Analysis

  • max time kernel
    272s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    13/11/2023, 08:19

General

  • Target

    98bfe3e1ebf2ad1b7502ca6ba363d95947e318f66863a59876a03936a5e7cb29.exe

  • Size

    323KB

  • MD5

    48025ebdf733912d9598ce33a86f47ff

  • SHA1

    46bbae78f7243b83906f79ae881df1575d44efc2

  • SHA256

    98bfe3e1ebf2ad1b7502ca6ba363d95947e318f66863a59876a03936a5e7cb29

  • SHA512

    38662637a37321ef907e70ba2be224620e32c7bb9253e64dcf27067afdfdc280e32a24eebfd1170c5b41a7fc75c50b5970ec01dc2dbda8607394664cb07a42f1

  • SSDEEP

    6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 14 IoCs
  • Loads dropped DLL 7 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98bfe3e1ebf2ad1b7502ca6ba363d95947e318f66863a59876a03936a5e7cb29.exe
    "C:\Users\Admin\AppData\Local\Temp\98bfe3e1ebf2ad1b7502ca6ba363d95947e318f66863a59876a03936a5e7cb29.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Users\Admin\AppData\Local\Temp\98bfe3e1ebf2ad1b7502ca6ba363d95947e318f66863a59876a03936a5e7cb29.exe
      C:\Users\Admin\AppData\Local\Temp\98bfe3e1ebf2ad1b7502ca6ba363d95947e318f66863a59876a03936a5e7cb29.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1732
      • C:\Windows\SysWOW64\schtasks.exe
        /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
        3⤵
        • Creates scheduled task(s)
        PID:2776
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {E7CF3AE6-BF1D-4EFA-8B21-D8EBB78E54D0} S-1-5-21-2084844033-2744876406-2053742436-1000:GGPVHMXR\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2600
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2684
        • C:\Windows\SysWOW64\schtasks.exe
          /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
          4⤵
          • Creates scheduled task(s)
          PID:2692
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:436
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        3⤵
        • Executes dropped EXE
        PID:2888
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        3⤵
        • Executes dropped EXE
        PID:2860
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        3⤵
        • Executes dropped EXE
        PID:2252
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        3⤵
        • Executes dropped EXE
        PID:1180
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2008
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2008 -s 116
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2484
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      PID:1944
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        3⤵
        • Executes dropped EXE
        PID:1464
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      PID:2324
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        3⤵
        • Executes dropped EXE
        PID:1988
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      PID:2460
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        3⤵
        • Executes dropped EXE
        PID:1328

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          323KB

          MD5

          48025ebdf733912d9598ce33a86f47ff

          SHA1

          46bbae78f7243b83906f79ae881df1575d44efc2

          SHA256

          98bfe3e1ebf2ad1b7502ca6ba363d95947e318f66863a59876a03936a5e7cb29

          SHA512

          38662637a37321ef907e70ba2be224620e32c7bb9253e64dcf27067afdfdc280e32a24eebfd1170c5b41a7fc75c50b5970ec01dc2dbda8607394664cb07a42f1

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          323KB

          MD5

          48025ebdf733912d9598ce33a86f47ff

          SHA1

          46bbae78f7243b83906f79ae881df1575d44efc2

          SHA256

          98bfe3e1ebf2ad1b7502ca6ba363d95947e318f66863a59876a03936a5e7cb29

          SHA512

          38662637a37321ef907e70ba2be224620e32c7bb9253e64dcf27067afdfdc280e32a24eebfd1170c5b41a7fc75c50b5970ec01dc2dbda8607394664cb07a42f1

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          323KB

          MD5

          48025ebdf733912d9598ce33a86f47ff

          SHA1

          46bbae78f7243b83906f79ae881df1575d44efc2

          SHA256

          98bfe3e1ebf2ad1b7502ca6ba363d95947e318f66863a59876a03936a5e7cb29

          SHA512

          38662637a37321ef907e70ba2be224620e32c7bb9253e64dcf27067afdfdc280e32a24eebfd1170c5b41a7fc75c50b5970ec01dc2dbda8607394664cb07a42f1

