Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2024, 07:03

General

  • Target

    setup.msi

  • Size

    10.2MB

  • MD5

    617299f27fdc8b8484abd9967a707cce

  • SHA1

    31118c3a74526862f727e41b30997289661ef634

  • SHA256

    caca9bf2a15da2e26fae327668e175279d57b26556a01b7b71beae4233a2849f

  • SHA512

    5a77b4fcc25f9f94bef60c32e42bfb421a909c7d6ba86e057620cddc347b4927c46329f6b116a0ad8d15508fb7c01816b5678d808b8109781fbbb457050b5cd1

  • SSDEEP

    98304:XAMvSQwxDnl2dYds9GLIeDT3OF6zbAMvSQwxDnl2dYds7AMvSQwxDnl2dYdsVAMf:LnEPDT3wonnnJntnbn

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 13 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 20 IoCs
  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 13 IoCs
  • Modifies registry class 37 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\setup.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:5104
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Registers COM server for autorun
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1396
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 399EA8B4558392A44333E98B3497ABCE C
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1988
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSI784D.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240614031 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
        3⤵
        • Loads dropped DLL
        PID:3792
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:552
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding ED20A598D70D9CA201E2F78AE2D80DA2
        2⤵
        • Loads dropped DLL
        PID:744
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 90EF95AB37A324290EB12C0AF6A99381 E Global\MSI0000
        2⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        PID:4116
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:4576
    • C:\Program Files (x86)\ScreenConnect Client (0a1cfe17eac896bf)\ScreenConnect.ClientService.exe
      "C:\Program Files (x86)\ScreenConnect Client (0a1cfe17eac896bf)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=instance-b5lwpw-relay.screenconnect.com&p=443&s=14a2dd62-5a12-4976-9f2d-572ca360ab47&k=BgIAAACkAABSU0ExAAgAAAEAAQCBEXpmMGm1D3InXFr1sRAQDkVGxS4TfvYimB7%2bHbP7MUHYpv81VqYsC9Q90NO3qQYG3HGJYy06gKx8dPxvqYRI4D06hQ%2fCHgXxWAHFaeUNVKnm7xcfXSKTFBJDBGCs%2bqzjphqOPkCp21mfzyBr1FMXznaCREVxcPD%2bLMN1p82LKW5mGif6U2Q1DqW8PsRn0h7kVD1Kd2cPCwVE5bgD7HQkEPHOCIKUfalSM%2fBYU17aXZ5NVt%2bNx4auXbg4xVuj9y60BYU1bZQli9hGhFbr%2byRh%2filGb%2bDvpECnbseW8IXPWphuLJgXAtGRC%2bME3%2fOV29Az6f6OjlZHCRWFSSAZFWKb"
      1⤵
      • Sets service image path in registry
      • Drops file in System32 directory
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3996
      • C:\Program Files (x86)\ScreenConnect Client (0a1cfe17eac896bf)\ScreenConnect.WindowsClient.exe
        "C:\Program Files (x86)\ScreenConnect Client (0a1cfe17eac896bf)\ScreenConnect.WindowsClient.exe" "RunRole" "2c16b0b9-bdb2-41e2-968f-abc6068a12cf" "User"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: AddClipboardFormatListener
        PID:3436
      • C:\Program Files (x86)\ScreenConnect Client (0a1cfe17eac896bf)\ScreenConnect.WindowsClient.exe
        "C:\Program Files (x86)\ScreenConnect Client (0a1cfe17eac896bf)\ScreenConnect.WindowsClient.exe" "RunRole" "5397a9bb-c85a-40ce-9572-2d1e1018024d" "System"
        2⤵
        • Executes dropped EXE
        • Checks processor information in registry
        • Modifies data under HKEY_USERS
        • Suspicious behavior: AddClipboardFormatListener
        PID:3572

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Config.Msi\e57ea61.rbs

            Filesize

            213KB

            MD5

            ff1b19c0be8d8f176dcdbefdab0ae2e0

            SHA1

            887f455dfccd6b03f94c03368c6a395b7fd2a79f

            SHA256

            d3f1fa2e436c711669b2e2acd8d0ff255656a1fc9b4cee1922475a83c41d7b46

            SHA512

            4438fd10663d34414f31a9e8220447b2b259e7d629347fd0e4eaa487e4f23e3e4402b0ea6f696142ac9d949ad778761a7d42ca5530b8f5228589637b4b6a51f6

          • C:\Program Files (x86)\ScreenConnect Client (0a1cfe17eac896bf)\Client.Override.en-US.resources

            Filesize

            251B

            MD5

            7857331bd82d84f45630bffc739ddfa6

            SHA1

            91f74b971b2c66efebf2495fdff3c5f7c707a7c3

            SHA256

            f8c6ffac6cb3413f082100c33adc6a644d92f43ce8412bfae72fad5a2659b5fe

            SHA512

            7b9ba5bc97c84415f3586a337fcfe3fe5f2d6e06b9992e7787da12ba6e7df2bc7189b12ab5a7aceb990a389f59db02119acbb127e5c6ecb41a93410f07df9a10

          • C:\Program Files (x86)\ScreenConnect Client (0a1cfe17eac896bf)\Client.en-US.resources

            Filesize

            47KB

            MD5

            26f4eb71380f8e033c74ed8c57d0ad9d

            SHA1

            d94252e86215a4a2e29f081cecd335d48bbd7a9c

            SHA256

            179b6d08519b3e56dce0cc0096f31e9751d74b7875e030a3b2d01c189be0108d

            SHA512

            8d36cad523e6847d055caa35535388008633187078c55625f32548016ffd2ba9f5528fe2df2c97d6c9e3e08ac432f8156d59da334acfec4142a44b4a4421a897

          • C:\Program Files (x86)\ScreenConnect Client (0a1cfe17eac896bf)\Client.resources

            Filesize

            26KB

            MD5

            5cd580b22da0c33ec6730b10a6c74932

            SHA1

            0b6bded7936178d80841b289769c6ff0c8eead2d

            SHA256

            de185ee5d433e6cfbb2e5fcc903dbd60cc833a3ca5299f2862b253a41e7aa08c

            SHA512

            c2494533b26128fbf8149f7d20257d78d258abffb30e4e595cb9c6a742f00f1bf31b1ee202d4184661b98793b9909038cf03c04b563ce4eca1e2ee2dec3bf787

          • C:\Program Files (x86)\ScreenConnect Client (0a1cfe17eac896bf)\ScreenConnect.Client.dll

            Filesize

            188KB

            MD5

            ca2857bac072baec93fbf23e5fcff956

            SHA1

            049f21dfe97f5dc247b0c7a29e22111dc4c63aad

            SHA256

            04a6ba13d7f014c6650a05c55f7fef2d465903ab900bc37a2a28f4bf08a658c0

            SHA512

            96bdfe18334b9837223da8ebb7f671abde9559f6e5150854025315bcccc09133c50939cb0e62ff16219d45b77711baa3c3c278edacda4584960e9c06e63e20f1

          • C:\Program Files (x86)\ScreenConnect Client (0a1cfe17eac896bf)\ScreenConnect.ClientService.dll

            Filesize

            59KB

            MD5

            a9d86db5d9c735d6dcc83e979ab64a7d

            SHA1

            e4f945e799d9bf5fc103f65d8ca832290b5ab03c

            SHA256

            083eb9b90e04e39514c50e296593c3652f05cf3fe3ba41cb7adeed82930e4ddf

            SHA512

            ceceeea84b266ca389562fcbbc4fa24bb4b44093289b0a67e60bf4506c2a554087fb2ee9ee607e29efb8912a26ce65c3457a14c23c4d742181b3795a3a6338b4

          • C:\Program Files (x86)\ScreenConnect Client (0a1cfe17eac896bf)\ScreenConnect.ClientService.exe

            Filesize

            93KB

            MD5

            89d3d099b6d8731bd1b7f5a68b5bf17c

            SHA1

            c6aed886840aafd08796207e2646d8805d012b81

            SHA256

            bcaa3d8dcba6ba08bf20077eadd0b31f58a1334b7b9c629e475694c4eeafd924

            SHA512

            6cb52828006ef2d41b9acc2a8a8e84b2d5f0bee0304cc8762d5945a1e21023373371893a261d089599799ebe89cbe0da5327ee80d5db07a936727ea21fb0951a

          • C:\Program Files (x86)\ScreenConnect Client (0a1cfe17eac896bf)\ScreenConnect.Windows.dll

            Filesize

            832KB

            MD5

            54eaa5f0f64a9d103ab002191f64c51f

            SHA1

            8c7567e1b96c04c3c01bc8d19ee9280ae66bc10c

            SHA256

            e5a6b40ebb298064d8772376089649f8123ba7e62a491ac72f79ce7e3155bbf2

            SHA512

            d98839abb5c9c8dfe54d407a47d2f798d3f24be63d5df838ba6bb8171f400dc1896c1bb40fd17898ef60ac1f3452e84f9ecf1b2aa8fc7b7068c91d13355ba830

          • C:\Program Files (x86)\ScreenConnect Client (0a1cfe17eac896bf)\ScreenConnect.Windows.dll

            Filesize

            704KB

            MD5

            0720436943d4b8d928bbdb9b4d58c2e1

            SHA1

            ed11724eefe621f91f1b3bcf43272a269b38cd3f

            SHA256

            b389e89c1f2aef402010f2df4323ed030c6d6ce15163ddaaa51c759a9e1d9152

            SHA512

            e8f8a5689526c6a8b13d4ffc078f1f2a043fae8318224acd2b2eeb7c16758f98830cac9dc9a8636ac009b0c98aa46dfede38b3f262198f446e0b1130a29f3e0f

          • C:\Program Files (x86)\ScreenConnect Client (0a1cfe17eac896bf)\ScreenConnect.WindowsClient.exe

            Filesize

            572KB

            MD5

            19e093bc974d1ed6399f50b7fa3be1f8

            SHA1

            11e0b01858dc2ed0d1b5854ebeb09a332a36ed93

            SHA256

            ea38cff329692f6b4c8ade15970b742a9a8bb62a44f59227c510cb2882fa436f

            SHA512

            d2e4c543ddf850b5c54d2de5dea03de77fdb4a852a377b0e35146e733cfd1cb198a8afc88cb55fed20e87ac6ae7ed8ea0198f0049a0fc400615ac32bb153cc6a

          • C:\Program Files (x86)\ScreenConnect Client (0a1cfe17eac896bf)\ScreenConnect.WindowsClient.exe.config

            Filesize

            266B

            MD5

            728175e20ffbceb46760bb5e1112f38b

            SHA1

            2421add1f3c9c5ed9c80b339881d08ab10b340e3

            SHA256

            87c640d3184c17d3b446a72d5f13d643a774b4ecc7afbedfd4e8da7795ea8077

            SHA512

            fb9b57f4e6c04537e8fdb7cc367743c51bf2a0ad4c3c70dddab4ea0cf9ff42d5aeb9d591125e7331374f8201cebf8d0293ad934c667c1394dc63ce96933124e7

          • C:\Program Files (x86)\ScreenConnect Client (0a1cfe17eac896bf)\ScreenConnect.WindowsCredentialProvider.dll

            Filesize

            746KB

            MD5

            f01a59c5cf7ec437097d414d7c6d59c4

            SHA1

            9ea1c3fbf3b5adbe5a23578dea3b511d44e6a2dd

            SHA256

            62b405f32a43da0c8e8ed14a58ec7b9b4422b154bfd4aed4f9be5de0bc6eb5e8

            SHA512

            587748ad4dd18677a3b7943eab1c0f8e77fe50a45e17266ba9a0e1363eda0ff1eabcf11884a5d608e23baf86af8f011db745ad06bcdecdfd01c20430745fe4bb

          • C:\Program Files (x86)\ScreenConnect Client (0a1cfe17eac896bf)\app.config

            Filesize

            1KB

            MD5

            fb5648fb1b03436a3bc2d7976e303958

            SHA1

            4f2d86e66085c0376f088784280f116434be478e

            SHA256

            8019b1ef68f4566f805dc9891a93f3b290f2c8a3d57cbc3263923479ad7f19d1

            SHA512

            73fbb65fd7d2c6eb93a41676ba566f610a7dd60ecd827dd7c0e7436288636ee60c92e8aad5c61ca08b04e7d51b50adb0c66c91bd3b59a96b61b1683b40bf5b1e

          • C:\Program Files (x86)\ScreenConnect Client (0a1cfe17eac896bf)\system.config

            Filesize

            966B

            MD5

            3a44259b9ca701fa74ffb8269deffbfe

            SHA1

            e83a9d139e2fc745e21d59ce5d3ad0087f9fdbb6

            SHA256

            08f903e4d90e51cd06b11d7c13f9119f5d0589894cc39c99e612baa963418e41

            SHA512

            18a96daf044c53725622e817ac382fcde24e074b1fdc8da3294c54896c863442bd3f47317a7861469249a923ed557d8b405c3404d927ef0e880cb96107c9f8b3

