Analysis

  • max time kernel
    509s
  • max time network
    318s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02-09-2024 00:07

General

  • Target

    NetSupport School.msi

  • Size

    150.2MB

  • MD5

    32c821d567a2d7a63d638eba7a6a22cd

  • SHA1

    35a2a92dc9aab0acf09e931cd21bd52c796a0e6a

  • SHA256

    1d78526f6b8a98475210e12d2183805bbd22469b63d2e11354987c1c6782ed72

  • SHA512

    98c46dcdf257d42d6115a5a73119fe0a1b33a89c257fb9ffe78b85d949ec08243003887f65ef86bd15a01a0911599490b98033f86e57b399247343b7ac9368d5

  • SSDEEP

    3145728:/9wr2EaPT3kDVqZDYFnCkp0wbKrtE8yoP+ANeEkqic+w8:/62NDkDgE/pTb/8yoN82+w

Malware Config

Signatures

  • NetSupport

    NetSupport is a remote access tool sold as a legitimate system administration software.

  • Drops file in Drivers directory 2 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 60 IoCs
  • Executes dropped EXE 19 IoCs
  • Loads dropped DLL 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 20 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\NetSupport School.msi"
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4408
    • C:\Windows\system32\cmd.exe
      cmd.exe /c ATTRIB -R "C:\Users\Admin\AppData\Local\Temp\{F021B863-9473-4467-93B2-6FC48C30E42F}\\nsm.lic
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2328
      • C:\Windows\SysWOW64\attrib.exe
        ATTRIB -R "C:\Users\Admin\AppData\Local\Temp\{F021B863-9473-4467-93B2-6FC48C30E42F}\\nsm.lic
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2268
    • C:\Windows\system32\cmd.exe
      cmd.exe /c ATTRIB -R "C:\Users\Admin\AppData\Local\Temp\{F021B863-9473-4467-93B2-6FC48C30E42F}\\nsm.lic
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:996
      • C:\Windows\SysWOW64\attrib.exe
        ATTRIB -R "C:\Users\Admin\AppData\Local\Temp\{F021B863-9473-4467-93B2-6FC48C30E42F}\\nsm.lic
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:5032
    • C:\Users\Admin\AppData\Local\Temp\MSI1942.tmp
      "C:\Users\Admin\AppData\Local\Temp\MSI1942.tmp" /G"C:\Program Files (x86)\NetSupport\NetSupport School\" /EI
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4396
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4856
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding CB6205514FE15F93CADFD48DC4E23C0C C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:2104
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4980
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding AD777E509B0B4B21EA350B41C0DEE810
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:3852
      • C:\Windows\Installer\MSIF68F.tmp
        "C:\Windows\Installer\MSIF68F.tmp" /p "C:\Users\Admin\AppData\Local\Temp\{F021B863-9473-4467-93B2-6FC48C30E42F}\\Detect64LSP.txt"
        2⤵
        • Executes dropped EXE
        PID:4464
      • C:\Windows\Installer\MSIF6FE.tmp
        "C:\Windows\Installer\MSIF6FE.tmp" /G"C:\Program Files (x86)\NetSupport\NetSupport School\" /EU
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1932
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding CC092EF907741D4E01BEADDB72F526C5 E Global\MSI0000
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies data under HKEY_USERS
        PID:2232
      • C:\Windows\Installer\MSIFC75.tmp
        "C:\Windows\Installer\MSIFC75.tmp" /G"C:\Program Files (x86)\NetSupport\NetSupport School\" /EU
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2172
      • C:\Program Files (x86)\NetSupport\NetSupport School\checkdvd.exe
        "C:\Program Files (x86)\NetSupport\NetSupport School\checkdvd.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1696
      • C:\Windows\Installer\MSI5EE.tmp
        "C:\Windows\Installer\MSI5EE.tmp" /G"C:\Program Files (x86)\NetSupport\NetSupport School\" /EC /Q /Q /C
        2⤵
        • Drops file in Program Files directory
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies data under HKEY_USERS
        • Modifies registry class
        PID:768
      • C:\Windows\Installer\MSI7C4.tmp
        "C:\Windows\Installer\MSI7C4.tmp" /G"C:\Program Files (x86)\NetSupport\NetSupport School\" /EV"NetSupport School" /EC /Q /Q /I *
