Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2023 17:33

General

  • Target

    Balance payment.exe

  • Size

    392KB

  • MD5

    9380d44800fbdf3899fe1d04af533d1f

  • SHA1

    a052510980763e83d19c3f9824ea58a5f4eab2b3

  • SHA256

    0b6b634a3d763601e989506f485f0bbbb9aa0b739f34d5566069bfd7bdc05904

  • SHA512

    8e2e205984f1672df25d4c78fca631290706e793677f480b0d088e60bdbef6b91b5e7752175cef0d85fc6c381adf39c64cb3ba6c4578ddbd5b7a79dff9f7be99

  • SSDEEP

    6144:WSodkdIGvvJXFj+3vsW5qeP0sCuTiw14LqcCiNMF2eR2BQ1hZnhG5rO/lGFNzTbn:WSFdIGZVjukc044NCiSx71HsKGXJSA

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Drops startup file 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Balance payment.exe
    "C:\Users\Admin\AppData\Local\Temp\Balance payment.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2956
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ipconfig /release
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2644
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /release
        3⤵
        • Gathers network information
        PID:2760
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACcAaAB0AHQAcABzADoALwAvAGcAbwBvAGcAbABlAC4AYwBvAG0AJwA=
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2632
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://google.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2476
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ipconfig /renew
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2488
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /renew
        3⤵
        • Gathers network information
        PID:2572
    • C:\Users\Admin\AppData\Local\Temp\Balance payment.exe
      "C:\Users\Admin\AppData\Local\Temp\Balance payment.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2384
  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2476 CREDAT:275457 /prefetch:2
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:2904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    0dcd24f52b34e27e0853b091e40b703f

    SHA1

    64fbd3b2f7f6d3f92b9d05256673a706767a442f

    SHA256

    98b91db7180737fd1a94b27b5f22955ed7151811e76c839712839db3db2a9d9d

    SHA512

    58e63e93ecd1af4c197381687a164adb5a95c0b2b78e6bfab8460ce7074529d1bc8f9681f9998999c998acd3a3b29269dea96d87992955632e5bbb641bc65c7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    94259684669dd3972ac95a9f1e8a1dc4

    SHA1

    602276ecb82a0998b5ca908c7166414c223d118c

    SHA256

    12d7e4185ace47aec8a921d33f983b3dabee1ee91d0a2709f36f9f0010acccf0

    SHA512

    19491e688a3ee23cb9c646a818867c4d70d3451ecb393d16c5b546d6fa4ba48a8aebff559714c116bb045d454476c69e8d7eb09e3fbd3e3b5bd3373661d96ee5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    409e9f396a7f3f8277e5334dc3e8ad34

    SHA1

    9488ed3f441bf1b81ece73722d45cb2f134ba6af

    SHA256

    e6550038e5d03590688d4b1647cae51dd35c36ee534e2197475725c48e05584f

    SHA512

    6aefe0aca2d963aed017cfcd0b8a34454288ebceab033082f5b1038867dac56a0b57ab57eb164ac555a0e487194fd6e4adf7819ebf538ad6247d79912aeb3634

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    db85bd52531dcf16ca380d916aeabcc9

    SHA1

    f33f6884a865e08a96c27d976ca24d3d08b93fc7

    SHA256

    e737c565c394d42f5c4b326cf852c2f45608382cbf3152e5bd99d1c58eae4b09

    SHA512

    d4a58c6ea6205335149fbf7b2396a073da5bc0b06ee6c1450d0154331c4df5e89dc7b783e57a2900751a9cd3acd32945d8f52685488466cb4a277b3468b2f802

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9cd1121380d9b6bee0ba7d31a84e7c9a

    SHA1

    02d9f6232bc64d4b691296519119b5fdf01d895c

    SHA256

    f8de2dbe1c16fbd0c12001927f0f6d6324ace5e17861fd9e5ee0943c8dadb340

    SHA512

    97f2680bb36411a7a4bb0eb42f826bfac11b16b00cf419acc603acf09b7e8891666330fb82e18deb1b82ae6cdd9d8c0b55101ae3aeba2676310578b92cc2e028

