Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    116s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 02:13

General

  • Target

    04db464b6a31437b0932cc3d86b2633c090af01a60423bcbc562364c899f2112N.exe

  • Size

    5.0MB

  • MD5

    d0e9d314c29867185f9e802dcc490060

  • SHA1

    497aebefbb560065ab9c29d1faa96c8fed56146c

  • SHA256

    04db464b6a31437b0932cc3d86b2633c090af01a60423bcbc562364c899f2112

  • SHA512

    8423cfdc2a99806717b588c44bb65eb942aed051dfdb41ebfb3295555c0ed983fcc9d007c28b05b7eb9e2ba471038a102017fa13e39c756abb136eaa2e7ab317

  • SSDEEP

    49152:kgvUDWv4e4uPpV1wrb/T8vO90d7HjmAFd4A64nsfJJKyutrDb4HGw1lfVGlJS5ZL:D4e4uPpVm6gTVGIO7DfE++eC

Malware Config

Extracted

Family

meshagent

Version

2

Botnet

TacticalRMM

C2

http://mesh.beraten-tech.de:443/agent.ashx

Attributes
  • mesh_id

    0xC2DBF8D5176E2795D03D1F2086E24D8503399C5B811169DE7D09CDA90EEF410CBE81B01B8A75A397214216EBA8427CB0

  • server_id

    AD48C3AA51248216A8C92D3FC4C1113ED99033BBAA3EAD73F71E07AACE6B685586E90C16830E5A7CE432D425CA12A7C6

  • wss

    wss://mesh.beraten-tech.de:443/agent.ashx

Signatures

  • Detects MeshAgent payload 1 IoCs
  • MeshAgent

    MeshAgent is an open source remote access trojan written in C++.