        2⤵
        • Sets service image path in registry
        • Modifies WinLogon
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies data under HKEY_USERS
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4852
        • C:\Program Files (x86)\NetSupport\NetSupport School\winst64.exe
          winst64.exe /q /q /i
          3⤵
          • Drops file in Drivers directory
          • Drops file in System32 directory
          • Executes dropped EXE
          • Loads dropped DLL
          • Modifies registry class
          PID:5008
      • C:\Windows\system32\cmd.exe
        cmd.exe /c secedit /configure /areas SECURITYPOLICY /db hisecws.sdb /cfg "C:\Users\Admin\AppData\Local\Temp\{F021B863-9473-4467-93B2-6FC48C30E42F}\NS.inf" /log "C:\Program Files (x86)\NetSupport\NetSupport School\sec.log" /overwrite /quiet
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:5028
        • C:\Windows\SysWOW64\SecEdit.exe
          secedit /configure /areas SECURITYPOLICY /db hisecws.sdb /cfg "C:\Users\Admin\AppData\Local\Temp\{F021B863-9473-4467-93B2-6FC48C30E42F}\NS.inf" /log "C:\Program Files (x86)\NetSupport\NetSupport School\sec.log" /overwrite /quiet
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4576
      • C:\Program Files (x86)\NetSupport\NetSupport School\pcicfgui_setup.exe
        "C:\Program Files (x86)\NetSupport\NetSupport School\pcicfgui_setup.exe" /Q "C:\Program Files (x86)\NetSupport\NetSupport School\Client32.ini"
        2⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1128
        • C:\Program Files (x86)\NetSupport\NetSupport School\pcicfgui_setup.exe
          "C:\Program Files (x86)\NetSupport\NetSupport School\pcicfgui_setup.exe"
          3⤵
          • Executes dropped EXE
          PID:2300
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
        PID:1572
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k netsvcs -s DsmSvc
        1⤵
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:2448
      • C:\Program Files (x86)\NetSupport\NetSupport School\client32.exe
        "C:\Program Files (x86)\NetSupport\NetSupport School\client32.exe" /* *
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies data under HKEY_USERS
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:528
        • C:\Program Files (x86)\NetSupport\NetSupport School\client32.exe
          "C:\Program Files (x86)\NetSupport\NetSupport School\client32.exe" * /VistaUI
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:1548
          • C:\Program Files (x86)\NetSupport\NetSupport School\runplugin.exe
            "C:\Program Files (x86)\NetSupport\NetSupport School\runplugin.exe" /USER=SYSTEM
            3⤵
            • Enumerates connected drives
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            PID:1628
          • C:\Program Files (x86)\NetSupport\NetSupport School\runplugin64.exe
            "C:\Program Files (x86)\NetSupport\NetSupport School\runplugin64.exe" /USER=SYSTEM
            3⤵
            • Enumerates connected drives
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            PID:4580
          • C:\Program Files (x86)\NetSupport\NetSupport School\runplugin.exe
            "C:\Program Files (x86)\NetSupport\NetSupport School\runplugin.exe"
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2960
          • C:\Program Files (x86)\NetSupport\NetSupport School\runplugin64.exe
            "C:\Program Files (x86)\NetSupport\NetSupport School\runplugin64.exe"
            3⤵
            • Executes dropped EXE
            PID:880
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /4
        1⤵
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4968

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Config.Msi\e57ee97.rbs

        Filesize

        64KB

        MD5

        7df3e704c13898cac3737462aa692e02

        SHA1

        7b59c71f775fc323ded78f5799442be05e17c59d

        SHA256

        01cbdcc2ced84e7796ec33691f40ef9aa881eaa9520b6873605dcf5f48f0df55

        SHA512

        1c663124b511642d507b6995b026aed90fa99f1cd43a9575f2bd610306c2c0f79bac8edb1622a10e73f466bce2b66004cf7fd3f455f8a63057e4d769ddd7fe39