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          323KB

          MD5

          48025ebdf733912d9598ce33a86f47ff

          SHA1

          46bbae78f7243b83906f79ae881df1575d44efc2

          SHA256

          98bfe3e1ebf2ad1b7502ca6ba363d95947e318f66863a59876a03936a5e7cb29

          SHA512

          38662637a37321ef907e70ba2be224620e32c7bb9253e64dcf27067afdfdc280e32a24eebfd1170c5b41a7fc75c50b5970ec01dc2dbda8607394664cb07a42f1

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          323KB

          MD5

          48025ebdf733912d9598ce33a86f47ff

          SHA1

          46bbae78f7243b83906f79ae881df1575d44efc2

          SHA256

          98bfe3e1ebf2ad1b7502ca6ba363d95947e318f66863a59876a03936a5e7cb29

          SHA512

          38662637a37321ef907e70ba2be224620e32c7bb9253e64dcf27067afdfdc280e32a24eebfd1170c5b41a7fc75c50b5970ec01dc2dbda8607394664cb07a42f1

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          323KB

          MD5

          48025ebdf733912d9598ce33a86f47ff

          SHA1

          46bbae78f7243b83906f79ae881df1575d44efc2

          SHA256

          98bfe3e1ebf2ad1b7502ca6ba363d95947e318f66863a59876a03936a5e7cb29

          SHA512

          38662637a37321ef907e70ba2be224620e32c7bb9253e64dcf27067afdfdc280e32a24eebfd1170c5b41a7fc75c50b5970ec01dc2dbda8607394664cb07a42f1

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          323KB

          MD5

          48025ebdf733912d9598ce33a86f47ff

          SHA1

          46bbae78f7243b83906f79ae881df1575d44efc2

          SHA256

          98bfe3e1ebf2ad1b7502ca6ba363d95947e318f66863a59876a03936a5e7cb29

          SHA512

          38662637a37321ef907e70ba2be224620e32c7bb9253e64dcf27067afdfdc280e32a24eebfd1170c5b41a7fc75c50b5970ec01dc2dbda8607394664cb07a42f1

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          323KB

          MD5

          48025ebdf733912d9598ce33a86f47ff

          SHA1

          46bbae78f7243b83906f79ae881df1575d44efc2

          SHA256

          98bfe3e1ebf2ad1b7502ca6ba363d95947e318f66863a59876a03936a5e7cb29

          SHA512

          38662637a37321ef907e70ba2be224620e32c7bb9253e64dcf27067afdfdc280e32a24eebfd1170c5b41a7fc75c50b5970ec01dc2dbda8607394664cb07a42f1

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          323KB

          MD5

          48025ebdf733912d9598ce33a86f47ff

          SHA1

          46bbae78f7243b83906f79ae881df1575d44efc2

          SHA256

          98bfe3e1ebf2ad1b7502ca6ba363d95947e318f66863a59876a03936a5e7cb29

          SHA512

          38662637a37321ef907e70ba2be224620e32c7bb9253e64dcf27067afdfdc280e32a24eebfd1170c5b41a7fc75c50b5970ec01dc2dbda8607394664cb07a42f1

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          323KB

          MD5

          48025ebdf733912d9598ce33a86f47ff

          SHA1

          46bbae78f7243b83906f79ae881df1575d44efc2

          SHA256

          98bfe3e1ebf2ad1b7502ca6ba363d95947e318f66863a59876a03936a5e7cb29

          SHA512

          38662637a37321ef907e70ba2be224620e32c7bb9253e64dcf27067afdfdc280e32a24eebfd1170c5b41a7fc75c50b5970ec01dc2dbda8607394664cb07a42f1

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          323KB

          MD5

          48025ebdf733912d9598ce33a86f47ff

          SHA1

          46bbae78f7243b83906f79ae881df1575d44efc2

          SHA256

          98bfe3e1ebf2ad1b7502ca6ba363d95947e318f66863a59876a03936a5e7cb29

          SHA512

          38662637a37321ef907e70ba2be224620e32c7bb9253e64dcf27067afdfdc280e32a24eebfd1170c5b41a7fc75c50b5970ec01dc2dbda8607394664cb07a42f1

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          323KB

          MD5

          48025ebdf733912d9598ce33a86f47ff

          SHA1

          46bbae78f7243b83906f79ae881df1575d44efc2

          SHA256

          98bfe3e1ebf2ad1b7502ca6ba363d95947e318f66863a59876a03936a5e7cb29

          SHA512

          38662637a37321ef907e70ba2be224620e32c7bb9253e64dcf27067afdfdc280e32a24eebfd1170c5b41a7fc75c50b5970ec01dc2dbda8607394664cb07a42f1