  • Meshagent family
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 11 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • System Location Discovery: System Language Discovery 1 TTPs 23 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 12 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04db464b6a31437b0932cc3d86b2633c090af01a60423bcbc562364c899f2112N.exe
    "C:\Users\Admin\AppData\Local\Temp\04db464b6a31437b0932cc3d86b2633c090af01a60423bcbc562364c899f2112N.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\ProgramData\TacticalRMM\tacticalagent-v2.8.0-windows-amd64.exe
      C:\ProgramData\TacticalRMM\tacticalagent-v2.8.0-windows-amd64.exe /VERYSILENT /SUPPRESSMSGBOXES
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4752
      • C:\Users\Admin\AppData\Local\Temp\is-BAJ9V.tmp\tacticalagent-v2.8.0-windows-amd64.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-BAJ9V.tmp\tacticalagent-v2.8.0-windows-amd64.tmp" /SL5="$C0052,3652845,825344,C:\ProgramData\TacticalRMM\tacticalagent-v2.8.0-windows-amd64.exe" /VERYSILENT /SUPPRESSMSGBOXES
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2532
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c ping 127.0.0.1 -n 2 && net stop tacticalrpc
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:4596
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 2
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:3100
          • C:\Windows\SysWOW64\net.exe
            net stop tacticalrpc
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2980
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop tacticalrpc
              6⤵
              • System Location Discovery: System Language Discovery
              PID:4388
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c net stop tacticalagent
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3164
          • C:\Windows\SysWOW64\net.exe
            net stop tacticalagent
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:212
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop tacticalagent
              6⤵
              • System Location Discovery: System Language Discovery
              PID:5060
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c ping 127.0.0.1 -n 2 && net stop tacticalrmm
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:5012
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 2
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:1512
          • C:\Windows\SysWOW64\net.exe
            net stop tacticalrmm
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1996
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop tacticalrmm
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1588
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c taskkill /F /IM tacticalrmm.exe
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3504
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM tacticalrmm.exe
            5⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3112
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c sc delete tacticalagent
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3832
          • C:\Windows\SysWOW64\sc.exe
            sc delete tacticalagent
            5⤵
            • Launches sc.exe
            • System Location Discovery: System Language Discovery
            PID:4684
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c sc delete tacticalrpc
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2456
          • C:\Windows\SysWOW64\sc.exe
            sc delete tacticalrpc
            5⤵
            • Launches sc.exe
            • System Location Discovery: System Language Discovery
            PID:552
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c tacticalrmm.exe -m installsvc
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:724
          • C:\Program Files\TacticalAgent\tacticalrmm.exe
            tacticalrmm.exe -m installsvc
            5⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1448
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c net start tacticalrmm
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3380
          • C:\Windows\SysWOW64\net.exe
            net start tacticalrmm
            5⤵
            • System Location Discovery: System Language Discovery
            PID:432
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start tacticalrmm
              6⤵
              • System Location Discovery: System Language Discovery
              PID:400
    • C:\Program Files\TacticalAgent\tacticalrmm.exe
      "C:\Program Files\TacticalAgent\tacticalrmm.exe" -m install --api https://api.beraten-tech.de --client-id 1 --site-id 6 --agent-type workstation --auth dc3b53205b645d6c81dccd9d4bc35f3799b67dcb0aa0d3f196a48493e8cf1da6
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4368
      • C:\Program Files\TacticalAgent\meshagent.exe
        "C:\Program Files\TacticalAgent\meshagent.exe" -fullinstall
        3⤵
        • Sets service image path in registry
        • Executes dropped EXE
        • Drops file in Program Files directory
        PID:1092
      • C:\Program Files\Mesh Agent\MeshAgent.exe
        "C:\Program Files\Mesh Agent\MeshAgent.exe" -nodeid
        3⤵
        • Executes dropped EXE
        PID:1696
  • C:\Program Files\Mesh Agent\MeshAgent.exe
    "C:\Program Files\Mesh Agent\MeshAgent.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    PID:3364
    • C:\Windows\System32\wbem\wmic.exe
      wmic SystemEnclosure get ChassisTypes
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:408
    • C:\Windows\system32\wbem\wmic.exe
      wmic os get oslanguage /FORMAT:LIST
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3100
    • C:\Windows\System32\wbem\wmic.exe
      wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4624
    • C:\Windows\system32\wbem\wmic.exe
      wmic os get oslanguage /FORMAT:LIST
      2⤵
        PID:1360
      • C:\Windows\System32\wbem\wmic.exe
        wmic SystemEnclosure get ChassisTypes
        2⤵
          PID:2628
        • C:\Windows\System32\wbem\wmic.exe
          wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
          2⤵
            PID:3580
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -noprofile -nologo -command -
            2⤵
            • Drops file in System32 directory
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            PID:4132
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -noprofile -nologo -command -
            2⤵
            • Drops file in System32 directory
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            PID:1132
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -noprofile -nologo -command -
            2⤵
            • Drops file in System32 directory
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            PID:4056
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -noprofile -nologo -command -
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            PID:1612
          • C:\Windows\system32\cmd.exe
            /c manage-bde -protectors -get C: -Type recoverypassword
            2⤵
              PID:5020
              • C:\Windows\system32\manage-bde.exe
                manage-bde -protectors -get C: -Type recoverypassword
                3⤵
                  PID:4780
              • C:\Windows\system32\cmd.exe
                /c manage-bde -protectors -get F: -Type recoverypassword
                2⤵
                  PID:3248
                  • C:\Windows\system32\manage-bde.exe
                    manage-bde -protectors -get F: -Type recoverypassword
                    3⤵
                      PID:4924
                • C:\Program Files\TacticalAgent\tacticalrmm.exe
                  "C:\Program Files\TacticalAgent\tacticalrmm.exe" -m svc
                  1⤵
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  • Modifies data under HKEY_USERS
                  • Modifies system certificate store
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5072
                • C:\Program Files\TacticalAgent\tacticalrmm.exe
                  "C:\Program Files\TacticalAgent\tacticalrmm.exe" -m svc
                  1⤵
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4644
                • C:\Program Files\TacticalAgent\tacticalrmm.exe
                  "C:\Program Files\TacticalAgent\tacticalrmm.exe" -m svc
                  1⤵
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1132
                • C:\Program Files\TacticalAgent\tacticalrmm.exe
                  "C:\Program Files\TacticalAgent\tacticalrmm.exe" -m svc
                  1⤵
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1340

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Program Files\Mesh Agent\MeshAgent.db

                  Filesize

                  153KB

                  MD5

                  408e9c7b52dcf7d1e5b729720757d0bd

                  SHA1

                  a87c9a5039a414ada3dc0e1b11319b49a3f9c6fd

                  SHA256

                  ea4393972b73b634fb682cdbb892e8bb1ec4dfadb9d5d29f26357a248934544c

                  SHA512

                  3ca9a6f9be8edbd566eb6e8578bff9e251542bacc6c9b7a4ccb81cad019c254db37b98898931cf8d29f0e01b2a98314a68d115e37bb043448000263b20b9a1b8