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cc2cfb3c798f98ae1dec0254ddbeff96

    SHA1

    ee3e5d66a5292e7464d2ef1fc59cacae99c8f7dd

    SHA256

    bb37572833f86830911faa5b8bc5b7de0c1835a43f6d9b785ece4dbe78ea41ce

    SHA512

    997e0fd0672bdf4f2f49b2eb838ca3b85195f4708ae5fce4fbc9c68e179859fe090446c31b3b8d99fc77705512b3ec1794c9907248bfbd3471f04cd39478c523

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c4816ef4dd151d16e093e6c668e5bca8

    SHA1

    0bcd310661a87d082193020934fe8b63db9e6b06

    SHA256

    0b7294836c3ee59f138483cea9327b13af6d46bd49a2b1f847e3d5814f8b47e7

    SHA512

    7c5470c5f55ffb6d2372257c4674286deb2fb62e2e6d9245263176d1087c404d219ec8a14608102f7e9c38769b52d86604661f0d2a21d9a74ba6d9e89f523941

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2f3aa28c149770bc7d470cf00d66e78a

    SHA1

    75d994e209021e2529f15add4a38407f0fd5214a

    SHA256

    34939e98be0545ae8a91ff248754bb1293bf11040349790d0a104ec1a5502451

    SHA512

    de986b17bcccbf5ac357d510890766118b042d4f1c705384746304983721964aa78edca88621535c53ac322fe67f542523f58a34173e85211019372d12caa8d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fc94a25d4819ab02aad389b01bdddd88

    SHA1

    db8038342083d02a3ebd419e4b269b960a90ebef

    SHA256

    061acc033ac8a69390815b38f846f6d2607e7728eba3625eafaf4422ba7ff670

    SHA512

    60a2b8d08725041da0ed39491148c114a9c38e27ed2e272c29ca453c2dea5e82d4708eb785c7e6ead1fc5d1e78b21f236628f9e992cb63571dbe7d973c2aa049

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    33dce30929368b86501ca013545a4ed3

    SHA1

    9a1ee7465bec8f201e2f5c3d34b4686b66457081

    SHA256

    af4ac1080ccc5d1eaed172acd5629fa0bccfc0906bba18d24087a2d81da909b5

    SHA512

    5dd65c77d8e78767a579b6b7cddfd4461f21dd66342a1f25873606d01699380691971963351da6d5057c80ee17da99a57c8c918591ddf8e9af562247d9f88c66

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3f92371b2a200223cb537ecfb4352103

    SHA1

    78a23dc44a32d4d8bd6ee436a66603d392e5df11

    SHA256

    c1374dbaddc0891c0ead6a583e46024149d017085aec9fc7dbf69205a9ce927c

    SHA512

    c1e3d93c009d395ad17a5cf7f6b9c527267191cd7c5245a13e0c62e88d24abcd2ca4f2f9f8bc24c309eee0c11a2ae85411e10a87ea757968eea071b434a38532

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c777835436b8794418478cb5b2dcf5b1

    SHA1

    107b76ed91cf7b593e69222659776072b7a573e6

    SHA256

    230f559dd3f5965cfe494e8b187ac05f0f71bcb95cb25323adae23eb547f6d9d

    SHA512

    cced1f9a3b8115c5de97d10e738b6fa7be2c94d3cf7a55abe8f001a7ae59a710b0dfa8370b6e20c4dd6e9ddc3a8d42bb80be67e148c5953a9382d29470120ab4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    de91332f28bfe4b4b3fcef6d76eedaca

