572751345560fea4191a5e33bc1a06c26a630ce11e5c9581d02b03353e0febcb8e4983bdab025e18efcfb374ab5734

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8d4497561f57db0e68a324847ed4d57d

    SHA1

    ce48c6920edafdc5551699c2b2e585b7266196da

    SHA256

    5adbfe7b1af91bf779620d38da12c4c67c60d56c662b2ee857010d67a51bacea

    SHA512

    dffc4eb92a4a840c3ae2e08c76fa67dc9580d5cef6b147d4ca9ab78273235898bcb4895acd82af093bd5717469d9518460b709822402f50de74b43a3924e5b4b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1bebf1ba5484164e95f1ccf51d654677

    SHA1

    618a24f814e610f19d7e86e38bc72c340d4d6e15

    SHA256

    d64752304366a3a4579e0aea9760d88f3ab3c4b0ef6f57696db1da293446f8ef

    SHA512

    9595f99a7bbc462ec2266b8cdad5ac2fd9f84ad252465584b7f7a0f078c7e8a8da038b2ea9a38deec26e7bedd5e660e30ce7aef852ee45628851487b06b5fc74

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c5db92f1b3792ddd7b4c7255d585001f

    SHA1

    5c8500bf2756d0be17cb2c054f90397e4283998a

    SHA256

    fbd43d4fabba6de841c87f5aef5754fbdee96aabde2244f42a0b5db0adb73ec3

    SHA512

    7b0d117692ae92d871485b29968f06d099832032cedc5d90e6324b60e2a2f4f66a9003270dcb069acb93d56a9d2c9d404282edc7a00f532c45f44f39eb9e9ca6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1a4eb93045deb7d63033f4da53586f65

    SHA1

    91e63576003820fc0a31bb12055f3dc404b13324

    SHA256

    0254f1392e531c1510aea3cfdb1ae0431dc1363e3d6762324cbaf279d6b8defd

    SHA512

    323c7c0d4cf178d1aead38db2034e75363df809012f39def4e3a4421f4f46a6bfb5b10901155b81fa4fd8b3f22b5fa956fe7e523bbcf21a71961894a46d1e8cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    823929390df1c916a7dcb1e09799f174

    SHA1

    e1294d1c3a5647f5a9cda6e91d5cb0c96875c8d7

    SHA256

    b1eabc9431eb2c08258e5d889cd985fa3d351fe317246e48e37b4e616313c763

    SHA512

    c13f6464a7c823e3937f4d3b4ce9d6fc373556da38c5ce407385b8f26b8482352de9bf44766e1ecad753099cd641d1431e7c1410171c65703166b3b86c1a159e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cb9f646a91109e97a918dc367aa8198f

    SHA1

    6a05b1e244f66190b92398200161abfff48b61dd

    SHA256

    d4d38b152591fa6a727b598460c3495d10051170605c9e426ffcbcad6f1e9dd8

    SHA512

    7148201b650ba0a2ec5b1389e5bd2564d6902c695ad448112d272dac9894be1a4bb1bb3e95d4f3f2fb21be277255a7aec35682074899bf51d8bf45918f3b6f42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    54bcfd9699a0f97539ffa84df17a98c0

    SHA1

    1449357c373171c2f27a698e7ddb276be494d25a

    SHA256

    53cbc36129970e23c34a10f60889fc39141566f3b74c2ac17ad2983fdc83305b

    SHA512

    d75f18aa846f873deb28ed906fc3e977b0f13463256c1f2a004aaeab5bd122bb6822bc1bbd659f6ced2a613e8c6523aa6eddb7ab03e60385955c0e10a8203376

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    1f09ee5f9833f203baf18ca6288fd423

    SHA1

    3b32b9c3e825eebcb5a783adb136d5874d4a68f4

    SHA256

    c1c0617994b74571dcc6030548f56defda077e932b02ccd2298dd1b6ce3b59d5

    SHA512

    73983d1864ed9176adce0e0a1757cc0ced195942ea94f4b8e0e5d4521b6aa762df50716cbed6184dd5f2e0781f8f94a434aa922c26333c8205acfc35dccb3aa5

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\bqa1h19\imagestore.dat

    Filesize

    5KB

    MD5

    875d892d4be6484ec7b8eb927038adba

    SHA1

    6ad5b14b1e38019e0c829a93f8c49c6ac55b0cf3

    SHA256

    cf395f1d20cae09aac8f40ebb5c60cf396d9951012c61fbf216fdd21e717e043

    SHA512

    b79c7b1a529f8565fdddc138611fc889805cad877569d6ed2715b974a61d9350d800252ad7b72bff63a36b3044baa080a5efdad50cfa5fe11589e68a3ff743dd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BOB1G6ZJ\favicon[1].ico

    Filesize

    5KB

    MD5

    f3418a443e7d841097c714d69ec4bcb8

    SHA1

    49263695f6b0cdd72f45cf1b775e660fdc36c606

    SHA256

    6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

    SHA512

    82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

  • C:\Users\Admin\AppData\Local\Temp\Cab235A.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar403D.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Local\Temp\Tar40B2.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/2624-14-0x000000006F570000-0x000000006FB1B000-memory.dmp

    Filesize

    5.7MB

  • memory/2624-17-0x000000006F570000-0x000000006FB1B000-memory.dmp

    Filesize

    5.7MB

  • memory/2624-13-0x000000006F570000-0x000000006FB1B000-memory.dmp

    Filesize

    5.7MB

  • memory/2624-16-0x0000000002810000-0x0000000002850000-memory.dmp

    Filesize

    256KB

  • memory/2624-15-0x0000000002810000-0x0000000002850000-memory.dmp

    Filesize

    256KB

  • memory/2904-3-0x0000000001E00000-0x0000000001E58000-memory.dmp

    Filesize

    352KB

  • memory/2904-6-0x0000000004670000-0x00000000046BC000-memory.dmp

    Filesize

    304KB

  • memory/2904-0-0x0000000000100000-0x0000000000168000-memory.dmp

    Filesize

    416KB

  • memory/2904-2-0x0000000004A00000-0x0000000004A40000-memory.dmp

    Filesize

    256KB

  • memory/2904-4-0x0000000001E60000-0x0000000001EA0000-memory.dmp

    Filesize

    256KB

  • memory/2904-5-0x0000000001EF0000-0x0000000001F30000-memory.dmp

    Filesize

    256KB

  • memory/2904-1-0x00000000742C0000-0x00000000749AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2904-7-0x00000000742C0000-0x00000000749AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2904-8-0x0000000004A00000-0x0000000004A40000-memory.dmp

    Filesize

    256KB

  • memory/2904-78-0x00000000742C0000-0x00000000749AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2996-613-0x00000000047E0000-0x0000000004820000-memory.dmp

    Filesize

    256KB

  • memory/2996-80-0x00000000047E0000-0x0000000004820000-memory.dmp

    Filesize

    256KB

  • memory/2996-75-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2996-612-0x00000000742C0000-0x00000000749AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2996-73-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2996-77-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2996-71-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2996-68-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2996-69-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2996-79-0x00000000742C0000-0x00000000749AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2996-67-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2996-70-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB