Analysis

  • max time kernel
    1493s
  • max time network
    1503s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240319-en
  • resource tags

    arch:x64arch:x86image:win11-20240319-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    11/04/2024, 11:24

General

  • Target

    assist.msi

  • Size

    2.8MB

  • MD5

    0c61143cdd787c28fa456b33834d1513

  • SHA1

    56a157b6081b5f21b9b7f637c2de98558062485c

  • SHA256

    ab17098a430aacf82f5c33d5cb6156f23525623815eb63fbc0e969cb38b59fea

  • SHA512

    02f2fce34bdd9db6c51b2b4466c95270c6d94d80e76153fcd7bb6233653e86f9f9b16abb29c86b7b5ce69daeaf99e75abf04025bd7bc4ed95caa5e1f0d978b74

  • SSDEEP

    49152:FGN8erCckNGjQq7DODBzl01h6K4dYdJSN52GcPmfLKyrOxRnEOJk1g:0qe9kNDqnS2wdYdsSG1f2yrOnTJk

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 15 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 17 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 20 IoCs
  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 9 IoCs
  • Modifies registry class 37 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 17 IoCs
  • Suspicious use of SendNotifyMessage 15 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\assist.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1840
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Registers COM server for autorun
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 8F5FD35F527C4740277F6AE80BB52178 C
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:4456
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSI8964.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240618281 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
        3⤵
        • Loads dropped DLL
        PID:788
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4232
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding C1713AF4CE1EC87304AACC3614FA869A
        2⤵
        • Loads dropped DLL
        PID:2888
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding C6ACDEB5F7CDF74D01026146E315FA89 E Global\MSI0000
        2⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        PID:1368
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:1264
    • C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\ScreenConnect.ClientService.exe
      "C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=aloha-assist.com&p=443&s=246490b7-13ac-4d7e-8249-aa9aa516f2a5&k=BgIAAACkAABSU0ExAAgAAAEAAQBRXVM%2f0zYukVOauF8gEYOCB0rCvmoWG%2bh46z7gQzdgnkGPtzjrebucQeKkm8qsbi5X0y0VsCHHG1XEDoURZH95JQnNkl%2f3tx3ViglzRdDhOa%2b5Nfob4XRPDBxwODOgX4IJZZJO3AnA9MX3RLhFapfmPCQjDYCbUowQ9cTiAObWHp4Se5EEf%2fbuvrXFiEwGau1ceiB0nuVtY9s%2fbxbyQSqiQywHYIBKc0MEgkS7EZelWCymok5wktn1Sf2vX9lSb7Lyyz7OV%2bQnrz%2fkwJjI84r5xQ0j1TRd8AYaN%2bL6KVUI0SZiP4mh5T2%2b08pFoKrPy02ScVcoQtd9Ht9fOnigbfav&c=admin1&c=&c=&c=&c=&c=&c=&c="
      1⤵
      • Sets service image path in registry
      • Drops file in System32 directory
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3636
      • C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\ScreenConnect.WindowsClient.exe
        "C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\ScreenConnect.WindowsClient.exe" "RunRole" "2662d516-2928-4e4d-bbf4-bddd1c74090a" "User"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4708

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e57c862.rbs

      Filesize

      213KB

      MD5

      56abfe7df8f689139a2b1f5dcc0c96a2

      SHA1

      d389ce01b5a33c73da0bc3fa48b25fa4ebc93e0e

      SHA256

      3249a7ea0aaeb7a1e52fd61a122db7917f625bd77e085dd9f9a44c531764aefc

      SHA512

      36780dd0a1c0f9fdf5221d7e059811daf3c883691f3dd900ae887a9bb56927394f357b7b41f772f1c8b8516dee932f8ba2956d773115bec02b34e52df5bbf27e

    • C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\Client.en-US.resources

      Filesize

      47KB

      MD5

      e5d912067630d3efe53f290b9c9d0d27

      SHA1

      b0fc2105716c6eab770f89b9ed88ce2a36bdb5b2

      SHA256

      a023527e773b886fb64c5f31de484f659c5816cf4ab696be7c98a3ea4de57d41

      SHA512

      13fcb0f3f0208c072c86f1df8efe73cfade2803bc4b04e666787a95e10f49289fe6c1b8e10e7dbb5071cae92345fa12139fc220dc23dee4b098cc77fc53a316b

    • C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\Client.resources

      Filesize

      26KB

      MD5

      5cd580b22da0c33ec6730b10a6c74932

      SHA1

      0b6bded7936178d80841b289769c6ff0c8eead2d

      SHA256

      de185ee5d433e6cfbb2e5fcc903dbd60cc833a3ca5299f2862b253a41e7aa08c

      SHA512

      c2494533b26128fbf8149f7d20257d78d258abffb30e4e595cb9c6a742f00f1bf31b1ee202d4184661b98793b9909038cf03c04b563ce4eca1e2ee2dec3bf787

    • C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\ScreenConnect.Client.dll

      Filesize

      177KB

      MD5

      32d230704c43f4bf811ce214fa23700b

      SHA1

      87c48d902f206c196ed6b69747f2ff1ec401a969

      SHA256

      3b0cd76c1d949d6d6e4073c73e637c531bac18827f9ec02a6be6c5e6bbcfe368

      SHA512

      cda6fbd99180f590658b47a418e28c6456dc298f14a7c1aa229a6fd97355dc6caa9278659d2d885cee1000298f54556f16ef359990d9f3b31fd01293adb8efa1

    • C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\ScreenConnect.ClientService.dll

      Filesize

      58KB

      MD5

      b1346a9380086791abef5aa98903c80e

      SHA1

      ce77b0812363223bb04bfee60d383987ca405225

      SHA256

      43bbdb1c62d021a137e51cfb23241d3765089f98042e2a12a0b1449647290135

      SHA512

      a28b593bdaeb8e742d0c009cf2b7c60c8f25bccc7d824ed18e37be9b797946c3539f9fc12f0c74e6ccf28114936d77b2dd0fee6b08697c72741c4d6149f24b1d

    • C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\ScreenConnect.ClientService.exe

      Filesize

      93KB

      MD5

      256081d2d140ed2727c1957317627136

      SHA1

      6c0b6758aef7980868e56a0739c877d4fa837ed9

      SHA256

      72b206d8c2ea0378f096c5e7c13022f67a0a0f670a10c1534b6f7a1ba95e8be6

      SHA512

      40d15bfab3fcac4c1a5f9ebf4618982f600a00659e48a8bc1e7d5223852a2b6c1f047e17d93dd5545c9d8af11f943f243392f7db44ba993345e15e106a7246f0

    • C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\ScreenConnect.Windows.dll

      Filesize

      1.6MB

      MD5

      254d64388c6c52228d7a921960a03f6b

      SHA1

      b023b69348bb06c4b4ad67bee0f55bb9cfb3748c

      SHA256

      05e78416a344f74095e36ff14baa719867e9e163e1ae9a96c29df8615748b0ae

      SHA512

      2c52f6627fd1592f7e38b82f3a2d199fbed7b27268d9251b855fe2310d757d7b98db5a0e56956612794d6fce8035d30a6b9cecbd1262c570f0c01430e6e11459

    • C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\ScreenConnect.WindowsClient.exe

      Filesize

      561KB

      MD5

      254a33ec9d5391577b95d2cea3cf06d8

      SHA1

      a23587d95e94d7d5222b675867b3d525c2b4db5f

      SHA256

      6bd3ab0299b3826e476461caf1244e672d9f12858243921beb3939134618b790

      SHA512

      e9a7550678d11b86032869a888bef1fe75d89eb895ae561937a26a6b364fa78f5903c53ad0ee74bdb2e235baa5570b16cfa97133e060ceb3033d469f62712bb6

    • C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\ScreenConnect.WindowsClient.exe.config

      Filesize

      266B

      MD5

      728175e20ffbceb46760bb5e1112f38b

      SHA1

      2421add1f3c9c5ed9c80b339881d08ab10b340e3

      SHA256

      87c640d3184c17d3b446a72d5f13d643a774b4ecc7afbedfd4e8da7795ea8077

      SHA512

      fb9b57f4e6c04537e8fdb7cc367743c51bf2a0ad4c3c70dddab4ea0cf9ff42d5aeb9d591125e7331374f8201cebf8d0293ad934c667c1394dc63ce96933124e7

    • C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\ScreenConnect.WindowsCredentialProvider.dll