    SHA1

    7611a024b6a80f9d0632a8d22bf43d0337de8495

    SHA256

    5af7ea8ca49410e860c95fe4a0503dd71161de9c29d5c520dd85175525728ec3

    SHA512

    e2e986fd6dc88a963c76884a2e6fe06e21745f44648376aa61d34188a15dae7889a340b2f8a5bcf69b89b206c684dff7063e4283ce32b60d41c45622a1dc47ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    adffcb57254be7d9246f649987c8517c

    SHA1

    67a729fc283e2194caf5011cc1dc40b41ca89c4e

    SHA256

    0551c17283f61b35db3ac931f12c1f83985d0f24596274b4da51c7dcdb581421

    SHA512

    0251ea5abe31e52bc572743d6df8ed7120494cb0e7f31d14d46690f13c19b80d01fd56ade9b21eea9d3b30e738904f93c8d90b56e4387759a4648f5d0ddb77e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    88e334f4f68b97413189a1de6412ed42

    SHA1

    9f62565a2353881213b2865df2cad33882dcce5d

    SHA256

    585fa7ec5daf3461222d42cef67898d45e4e8d530f682ed1598739e703ce73d3

    SHA512

    f07b994349d2ef6b52a63af2e8f76e83e07ef1ca8a342fa238cb7dac9f9ac986e4d2a286227cf1e2d9615b39c7fd711cb36785bdf6f792050736e5a27666b8f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5ec58e098c8ebb878fef64a18285a2f2

    SHA1

    753ca542d30142b74c60a04fc4dba1f397cc9856

    SHA256

    46140dbec14869ca93caba6fcf4f2092631a08beb30c4b851596e8259b870ee5

    SHA512

    598a0be0adbfdc660a38f091d09781abb5cf84e2d6ac14c994cd423c978984ea0cd7c29eea876166cb1aff660615eaadc4682930473952be073ea2df2c7521e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e50c0643b4f1d4d13c923408a08397f6

    SHA1

    a16e447b06cc2cf7c3a77a30185a41f6d702a5a2

    SHA256

    f05b4927c59a000f205330f4c56ac1fbcc894f6a8f598034ef6192276be316f3

    SHA512

    59b49b4680bdc850f250f2fe1176b75679339916a95dac439d6a2c7dae43769136e50ae5a9820b92cf6458ce74fee51eeac5bacf0dd94085d2c48a918dace846

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    558083c37647ec3160cb8081d942e48a

    SHA1

    6bb9c38fd8cab7c3653ec480a02c53277c16076a

    SHA256

    f71e8c3b24c1001767f6f419887662bfa475e640a8934ac7674452cd29fb17a8

    SHA512

    1f39a42ba0e0180805667f9c1f477d87eb50ed4beae9b048e275921ca6be004cc889278605a9bf9b706a4ef0f27c6b579466a17127154a6f26fb8a49fb342d71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c24bbd5054c1989e33f7404de89c1b36

    SHA1

    b130ebc6aa004df052d11af540730f5eba975b63

    SHA256

    54eda604ffaa5067491d27747e3b78e16fe45979b33dc5370a0a2f2d7c59c097

    SHA512

    0fa565f77b790c00f6cc88cf69bcc351ab54ec912e16adfa91681075bae775b10fbc65268a2b768af496cf4449d3cd93e9416cf1ca65b05efa6148fb5e647dc8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8a5f1cc5f22ae7b9b926bb7fd9fe9d65

    SHA1

    c8295a0a6137c6a8dc7b437a67a56abae1055346

    SHA256

    d5de79cfb85a123bc1a7a43df80749177effc9161dbba92967ef7f875027287a

    SHA512

    1b9c0f0a314b8c13fc9f810cb0170a8c5c70b926ac7590579bb7175f00154c14a87461feec881267987fe44143329e9f80819c988f912d1ac501fcc25200e3c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    287718f7e5af7095c5e71af08be0a2f8