                • C:\Program Files\TacticalAgent\agent.log

                  Filesize

                  115B

                  MD5

                  47ced42d3ebf0568c199f9d3c0becb7c

                  SHA1

                  5ffc6924c69a3d6f8d676177534e0f2fb949457d

                  SHA256

                  3780635243adddbd46c577c12755f428cd1e4c14912fce4bfd438b1cba3ef22e

                  SHA512

                  ad3570ee8cb016af2726b5cefcd319ddefe1bb45e8b24b7ab0a9e9971053d3002d62688a674f2ca9e6a4a938673e1bd5a532d9142c1f9e322d0a3d65a96f648f

                • C:\Program Files\TacticalAgent\agent.log

                  Filesize

                  230B

                  MD5

                  f2843f178041e6b87c18d37c93fe361b

                  SHA1

                  487205e69da0aaab03cf4fbfd3b77124d6881d48

                  SHA256

                  22b598e7e8bb34df656ffabe285a874b21626645ded8c96533445a5baa337e67

                  SHA512

                  f6a2184cbbbe29ef7019f1ccafe9d994c4909a74a67f7f8d766a05c6d250fdb5641bf1130e2ef50a6f080e0507e0281eff6f646f7731cdce3a419ffc4755ad61

                • C:\Program Files\TacticalAgent\agent.log

                  Filesize

                  345B

                  MD5

                  2417f8f9a7a5b5db8437e1e757b78ecf

                  SHA1

                  94f59afffeb6640e93aa01538b616c109964b217

                  SHA256

                  0250c3f5bcfd3446332c839aad1cec1c8277beb27cf01e79eeb6775d430a33ae

                  SHA512

                  35f620b88da9a8e209ae1f3f64875786955ecb06fe5c5015bb9453d14229dbacae1d04d7239419ead5b9db022f15cc971cf51fb8071a30e8a08d4b328e089e03

                • C:\Program Files\TacticalAgent\meshagent.exe

                  Filesize

                  3.3MB

                  MD5

                  19a9bc4fa27b301997c94b10f652f54a

                  SHA1

                  45522bf1571f8e4130ac5346d6a5797eb8ff867a

                  SHA256

                  c3fe37b641c80ea4c863f9bf08faf32b6ac5c9a7f250bca14fca5beab7f12971

                  SHA512

                  0834d954e10681efe15305a158503085f8da6873e2b3ca36b95ea7bb7df12c11a3b38994712f17344535712b13816eb974df0dd70dd229770e4ad566a9dd821e

                • C:\Program Files\TacticalAgent\tacticalrmm.exe

                  Filesize

                  9.2MB

                  MD5

                  6cfbd2da5f304a3b8972eafe6fe4d191

                  SHA1

                  09c1600064cb9d157c55c88f76f107373404b2ae

                  SHA256

                  ad29d4e9e01870ffbdb6f2498e6ce36a708e56db2ad431ba2d80bf5a6caac069

                  SHA512

                  03a29d2eb00a97b3fc83e55a8b8b1fe3e7adbb06fe598ed5525bb3764caced0bf5a28a3fd70e36b66687fcce5a9e7c9243ee6ab3a82d394044f3c60714a423e8

                • C:\ProgramData\TacticalRMM\tacticalagent-v2.8.0-windows-amd64.exe

                  Filesize

                  4.3MB

                  MD5

                  ed40540e7432bacaa08a6cd6a9f63004

                  SHA1

                  9c12db9fd406067162e9a01b2c6a34a5c360ea97

                  SHA256

                  d6c7bdab07151678b713a02efe7ad5281b194b0d5b538061bdafdf2c4ca1fdaa

                  SHA512

                  07653d534a998248f897a2ed962d2ec83947c094aa7fe4fb85e40cb2771754289fe2cef29e31b5aa08e8165d5418fe1b8049dedc653e799089d5c13e02352e8d

                • C:\Users\Admin\AppData\Local\Temp\is-BAJ9V.tmp\tacticalagent-v2.8.0-windows-amd64.tmp

                  Filesize

                  3.0MB

                  MD5

                  a639312111d278fee4f70299c134d620

                  SHA1

                  6144ca6e18a5444cdb9b633a6efee67aff931115

                  SHA256

                  4b0be5167a31a77e28e3f0a7c83c9d289845075b51e70691236603b1083649df

                  SHA512

                  f47f01d072ff9ed42f5b36600ddfc344a6a4b967c1b671ffc0e76531e360bfd55a1a9950305ad33f7460f3f5dd8953e317b108cd434f2db02987fa018d57437c