      Filesize

      746KB

      MD5

      f01a59c5cf7ec437097d414d7c6d59c4

      SHA1

      9ea1c3fbf3b5adbe5a23578dea3b511d44e6a2dd

      SHA256

      62b405f32a43da0c8e8ed14a58ec7b9b4422b154bfd4aed4f9be5de0bc6eb5e8

      SHA512

      587748ad4dd18677a3b7943eab1c0f8e77fe50a45e17266ba9a0e1363eda0ff1eabcf11884a5d608e23baf86af8f011db745ad06bcdecdfd01c20430745fe4bb

    • C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\app.config

      Filesize

      1KB

      MD5

      5fdc2cfa0c47337d707ab781e167b333

      SHA1

      b264dabe8cdb1261315154b8812fd21276ad372a

      SHA256

      8a31d61e07cdf19181c20918e66209d22b1364f73dcc5ed793373ad6d9aae177

      SHA512

      4b6c310cdfe961947010ca5cef0df61988124b754c1876ea188cca8982b50dbc7d59c0dbf2f7c4ee62415d95f36df1ba279e7630a5c34d73f1749047cc03e14a

    • C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\system.config

      Filesize

      941B

      MD5

      64918732e3bc6c92c79533c570e8d55b

      SHA1

      78b5f5f8f2d95880d42e06306fdf93b65e75eada

      SHA256

      bef498ec2a76fae9d3caf239406cd4d880f34982c5cbdd3b6d6378af4462a942

      SHA512

      7856e5ff573d251fb1356c8bc6331555555c0bebf86a83a0a93a323aedff9e6b8c4f331bcc4a6074bf5f546153ae74634eb590f80f4d89226869db99d640ca4b

    • C:\Users\Admin\AppData\Local\Temp\MSI8964.tmp

      Filesize

      1.0MB

      MD5

      8a9bfe7a382fbe927cfe4649e0a416f9

      SHA1

      8889cbcabe01478e90dfff1ccb74f89e01709304

      SHA256

      0f216a5b1b84137bfd24c55f5e39ea5539b13452bc9b933572e8017551563493

      SHA512

      b50c6429e1a5d20470e53f62666e2e07d8e8771163a82ec6e846cd62ff3c8dbf25672d605aef2941f4661ec51bfeb6ccdaebd5148438c80d9cf474c3ec71280f

    • C:\Users\Admin\AppData\Local\Temp\MSI8964.tmp-\Microsoft.Deployment.WindowsInstaller.dll

      Filesize

      172KB

      MD5

      5ef88919012e4a3d8a1e2955dc8c8d81

      SHA1

      c0cfb830b8f1d990e3836e0bcc786e7972c9ed62

      SHA256

      3e54286e348ebd3d70eaed8174cca500455c3e098cdd1fccb167bc43d93db29d

      SHA512

      4544565b7d69761f9b4532cc85e7c654e591b2264eb8da28e60a058151030b53a99d1b2833f11bfc8acc837eecc44a7d0dbd8bc7af97fc0e0f4938c43f9c2684

    • C:\Users\Admin\AppData\Local\Temp\MSI8964.tmp-\ScreenConnect.Core.dll

      Filesize

      489KB

      MD5

      6c5d0928642bf37ceed295b984e05be2

      SHA1

      46be0d5a7db56cb1ad77274709d0db053a3c0999

      SHA256

      3b0c45370ca9295881ef5e9d14402c42dfb45803f54d542e6a7e595a05f365a1

      SHA512

      bb95297e937dcf689ea9a02f487f55bebf3d6766a0aa75ffdbc932638717e79719f88787a325550d660af5856c3620cb1c6d165bbb9af87bd74af1f30e23c19b

    • C:\Users\Admin\AppData\Local\Temp\MSI8964.tmp-\ScreenConnect.InstallerActions.dll

      Filesize

      21KB

      MD5

      cbb8bdc4b5ba00ef9b1ba60396cd6250

      SHA1

      840c6b1346061425a95be9f7bdbc9a12a61b5326

      SHA256

      c135cc9a4c96c1014c45a3fb0e470a74e9c9af991da0d271039008ad3ea30a8e

      SHA512

      35ac5651e445ac5552f8b2f5ba808c350810dec05ca7214c50d03ed420fdb07485dfa6c7f9d1902a81a404b8212f755f0a03e2e0825f3baea7f0415f2c64a8be