          • C:\Users\Admin\AppData\Local\Temp\MSI784D.tmp

            Filesize

            1015KB

            MD5

            5c1b123df7123061ca1f1cdb31ce36cb

            SHA1

            1421db694e8c2a3af066d6317282157d2c05e3b6

            SHA256

            d40ae98a7d18c2c35c0355984340b0517be47257c000931093a4fc3ccc90c226

            SHA512

            866979a543ac413dbeadce82e9ab35ffe5f4d0f69fc61ef2c4f8761030a126abfab4db053669df7e7a602e3753842a7315c17881d2a333d0abea51d8ef3041e8

          • C:\Users\Admin\AppData\Local\Temp\MSI784D.tmp-\Microsoft.Deployment.WindowsInstaller.dll

            Filesize

            172KB

            MD5

            5ef88919012e4a3d8a1e2955dc8c8d81

            SHA1

            c0cfb830b8f1d990e3836e0bcc786e7972c9ed62

            SHA256

            3e54286e348ebd3d70eaed8174cca500455c3e098cdd1fccb167bc43d93db29d

            SHA512

            4544565b7d69761f9b4532cc85e7c654e591b2264eb8da28e60a058151030b53a99d1b2833f11bfc8acc837eecc44a7d0dbd8bc7af97fc0e0f4938c43f9c2684

          • C:\Users\Admin\AppData\Local\Temp\MSI784D.tmp-\ScreenConnect.Core.dll

            Filesize

            518KB

            MD5

            469a702d0861e2c63e6e6e575c58e399

            SHA1

            06cf299c7dc7867c9584647f5ba681aec6c469d4

            SHA256

            affb342d2dce754b4ddbeeb4ed344806fda531d68346df12629b7bd8c0fa753c

            SHA512

            90fa0f0bbb3076f770354fc6f870c302c2c3a7e2ea010dc451cbd4dd0d417aa360f57ddfe003ea634efa38a7e34b63236ffe1addb4738fac16cff798c940b016

          • C:\Users\Admin\AppData\Local\Temp\MSI784D.tmp-\ScreenConnect.InstallerActions.dll

            Filesize

            21KB

            MD5

            41e8c80a7f1bf4911fce55c0de249302

            SHA1

            21d6f8ddc242a55c4894127bbef0479fea1d6847

            SHA256

            569b267d8c4cef1b26c9337f5a355f0040ad4d7e9610f28784e4af05efa3e4e9

            SHA512

            d2f375e9956d46db0fc4e0162ea894ad8598512a3de93537579ddcd8872fc8160751a4ada37bbc9f61b78414e5d241dfb2e036f2200bff4de70ac1a417aaa240

          • C:\Windows\Installer\MSIEBB9.tmp

            Filesize

            202KB

            MD5

            ba84dd4e0c1408828ccc1de09f585eda

            SHA1

            e8e10065d479f8f591b9885ea8487bc673301298

            SHA256

            3cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852

            SHA512

            7a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290

          • C:\Windows\Installer\e57ea60.msi

            Filesize

            10.2MB

            MD5

            617299f27fdc8b8484abd9967a707cce

            SHA1

            31118c3a74526862f727e41b30997289661ef634

            SHA256

            caca9bf2a15da2e26fae327668e175279d57b26556a01b7b71beae4233a2849f

            SHA512

            5a77b4fcc25f9f94bef60c32e42bfb421a909c7d6ba86e057620cddc347b4927c46329f6b116a0ad8d15508fb7c01816b5678d808b8109781fbbb457050b5cd1

          • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

            Filesize

            12.3MB

            MD5

            5971051fcd9edcd217fd391eb4b615cd

            SHA1

            1b51f283d00ee49440f36994c2f4ef10648687ea

            SHA256

            0f14c297ac6dac0cc9ad953fb950c174063f0db0695d4b8b1d818583a2dae828

            SHA512

            814f3761b1112d3693838fa9fe1b8a861eb56135e5aa22b0e4efd975917c7a492be7dae2da8584ccf91d6f3bd4fb30a317014e05748b2fc7770e1cf7d6e2cb87

          • \??\Volume{0e6c7a23-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{a966e5c5-ccaa-4b4d-bec1-9019e715365e}_OnDiskSnapshotProp

            Filesize

            6KB

            MD5

            fbc2ebd164cf569403d48a2c9eda215a

            SHA1

            631e879bf577c21ecd007d3469b44da5eaa12098

            SHA256

            1849ee11345a5996225459e3954a368df79fb583f20df4570c6bc5a5cbf262a9

            SHA512

            079b3640c8613e220ad4fa4de5998d0e4554e1074721736e808c3a98d7d3df74f481f426a2ac39213b5d0db01831402180dd15567664e36099b3e6e94cfd1625