      • C:\Program Files (x86)\NetSupport\NetSupport School\WINSTALL.EXE

        Filesize

        745KB

        MD5

        0228cb02aa58ef2876713130990c8ccf

        SHA1

        f6766273a186b6911a6127fbb5af90125e267bbe

        SHA256

        3651a2131f423c5c553476236be7ad4f26a63c67d872c3b9ecc135d1d184b1ed

        SHA512

        a07664e639252a2bd34f42fb6907b95889d31657aa81fcdeea4b171bf3410bd3d56f5e404ee8fc16938d826f7cfffc46efcfe74126afec6e87cb048618d26e89

      • C:\Program Files (x86)\NetSupport\NetSupport School\product.dat

        Filesize

        506B

        MD5

        ff7c0d2dbb9195083bbabaff482d5ed6

        SHA1

        5c2efbf855c376ce1b93e681c54a367a407495dc

        SHA256

        065d817596d710d5a06060241acc207b82b844530cc56ff842ff53d8ff92a075

        SHA512

        ea226b3a55fc59175136f104df497ebf5055624fb1c1c8073b249dfc5e1ed5818a6feee995aa82cf9ed050f1adc7a62994c90b1af03569dfe0d4551ee2bc70c9

      • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\NetSupport School\NetSupport School Student Configurator.lnk

        Filesize

        2KB

        MD5

        6c5019b09ff3561c672165ae64e38a6b

        SHA1

        309c2657c367e0b36ac6e40d8dc5909f2fcd194f

        SHA256

        cd9be22113ade589426a07ab8f49914aca3cec862416ebfd5be7d73347df66e3

        SHA512

        84240f71e55df3235d45390fe7f18dcdc413413e7d0d4881f14ffc119867ec7df9e7c447c9af58f2074bcb841d9c3fb5d139887a598cb02a1fa123852f4c293a

      • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\NetSupport School\NetSupport School Student Configurator.lnk~RFe580589.TMP

        Filesize

        2KB

        MD5

        101590b7a7c7818da8c1ec8502e4e8c6

        SHA1

        d65dc37a53248d2a1123595c1617ba23f1cc32dd

        SHA256

        c7825772848dcdbbbe3ab4f64968cabf04d141c82741558056a7b4115c935677

        SHA512

        30eca5231fffd186bcba971435a4bdcde107812ab533ca48e25975c54f0b9567893f7303222699f350fd67e6800002b3f0f0fd9dc97b538d090ba1a4901c0166

      • C:\Users\Admin\AppData\Local\Temp\DLL_{F021B863-9473-4467-93B2-6FC48C30E42F}.ini

        Filesize

        4KB

        MD5

        8d836df93f1f1b4fad9b2bc4d62f3e7f

        SHA1

        5142f9a7caf42e9230eee3e8f8838c1551be50bd

        SHA256

        480ee6b54b7138b7cbac04740fe92b51360136da56573073c8bd0c5e55be0c7b

        SHA512

        14baf13292773ff60390fa310bbe9fb506b27f3a9693d661732e1d78f5671c5753a52804d7bae1c62d57bbfb10b3c1b3e1cdf5e6a92b53cbd44a406b795e5e54

      • C:\Users\Admin\AppData\Local\Temp\MSI90E6.tmp

        Filesize

        169KB

        MD5

        0e6fda2b8425c9513c774cf29a1bc72d

        SHA1

        a79ffa24cb5956398ded44da24793a2067b85dd0

        SHA256

        e946b2fae0b36c43064463a8c16a2774adac30c4188c5af90e9338b903c501c9

        SHA512

        285bb7759a1214abed36162ac8be2d48df17a05278c4de97562448e20fd43b635563a6819f37e23d92a5f5ed0205a68bffe43dac0d3a67513bd0303b4e7f89aa

      • C:\Users\Admin\AppData\Local\Temp\MSI9183.tmp

        Filesize

        511KB

        MD5

        d524b639a3a088155981b9b4efa55631

        SHA1

        39d8eea673c02c1522b110829b93d61310555b98

        SHA256

        03d91c8cd20b846625a092a3dae6a12369930c65d6216a455a00449ebb0dc289

        SHA512

        84f8ab54122f93a40da08fd83bca767ab49eb0f73c4ab274d9bda11dd09224134df011fa02e5a3abbafcc6fbef6a60673dd48feabdf829a1e22c85a2a759b7ac

      • C:\Users\Admin\AppData\Local\Temp\MSI9201.tmp

        Filesize

        487KB

        MD5

        d21afcbb8d2e5a043841b4d145af1df6

        SHA1

        849db8ddad9e942bfe20a50666d17484b56a26e3

        SHA256

        c9d4fd904650e4e53de4018951906c1434420d65cdb33e48c23b6c22bc9fdd4c

        SHA512

        ecb8fbb2826f7f47eed46897701d42873b17b7599cd785ca54e900b793e3de1179c4d6441f317aa5298ae52c1c11157ae43b11822aa0076b9ec93ad5e46f0225

      • C:\Users\Admin\AppData\Local\Temp\MSI929E.tmp

        Filesize

        153KB

        MD5

        a1b7850763af9593b66ee459a081bddf

        SHA1

        6e45955fae2b2494902a1b55a3873e542f0f5ce4

        SHA256

        41b8e92deba5206c78817236ed7f44df95636ca748d95fab05f032f5aec186af

        SHA512

        a87a302a9a0d19d7ce293b42f5e7bc09664b21307a5321f226157fcc57eb2df2b59c6651878cb23969a182c82b55e8671ff00f8462194b81a907974a49cb25b1

      • C:\Users\Admin\AppData\Local\Temp\{F021B863-9473-4467-93B2-6FC48C30E42F}\Client32.ini

        Filesize

        77B

        MD5

        3d6de28fc7ae0ea0c8f754fff6246be8

        SHA1

        2f519518166499a06dfd61c327dd56e681390d2a

        SHA256

        aacd16e069a0d6c2371767eeea668b5b32b54a16c1d887e16142c845596e033b

        SHA512

        e3c7c0bf0511e22acf7a0fe3465b33ab774eaac69ce91456cedf3d44f476b7c26c381e888c6d1e481ebecf7a04921bcaa3d059ff7b113ec9841b4460c74ad40d

      • C:\Users\Admin\AppData\Local\Temp\{F021B863-9473-4467-93B2-6FC48C30E42F}\Client32.upd

        Filesize

        10B

        MD5

        c7dea5b4aa8726d6e1856b151a3d5e61

        SHA1

        0e7d482333027b5381e94c945969bfb20aa8bcfc

        SHA256

        444b6e841966e6306050fd2b2211e00dd877c4aa2b8971a3010d3e53d95ea7ee

        SHA512

        dd3732dfdb5a56bd70aba7c298001280d76829928d8e1a9add03cfc55e26f24fb317d01b915578ac54ba920fe0e736d4ca04f82eb98e67e0bf773973dc20313d

      • C:\Users\Admin\AppData\Local\Temp\{F021B863-9473-4467-93B2-6FC48C30E42F}\NSM.LIC

        Filesize

        190B

        MD5

        41b74ffe52b6d2aef850e4b064876ce0

        SHA1

        549b93bb84df9796e7c9fa5a0925f82a5201e42f

        SHA256

        73a125a95016a791167410b505b1835cd15fe74a2ba0d2400f6bef2805a3383a

        SHA512

        35767cee6680bd78ea8184cb92daa0c28955bdf03ccf6115abb71aca7c21ac4fdf233ccd2250341e5213c1c8c6d5968a912397c450268a1fb863373df9efd0d9

      • C:\Users\Admin\AppData\Local\Temp\{F021B863-9473-4467-93B2-6FC48C30E42F}\NSM.LIC

        Filesize

        207B

        MD5

        75a96105a1c0f6c4536e16debf9edf40

        SHA1

        09a0501cb70fbbc9f086aa0eb8242a9ee0d6f9cc

        SHA256

        7a1bf991023566ba5f926a809b3307fd98f26d327ec416ef23a2988e1f7503a3

        SHA512

        d679bf58797002b299d99b58518edf33d8d615c3054315c7d9809959a0b12abf979e1685081cd95852ae12dc9437ac9ec8f318b4ee82338061c3f273afaaeb39

      • C:\Windows\Installer\MSI5BE.tmp

        Filesize

        244KB

        MD5

        c4ca339bc85aae8999e4b101556239dd

        SHA1

        d090fc385e0002e35db276960a360c67c4fc85cd

        SHA256

        4ab23609cdc64d10b97c9ccb285ed7100f55d54d983cd50762da25ecac4357f9

        SHA512

        9185ec32545fc838d7fef6c9e4dd222dd02114c661b0b344f16287d55e6571bfe7a4233a852acc579d07bcdbab18c5c034c465b1f4bb78535ed51c3499087fe0

      • memory/1128-507-0x0000000002F20000-0x00000000030AE000-memory.dmp

        Filesize

        1.6MB

      • memory/1548-528-0x0000000005230000-0x0000000005346000-memory.dmp

        Filesize

        1.1MB

      • memory/4968-557-0x00007FF8A61D0000-0x00007FF8A6271000-memory.dmp

        Filesize

        644KB

      • memory/4968-551-0x00007FF8A49F0000-0x00007FF8A50E2000-memory.dmp

        Filesize

        6.9MB

      • memory/4968-546-0x00007FF8A47E0000-0x00007FF8A482C000-memory.dmp

        Filesize

        304KB

      • memory/4968-536-0x00007FF75AED0000-0x00007FF75AFFC000-memory.dmp

        Filesize

        1.2MB

      • memory/4968-559-0x0000000011320000-0x0000000011372000-memory.dmp

        Filesize

        328KB

      • memory/4968-558-0x00007FF8A61D0000-0x00007FF8A6271000-memory.dmp

        Filesize

        644KB

      • memory/4968-548-0x00007FF8A6660000-0x00007FF8A7A97000-memory.dmp

        Filesize

        20.2MB

      • memory/4968-556-0x00007FF8A61D0000-0x00007FF8A6271000-memory.dmp

        Filesize

        644KB

      • memory/4968-555-0x00007FF8A61D0000-0x00007FF8A6271000-memory.dmp

        Filesize

        644KB

      • memory/4968-554-0x00007FF8A61D0000-0x00007FF8A6271000-memory.dmp

        Filesize

        644KB

      • memory/4968-553-0x00007FF8A61D0000-0x00007FF8A6271000-memory.dmp

        Filesize

        644KB

      • memory/4968-538-0x00007FF8A5FD0000-0x00007FF8A607E000-memory.dmp

        Filesize

        696KB

      • memory/4968-552-0x00007FF8A61D0000-0x00007FF8A6271000-memory.dmp

        Filesize

        644KB

      • memory/4968-550-0x00007FF8A49F0000-0x00007FF8A50E2000-memory.dmp

        Filesize

        6.9MB

      • memory/4968-549-0x00007FF8A6280000-0x00007FF8A632A000-memory.dmp

        Filesize

        680KB

      • memory/4968-545-0x00007FF8A5460000-0x00007FF8A54A9000-memory.dmp

        Filesize

        292KB

      • memory/4968-544-0x00007FF8A53F0000-0x00007FF8A545A000-memory.dmp

        Filesize

        424KB

      • memory/4968-543-0x00007FF8A6080000-0x00007FF8A61A5000-memory.dmp

        Filesize

        1.1MB

      • memory/4968-542-0x00007FF8A50F0000-0x00007FF8A5279000-memory.dmp

        Filesize

        1.5MB

      • memory/4968-540-0x00007FF8A5680000-0x00007FF8A58C9000-memory.dmp

        Filesize

        2.3MB

      • memory/4968-539-0x00007FF8A5680000-0x00007FF8A58C9000-memory.dmp

        Filesize

        2.3MB

      • memory/4968-537-0x00007FF8A5FD0000-0x00007FF8A607E000-memory.dmp

        Filesize

        696KB

      • memory/4968-541-0x00007FF8A5680000-0x00007FF8A58C9000-memory.dmp

        Filesize

        2.3MB

      • memory/4968-547-0x00007FF8A6660000-0x00007FF8A7A97000-memory.dmp

        Filesize

        20.2MB