    • C:\Windows\Installer\MSIC9D9.tmp

      Filesize

      202KB

      MD5

      ba84dd4e0c1408828ccc1de09f585eda

      SHA1

      e8e10065d479f8f591b9885ea8487bc673301298

      SHA256

      3cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852

      SHA512

      7a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290

    • C:\Windows\Installer\e57c861.msi

      Filesize

      2.8MB

      MD5

      0c61143cdd787c28fa456b33834d1513

      SHA1

      56a157b6081b5f21b9b7f637c2de98558062485c

      SHA256

      ab17098a430aacf82f5c33d5cb6156f23525623815eb63fbc0e969cb38b59fea

      SHA512

      02f2fce34bdd9db6c51b2b4466c95270c6d94d80e76153fcd7bb6233653e86f9f9b16abb29c86b7b5ce69daeaf99e75abf04025bd7bc4ed95caa5e1f0d978b74

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (12e6ae703360b1e5)\2bccoo55.newcfg

      Filesize

      566B

      MD5

      afaad3a5fe3845b66208517b483160d6

      SHA1

      d957630aed555b0be67e9396823f3966baf2bfc3

      SHA256

      ba6262bca66f1c47aa99feb669ea17e28e3664874aef34c171905857d9d6354b

      SHA512

      4dba180f18d965f4ba974af30caee1abedb40ebbc492e710d2e8f30ca346cd01bf5e2f8e1959917f25cf3b8a795a795e03a013a43114f506e71229c8f9fc5208

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (12e6ae703360b1e5)\o0dk22lm.newcfg

      Filesize

      566B

      MD5

      cdd2d687c4a134778b48f9ba3deee1cf

      SHA1

      9cc7b3309ff9f73d78c18a0e920f7ca735a96b58

      SHA256

      ffb8e4216655d509292f25d013c1f0bb17766fa8eb5ba4c048d2a9981fc33cd4

      SHA512

      d8b50e6b88ca8a59199e4421a2b163faa8c8bd1f8a612d2cf152344e44e71e0003599024b42ba549a4a729d8cc7202b236b54d1d3b41bdd2ec1d76a21733268a

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (12e6ae703360b1e5)\user.config

      Filesize

      566B

      MD5

      bf0a32394c63654130a5e376e8222942

      SHA1

      b9b4c007864d11d400b2760a83995504a42aac97

      SHA256

      1032113687c5346dbda72ad73e24d7c9cf800f374b70d6deeeae6e993e31bcc6

      SHA512

      9345425be746c368004b1fef0c7b1cc7bddf515fd7347eb4070d73cacccdf6cd32d4b3d2267271244d8077dd80c86eb8c0d2bb3b07627593aa0ed4d068989d63

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (12e6ae703360b1e5)\user.config

      Filesize

      566B

      MD5

      eb08e84aa5933f4c31a231f412e5776d

      SHA1

      b87e20151b56c40637a933a413e7c18080a5b77a

      SHA256

      66f612ccfed0d33e089846d7a344c3b33ab07b45b20964ed271e0f54d4da9eb4

      SHA512

      43d820baf5c6092521b70ec1b32c8ba8e49ed1c2835a64ce05735bf7cf564c523b07fa3fee62bb6d93eec7dc53a77e10c10b7bd23fb7f2ff1f6ec07b206b1516

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (12e6ae703360b1e5)\user.config

      Filesize

      566B

      MD5

      989bd33680444ee1d18e4d2ab314d843

      SHA1

      05e78e8e708321e519bab97ca491875f8ee9a213

      SHA256

      34bf71ff86329da3e42261a2fd39f70bd0c010f7200daa21cb8c2e080a7b5c2c

      SHA512

      7deca5e6107b364fba3a6f28bbfd61bf4a97f5919fc1fb806527a00949c87b44bc5239022c286b703bb57ae0de57bf73f33fba0bc03d2214cc052e6610ea9440

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      12.8MB

      MD5

      c121c7fe89a0ba6c0ebc42fe614c5f4e

      SHA1

      c154c0d494db79960e2de5d8194fa28e14fb5516

      SHA256

      89ae8223abc654901a2a408b76c7607cae0a42713f68f4303f9ab57f363e80f0

      SHA512

      e91b096917dcd41dac21da3e8fb04984dac7353a0beb4b1bcdc51db9b44536a74b6bab75bc4a780a38e3594dcd14de881c5a0909a86392e72ce89891c19fe190

    • \??\Volume{7a15c5d7-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{c77830e6-26ac-42a2-93ed-176a24639126}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      4a47216b71c44aa118d26fe5709822cb