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          323KB

          MD5

          48025ebdf733912d9598ce33a86f47ff

          SHA1

          46bbae78f7243b83906f79ae881df1575d44efc2

          SHA256

          98bfe3e1ebf2ad1b7502ca6ba363d95947e318f66863a59876a03936a5e7cb29

          SHA512

          38662637a37321ef907e70ba2be224620e32c7bb9253e64dcf27067afdfdc280e32a24eebfd1170c5b41a7fc75c50b5970ec01dc2dbda8607394664cb07a42f1

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          323KB

          MD5

          48025ebdf733912d9598ce33a86f47ff

          SHA1

          46bbae78f7243b83906f79ae881df1575d44efc2

          SHA256

          98bfe3e1ebf2ad1b7502ca6ba363d95947e318f66863a59876a03936a5e7cb29

          SHA512

          38662637a37321ef907e70ba2be224620e32c7bb9253e64dcf27067afdfdc280e32a24eebfd1170c5b41a7fc75c50b5970ec01dc2dbda8607394664cb07a42f1

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          323KB

          MD5

          48025ebdf733912d9598ce33a86f47ff

          SHA1

          46bbae78f7243b83906f79ae881df1575d44efc2

          SHA256

          98bfe3e1ebf2ad1b7502ca6ba363d95947e318f66863a59876a03936a5e7cb29

          SHA512

          38662637a37321ef907e70ba2be224620e32c7bb9253e64dcf27067afdfdc280e32a24eebfd1170c5b41a7fc75c50b5970ec01dc2dbda8607394664cb07a42f1

        • \Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          323KB

          MD5

          48025ebdf733912d9598ce33a86f47ff

          SHA1

          46bbae78f7243b83906f79ae881df1575d44efc2

          SHA256

          98bfe3e1ebf2ad1b7502ca6ba363d95947e318f66863a59876a03936a5e7cb29

          SHA512

          38662637a37321ef907e70ba2be224620e32c7bb9253e64dcf27067afdfdc280e32a24eebfd1170c5b41a7fc75c50b5970ec01dc2dbda8607394664cb07a42f1

        • \Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          323KB

          MD5

          48025ebdf733912d9598ce33a86f47ff

          SHA1

          46bbae78f7243b83906f79ae881df1575d44efc2

          SHA256

          98bfe3e1ebf2ad1b7502ca6ba363d95947e318f66863a59876a03936a5e7cb29

          SHA512

          38662637a37321ef907e70ba2be224620e32c7bb9253e64dcf27067afdfdc280e32a24eebfd1170c5b41a7fc75c50b5970ec01dc2dbda8607394664cb07a42f1

        • \Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          323KB

          MD5

          48025ebdf733912d9598ce33a86f47ff

          SHA1

          46bbae78f7243b83906f79ae881df1575d44efc2

          SHA256

          98bfe3e1ebf2ad1b7502ca6ba363d95947e318f66863a59876a03936a5e7cb29

          SHA512

          38662637a37321ef907e70ba2be224620e32c7bb9253e64dcf27067afdfdc280e32a24eebfd1170c5b41a7fc75c50b5970ec01dc2dbda8607394664cb07a42f1

        • \Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          323KB

          MD5

          48025ebdf733912d9598ce33a86f47ff

          SHA1

          46bbae78f7243b83906f79ae881df1575d44efc2

          SHA256

          98bfe3e1ebf2ad1b7502ca6ba363d95947e318f66863a59876a03936a5e7cb29

          SHA512

          38662637a37321ef907e70ba2be224620e32c7bb9253e64dcf27067afdfdc280e32a24eebfd1170c5b41a7fc75c50b5970ec01dc2dbda8607394664cb07a42f1

        • \Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          323KB

          MD5

          48025ebdf733912d9598ce33a86f47ff

          SHA1

          46bbae78f7243b83906f79ae881df1575d44efc2

          SHA256

          98bfe3e1ebf2ad1b7502ca6ba363d95947e318f66863a59876a03936a5e7cb29

          SHA512

          38662637a37321ef907e70ba2be224620e32c7bb9253e64dcf27067afdfdc280e32a24eebfd1170c5b41a7fc75c50b5970ec01dc2dbda8607394664cb07a42f1