                • C:\Windows\Temp\__PSScriptPolicyTest_5zhxpwes.xap.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                  Filesize

                  3KB

                  MD5

                  06d16fea6ab505097d16fcaa32949d47

                  SHA1

                  0c1c719831fa41cd102d0d72d61c0f46ec5b8de8

                  SHA256

                  54e15de2bef9f651d7717e2a336ac6b2ea2b723e6f29d2b153d8fbbc89aef723

                  SHA512

                  03c00f1eebb51cec11703141ae9d9c3ac589f5495bc04d8a4b043714089a9d50bd3a520e4d72b4a4c99f5b9bf5f689bf2585fa5c7d4ddbe6f71cbba0172f593a

                • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                  Filesize

                  2KB

                  MD5

                  402c95bdd29dbc6720f5f583d1d6c406

                  SHA1

                  db5f68ae87551f7b5c6bc89a0d7887967f4ae074

                  SHA256

                  604fe5bef66d95c4694ffd7249bc301291cff45a3cde180169e0a3e3405d5f4b

                  SHA512

                  47e046c79b6db82a8965c4b4de6488724e2d14440f04961db037c2d9a60182009326b89a15efec7d0423fd9bfe3659587eda20390ab6fe93b7d871132864c1ef

                • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                  Filesize

                  2KB

                  MD5

                  2c0bdf06d302688498d4e7f9cd669ab5

                  SHA1

                  18186323d93499e03f737f137b4ad795eb7f470b

                  SHA256

                  86cd6b95819282eee4bd6c900b27ebeddf453a90a9f6147978e9137479f36bd6

                  SHA512

                  f8f02ab1cb6906975695369183d00d7f25ec4c54c40aba5ac0a1f42312c5eff5a6774a8e84c3357415555405f7e9754deebe8335dd1fdcf693137ab044cc18fe

                • memory/1132-102-0x0000027E40820000-0x0000027E4083C000-memory.dmp

                  Filesize

                  112KB

                • memory/1132-108-0x0000027E40840000-0x0000027E40848000-memory.dmp

                  Filesize

                  32KB

                • memory/1132-110-0x0000027E409E0000-0x0000027E409EA000-memory.dmp

                  Filesize

                  40KB

                • memory/1132-109-0x0000027E40850000-0x0000027E40856000-memory.dmp

                  Filesize

                  24KB

                • memory/1132-103-0x0000027E408E0000-0x0000027E40995000-memory.dmp

                  Filesize

                  724KB

                • memory/1132-104-0x0000027E27A00000-0x0000027E27A0A000-memory.dmp

                  Filesize

                  40KB

                • memory/1132-105-0x0000027E409A0000-0x0000027E409BC000-memory.dmp

                  Filesize

                  112KB

                • memory/1132-106-0x0000027E27A10000-0x0000027E27A1A000-memory.dmp

                  Filesize

                  40KB

                • memory/1132-107-0x0000027E409C0000-0x0000027E409DA000-memory.dmp

                  Filesize

                  104KB

                • memory/1612-156-0x000002132F880000-0x000002132F935000-memory.dmp

                  Filesize

                  724KB

                • memory/1612-157-0x000002132F940000-0x000002132F96A000-memory.dmp

                  Filesize

                  168KB

                • memory/1612-158-0x000002132F940000-0x000002132F964000-memory.dmp

                  Filesize

                  144KB

                • memory/2532-25-0x0000000000400000-0x0000000000712000-memory.dmp

                  Filesize

                  3.1MB

                • memory/2532-12-0x0000000000400000-0x0000000000712000-memory.dmp

                  Filesize

                  3.1MB

                • memory/4132-72-0x0000023F9D4F0000-0x0000023F9D566000-memory.dmp

                  Filesize

                  472KB

                • memory/4132-65-0x0000023F84450000-0x0000023F84472000-memory.dmp

                  Filesize

                  136KB

                • memory/4132-71-0x0000023F9D420000-0x0000023F9D464000-memory.dmp

                  Filesize

                  272KB

                • memory/4752-26-0x0000000000400000-0x00000000004D7000-memory.dmp

                  Filesize

                  860KB

                • memory/4752-5-0x0000000000400000-0x00000000004D7000-memory.dmp

                  Filesize

                  860KB

                • memory/4752-8-0x0000000000401000-0x00000000004B7000-memory.dmp

                  Filesize

                  728KB