      SHA1

      8e0fd3f4312c4a5b67e9f0bbbd4cae9d3673db77

      SHA256

      0b30ee87ee259113bad0c1ce3a734b6a7c4307c5bdff37dc67d55ef11e01d139

      SHA512

      cdace687e84e50a572b779ed62857abb0f121f9bee76805136c0a5212f2b62036c8045b7faa861eef6216eacde8d6ceeb75574ea602b08816af6ddf5cb8c25ce

    • memory/788-38-0x00000000742D0000-0x0000000074A81000-memory.dmp

      Filesize

      7.7MB

    • memory/788-27-0x0000000005120000-0x00000000051A0000-memory.dmp

      Filesize

      512KB

    • memory/788-23-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

      Filesize

      64KB

    • memory/788-21-0x0000000005090000-0x000000000509C000-memory.dmp

      Filesize

      48KB

    • memory/788-22-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

      Filesize

      64KB

    • memory/788-17-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

      Filesize

      64KB

    • memory/788-15-0x0000000005060000-0x000000000508E000-memory.dmp

      Filesize

      184KB

    • memory/788-16-0x00000000742D0000-0x0000000074A81000-memory.dmp

      Filesize

      7.7MB

    • memory/3636-107-0x00000000048F0000-0x0000000004940000-memory.dmp

      Filesize

      320KB

    • memory/3636-114-0x0000000004CD0000-0x0000000004D8E000-memory.dmp

      Filesize

      760KB

    • memory/3636-112-0x0000000004C30000-0x0000000004CC2000-memory.dmp

      Filesize

      584KB

    • memory/3636-111-0x0000000004940000-0x0000000004972000-memory.dmp

      Filesize

      200KB

    • memory/3636-76-0x0000000002160000-0x0000000002174000-memory.dmp

      Filesize

      80KB

    • memory/3636-77-0x00000000743D0000-0x0000000074B81000-memory.dmp

      Filesize

      7.7MB

    • memory/3636-81-0x00000000047C0000-0x00000000047D0000-memory.dmp

      Filesize

      64KB

    • memory/3636-134-0x00000000743D0000-0x0000000074B81000-memory.dmp

      Filesize

      7.7MB

    • memory/3636-80-0x00000000047C0000-0x00000000047D0000-memory.dmp

      Filesize

      64KB

    • memory/3636-82-0x00000000047C0000-0x00000000047D0000-memory.dmp

      Filesize

      64KB

    • memory/3636-137-0x00000000047C0000-0x00000000047D0000-memory.dmp

      Filesize

      64KB

    • memory/3636-136-0x00000000047C0000-0x00000000047D0000-memory.dmp

      Filesize

      64KB

    • memory/3636-135-0x00000000047C0000-0x00000000047D0000-memory.dmp

      Filesize

      64KB

    • memory/3636-90-0x0000000005140000-0x00000000056E6000-memory.dmp

      Filesize

      5.6MB

    • memory/3636-89-0x00000000049F0000-0x0000000004B90000-memory.dmp

      Filesize

      1.6MB

    • memory/4708-126-0x000000001BED0000-0x000000001BF50000-memory.dmp

      Filesize

      512KB

    • memory/4708-131-0x0000000003110000-0x0000000003124000-memory.dmp

      Filesize

      80KB

    • memory/4708-130-0x0000000003080000-0x0000000003094000-memory.dmp

      Filesize

      80KB

    • memory/4708-129-0x000000001CFD0000-0x000000001CFE0000-memory.dmp

      Filesize

      64KB

    • memory/4708-138-0x00007FFE953C0000-0x00007FFE95E82000-memory.dmp

      Filesize

      10.8MB

    • memory/4708-139-0x000000001CFD0000-0x000000001CFE0000-memory.dmp

      Filesize

      64KB

    • memory/4708-128-0x000000001D0A0000-0x000000001D228000-memory.dmp

      Filesize

      1.5MB

    • memory/4708-127-0x000000001C0F0000-0x000000001C290000-memory.dmp

      Filesize

      1.6MB

    • memory/4708-125-0x00007FFE953C0000-0x00007FFE95E82000-memory.dmp

      Filesize

      10.8MB

    • memory/4708-124-0x00000000030C0000-0x00000000030F2000-memory.dmp

      Filesize

      200KB

    • memory/4708-123-0x0000000000F20000-0x0000000000FB0000-memory.dmp

      Filesize

      576KB