    SHA1

    8caf5d0aa56e756979c4e982101802d9f47d03ea

    SHA256

    68e0969ee52958efd5cadcb890b336d2d2a9246f6cf60a237a00298280f59a96

    SHA512

    5a456d9cec20e29b3634850c48e252a6b558aa0e71e940a3140a3bcb4a79e94e8b3cf26f9b8628e0ac76c8781fdfbaf76938499080c4df58c57db135be476a35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    787ffa2650a2e743af6ec81a6ffb838c

    SHA1

    5f295a438b31c0b584bae9d90f6f988bdf6d298b

    SHA256

    f2a81270f4c570b5363315484ce4067a1a7ebb86ecff77395149b899e2424a7f

    SHA512

    634a82094b7b0732ff5391adb127a33366a93e1b454aceba838db7e7fa4994cb386c294ed5a556a180fef103f5184193424cff9d352e0b45d40d2d8e98dfb0cb

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\rpg4tgz\imagestore.dat

    Filesize

    5KB

    MD5

    22e9fc0cc4d0f1f550c223f9fd239930

    SHA1

    c786031d9398e74d7fa76490a1dbd8d64e0560ae

    SHA256

    a3ae655377c4d254babd17a761cfa48b29d12118a34003f7737fceda66abb9ba

    SHA512

    38a4f0921df05cd6f121421b918d6806e6204b38ebd75c8f0db0483241284b037ba9fb1f25b0b4a5f4e48004f6228bfba595307da66efa7e2b5607aa96640f37

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3FH71F1O\favicon[1].ico

    Filesize

    5KB

    MD5

    f3418a443e7d841097c714d69ec4bcb8

    SHA1

    49263695f6b0cdd72f45cf1b775e660fdc36c606

    SHA256

    6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

    SHA512

    82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

  • C:\Users\Admin\AppData\Local\Temp\CabE957.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarE95A.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Local\Temp\TarEA88.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/2384-602-0x00000000049B0000-0x00000000049F0000-memory.dmp

    Filesize

    256KB

  • memory/2384-110-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2384-123-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2384-112-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2384-124-0x0000000074660000-0x0000000074D4E000-memory.dmp

    Filesize

    6.9MB

  • memory/2384-116-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2384-118-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2384-111-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2384-125-0x00000000049B0000-0x00000000049F0000-memory.dmp

    Filesize

    256KB

  • memory/2384-601-0x0000000074660000-0x0000000074D4E000-memory.dmp

    Filesize

    6.9MB

  • memory/2384-114-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2384-120-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2632-15-0x000000006F8D0000-0x000000006FE7B000-memory.dmp

    Filesize

    5.7MB

  • memory/2632-13-0x000000006F8D0000-0x000000006FE7B000-memory.dmp

    Filesize

    5.7MB

  • memory/2632-14-0x0000000002630000-0x0000000002670000-memory.dmp

    Filesize

    256KB

  • memory/2632-12-0x000000006F8D0000-0x000000006FE7B000-memory.dmp

    Filesize

    5.7MB

  • memory/2956-0-0x0000000000160000-0x00000000001C8000-memory.dmp

    Filesize

    416KB

  • memory/2956-122-0x00000000746E0000-0x0000000074DCE000-memory.dmp

    Filesize

    6.9MB

  • memory/2956-7-0x00000000746E0000-0x0000000074DCE000-memory.dmp

    Filesize

    6.9MB

  • memory/2956-6-0x0000000004270000-0x00000000042BC000-memory.dmp

    Filesize

    304KB

  • memory/2956-5-0x0000000000620000-0x0000000000660000-memory.dmp

    Filesize

    256KB

  • memory/2956-4-0x0000000000520000-0x0000000000560000-memory.dmp

    Filesize

    256KB

  • memory/2956-3-0x0000000000380000-0x00000000003D8000-memory.dmp

    Filesize

    352KB

  • memory/2956-2-0x0000000004A20000-0x0000000004A60000-memory.dmp

    Filesize

    256KB

  • memory/2956-1-0x00000000746E0000-0x0000000074DCE000-memory.dmp

    Filesize

    6.9MB