          • memory/3436-130-0x000000001B9E0000-0x000000001BB66000-memory.dmp

            Filesize

            1.5MB

          • memory/3436-125-0x0000000000500000-0x0000000000594000-memory.dmp

            Filesize

            592KB

          • memory/3436-142-0x00007FF9A8340000-0x00007FF9A8E01000-memory.dmp

            Filesize

            10.8MB

          • memory/3436-126-0x000000001B030000-0x000000001B066000-memory.dmp

            Filesize

            216KB

          • memory/3436-127-0x000000001B460000-0x000000001B4E8000-memory.dmp

            Filesize

            544KB

          • memory/3436-128-0x000000001B6A0000-0x000000001B848000-memory.dmp

            Filesize

            1.7MB

          • memory/3436-129-0x00007FF9A8340000-0x00007FF9A8E01000-memory.dmp

            Filesize

            10.8MB

          • memory/3436-133-0x000000001B070000-0x000000001B086000-memory.dmp

            Filesize

            88KB

          • memory/3436-132-0x0000000002710000-0x0000000002726000-memory.dmp

            Filesize

            88KB

          • memory/3436-131-0x000000001B950000-0x000000001B960000-memory.dmp

            Filesize

            64KB

          • memory/3436-143-0x000000001B950000-0x000000001B960000-memory.dmp

            Filesize

            64KB

          • memory/3572-135-0x00007FF9A8340000-0x00007FF9A8E01000-memory.dmp

            Filesize

            10.8MB

          • memory/3572-136-0x00000000010E0000-0x00000000010F6000-memory.dmp

            Filesize

            88KB

          • memory/3572-147-0x0000000001350000-0x0000000001360000-memory.dmp

            Filesize

            64KB

          • memory/3572-144-0x00007FF9A8340000-0x00007FF9A8E01000-memory.dmp

            Filesize

            10.8MB

          • memory/3792-27-0x0000000004BD0000-0x0000000004C58000-memory.dmp

            Filesize

            544KB

          • memory/3792-11-0x0000000073B40000-0x00000000742F0000-memory.dmp

            Filesize

            7.7MB

          • memory/3792-12-0x0000000002720000-0x0000000002730000-memory.dmp

            Filesize

            64KB

          • memory/3792-17-0x0000000002790000-0x00000000027BE000-memory.dmp

            Filesize

            184KB

          • memory/3792-18-0x0000000002720000-0x0000000002730000-memory.dmp

            Filesize

            64KB

          • memory/3792-19-0x0000000002720000-0x0000000002730000-memory.dmp

            Filesize

            64KB

          • memory/3792-38-0x0000000073B40000-0x00000000742F0000-memory.dmp

            Filesize

            7.7MB

          • memory/3792-23-0x00000000027D0000-0x00000000027DC000-memory.dmp

            Filesize

            48KB

          • memory/3996-108-0x0000000004610000-0x0000000004660000-memory.dmp

            Filesize

            320KB

          • memory/3996-139-0x0000000073C20000-0x00000000743D0000-memory.dmp

            Filesize

            7.7MB

          • memory/3996-83-0x00000000043E0000-0x00000000043F0000-memory.dmp

            Filesize

            64KB

          • memory/3996-113-0x0000000004910000-0x00000000049A2000-memory.dmp

            Filesize

            584KB

          • memory/3996-115-0x00000000049B0000-0x0000000004A6E000-memory.dmp

            Filesize

            760KB

          • memory/3996-77-0x00000000043A0000-0x00000000043B6000-memory.dmp

            Filesize

            88KB

          • memory/3996-80-0x0000000073C20000-0x00000000743D0000-memory.dmp

            Filesize

            7.7MB

          • memory/3996-112-0x0000000004660000-0x0000000004696000-memory.dmp

            Filesize

            216KB

          • memory/3996-140-0x00000000043E0000-0x00000000043F0000-memory.dmp

            Filesize

            64KB

          • memory/3996-141-0x00000000043E0000-0x00000000043F0000-memory.dmp

            Filesize

            64KB

          • memory/3996-81-0x00000000043E0000-0x00000000043F0000-memory.dmp

            Filesize

            64KB

          • memory/3996-91-0x0000000004E20000-0x00000000053C4000-memory.dmp

            Filesize

            5.6MB

          • memory/3996-90-0x00000000046C0000-0x0000000004868000-memory.dmp

            Filesize

            1.7MB

          • memory/3996-82-0x00000000043E0000-0x00000000043F0000-memory.dmp

            Filesize

            64KB