        • \Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          323KB

          MD5

          48025ebdf733912d9598ce33a86f47ff

          SHA1

          46bbae78f7243b83906f79ae881df1575d44efc2

          SHA256

          98bfe3e1ebf2ad1b7502ca6ba363d95947e318f66863a59876a03936a5e7cb29

          SHA512

          38662637a37321ef907e70ba2be224620e32c7bb9253e64dcf27067afdfdc280e32a24eebfd1170c5b41a7fc75c50b5970ec01dc2dbda8607394664cb07a42f1

        • \Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          323KB

          MD5

          48025ebdf733912d9598ce33a86f47ff

          SHA1

          46bbae78f7243b83906f79ae881df1575d44efc2

          SHA256

          98bfe3e1ebf2ad1b7502ca6ba363d95947e318f66863a59876a03936a5e7cb29

          SHA512

          38662637a37321ef907e70ba2be224620e32c7bb9253e64dcf27067afdfdc280e32a24eebfd1170c5b41a7fc75c50b5970ec01dc2dbda8607394664cb07a42f1

        • memory/436-34-0x0000000000210000-0x0000000000266000-memory.dmp

          Filesize

          344KB

        • memory/436-35-0x0000000074150000-0x000000007483E000-memory.dmp

          Filesize

          6.9MB

        • memory/436-36-0x0000000004A50000-0x0000000004A90000-memory.dmp

          Filesize

          256KB

        • memory/436-52-0x0000000074150000-0x000000007483E000-memory.dmp

          Filesize

          6.9MB

        • memory/1328-97-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/1464-68-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/1704-0-0x0000000000FF0000-0x0000000001046000-memory.dmp

          Filesize

          344KB

        • memory/1704-2-0x0000000004890000-0x000000000495C000-memory.dmp

          Filesize

          816KB

        • memory/1704-3-0x0000000000210000-0x0000000000216000-memory.dmp

          Filesize

          24KB

        • memory/1704-4-0x00000000049A0000-0x00000000049E0000-memory.dmp

          Filesize

          256KB

        • memory/1704-16-0x0000000074160000-0x000000007484E000-memory.dmp

          Filesize

          6.9MB

        • memory/1704-1-0x0000000074160000-0x000000007484E000-memory.dmp

          Filesize

          6.9MB

        • memory/1732-8-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/1732-9-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/1732-7-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/1732-5-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/1732-11-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/1732-15-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/1732-6-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/1732-13-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/1944-61-0x0000000000210000-0x0000000000266000-memory.dmp

          Filesize

          344KB

        • memory/1944-62-0x0000000072E60000-0x000000007354E000-memory.dmp

          Filesize

          6.9MB

        • memory/1944-63-0x00000000048D0000-0x0000000004910000-memory.dmp

          Filesize

          256KB

        • memory/1944-74-0x0000000072E60000-0x000000007354E000-memory.dmp

          Filesize

          6.9MB

        • memory/2324-78-0x0000000004950000-0x0000000004990000-memory.dmp

          Filesize

          256KB

        • memory/2324-76-0x0000000000210000-0x0000000000266000-memory.dmp

          Filesize

          344KB

        • memory/2324-77-0x0000000072770000-0x0000000072E5E000-memory.dmp

          Filesize

          6.9MB

        • memory/2324-89-0x0000000072770000-0x0000000072E5E000-memory.dmp

          Filesize

          6.9MB

        • memory/2460-91-0x0000000072E60000-0x000000007354E000-memory.dmp

          Filesize

          6.9MB

        • memory/2460-92-0x0000000004BD0000-0x0000000004C10000-memory.dmp

          Filesize

          256KB

        • memory/2460-103-0x0000000072E60000-0x000000007354E000-memory.dmp

          Filesize

          6.9MB

        • memory/2600-20-0x00000000741A0000-0x000000007488E000-memory.dmp

          Filesize

          6.9MB

        • memory/2600-19-0x0000000000210000-0x0000000000266000-memory.dmp

          Filesize

          344KB

        • memory/2600-21-0x00000000048D0000-0x0000000004910000-memory.dmp

          Filesize

          256KB

        • memory/2600-32-0x00000000741A0000-0x000000007488E000-memory.dmp

          Filesize

          6.9MB

        • memory/2684-26-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB