Analysis

  • max time kernel
    294s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:38

General

  • Target

    New Order_Sept2024.vbe

  • Size

    12KB

  • MD5

    01ad59d70871354c051f21b786d587d2

  • SHA1

    19a0ea0c09319345cb1f168d004a340514fdf36c

  • SHA256

    a80a80f6ffe799ac7b9cd41ba6cf36bc6a5bac15584b9f02820e8f0fc2f7ed37

  • SHA512

    189a668fc23aeb6762060c9fce461d36fc41766c0c8d48b9a2f6ea90949293e96e4578e29a93ace461bdc79a20a36b116d268755e3f77fa2e4059ac25e3a7519

  • SSDEEP

    384:SlEpga/4dPJuUMk3xsOP4NHw/Xjj+ysMcWbC:SqNWJUk3AHwPjaNiC

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Drops file in System32 directory 17 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\New Order_Sept2024.vbe"
    1⤵
    • Blocklisted process makes network request
    PID:584
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {68139E31-CFCC-4318-8750-A0DA74AD4514} S-1-5-21-1488793075-819845221-1497111674-1000:UPNECVIU\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Windows\System32\WScript.exe
      C:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Roaming\yBWGDdceHJjwMqj.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2820
      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
        3⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2552
        • C:\Windows\system32\wermgr.exe
          "C:\Windows\system32\wermgr.exe" "-outproc" "2552" "1152"
          4⤵
            PID:1548
        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1852
          • C:\Windows\system32\wermgr.exe
            "C:\Windows\system32\wermgr.exe" "-outproc" "1852" "1180"
            4⤵
              PID:1568
          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
            3⤵
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2784
            • C:\Windows\system32\wermgr.exe
              "C:\Windows\system32\wermgr.exe" "-outproc" "2784" "1248"
              4⤵
                PID:2216
            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
              3⤵
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1004
              • C:\Windows\system32\wermgr.exe
                "C:\Windows\system32\wermgr.exe" "-outproc" "1004" "1156"
                4⤵
                  PID:2388
              • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                3⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3004
                • C:\Windows\system32\wermgr.exe
                  "C:\Windows\system32\wermgr.exe" "-outproc" "3004" "1280"
                  4⤵
                    PID:2140
                • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                  3⤵
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2252
                  • C:\Windows\system32\wermgr.exe
                    "C:\Windows\system32\wermgr.exe" "-outproc" "2252" "1244"
                    4⤵
                      PID:2208
                  • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                    3⤵
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2108
                    • C:\Windows\system32\wermgr.exe
                      "C:\Windows\system32\wermgr.exe" "-outproc" "2108" "1276"
                      4⤵
                        PID:2836
                    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                      3⤵
                      • Drops file in System32 directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2732
                      • C:\Windows\system32\wermgr.exe
                        "C:\Windows\system32\wermgr.exe" "-outproc" "2732" "1156"
                        4⤵
                          PID:1848
                      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                        3⤵
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2564
                        • C:\Windows\system32\wermgr.exe
                          "C:\Windows\system32\wermgr.exe" "-outproc" "2564" "1160"
                          4⤵
                            PID:1532
                        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                          3⤵
                          • Drops file in System32 directory
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:2380
                          • C:\Windows\system32\wermgr.exe
                            "C:\Windows\system32\wermgr.exe" "-outproc" "2380" "1280"
                            4⤵
                              PID:1564
                          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                            3⤵
                            • Drops file in System32 directory
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1016
                            • C:\Windows\system32\wermgr.exe
                              "C:\Windows\system32\wermgr.exe" "-outproc" "1016" "1156"
                              4⤵
                                PID:2916
                            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                              "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                              3⤵
                              • Drops file in System32 directory
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2756
                              • C:\Windows\system32\wermgr.exe
                                "C:\Windows\system32\wermgr.exe" "-outproc" "2756" "1160"
                                4⤵
                                  PID:1512
                              • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                3⤵
                                • Drops file in System32 directory
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2116
                                • C:\Windows\system32\wermgr.exe
                                  "C:\Windows\system32\wermgr.exe" "-outproc" "2116" "1160"
                                  4⤵
                                    PID:2276
                                • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                  3⤵
                                  • Drops file in System32 directory
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3048
                                  • C:\Windows\system32\wermgr.exe
                                    "C:\Windows\system32\wermgr.exe" "-outproc" "3048" "1156"
                                    4⤵
                                      PID:1360
                                  • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                    3⤵
                                    • Drops file in System32 directory
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2252
                                    • C:\Windows\system32\wermgr.exe
                                      "C:\Windows\system32\wermgr.exe" "-outproc" "2252" "1156"
                                      4⤵
                                        PID:2052
                                    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                      "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                      3⤵
                                      • Drops file in System32 directory
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1452
                                      • C:\Windows\system32\wermgr.exe
                                        "C:\Windows\system32\wermgr.exe" "-outproc" "1452" "1152"
                                        4⤵
                                          PID:1556
                                      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
                                        3⤵
                                        • Drops file in System32 directory
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2740
                                        • C:\Windows\system32\wermgr.exe
                                          "C:\Windows\system32\wermgr.exe" "-outproc" "2740" "1276"
                                          4⤵
                                            PID:2316

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259502544.txt

                                      Filesize

                                      1KB

                                      MD5

                                      432101d71cc71bc5522855b5fff7d908

                                      SHA1

                                      05f293fddc4d79fce11039da92cf1535867fe4d6

                                      SHA256

                                      fc82f2a90deccb1e8f55fb6a111a28ebd3402fe1c6923179896183b775a894fe

                                      SHA512

                                      d99aea172b5c1d4279bde9ae4015c7be64546637903c4fe44b8bc6b60c5a259a268a541b67f8d70bb95cbb75c4b580cdae20a0b3c4b70d9e17c00acf40b7d0c7

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259514595.txt

                                      Filesize

                                      1KB

                                      MD5

                                      e3f235b36d8938252eabaf84e9dfcc99

                                      SHA1

                                      6fbe44ef4095917cce95417eec9fc669e247796b

                                      SHA256

                                      c666b07c11b5d13b79d7d72395d2f04da9edff6a3b533a72bc47043b2fbcaf58

                                      SHA512

                                      963f0c33f76775b32e60c21845e83bc7a3604f4f3a35139ddd712c31b4e9d2a6d45497791d2508a32e18d0c7daa48f6de988c796217786c45d6d88a503d101fe

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259527312.txt

                                      Filesize

                                      1KB

                                      MD5

                                      99e79a042e8bfe78a71a020ababd1994

                                      SHA1

                                      7ba545671a6327dca4f428eee03a0e714cffc18b

                                      SHA256

                                      91591132b0df918cd2637cd297e68bb4b14fa64ec4837d061f45f6e6870e3b3d

                                      SHA512

                                      311a79ae32e64b8acb29625122fd9a8ef9c24d529688fded46e59b41aceb64f6cb2f40fee6e5204e000af5484b2f09a71d1a04bdd0f13bea7a9b2b486a72c76c

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259547683.txt

                                      Filesize

                                      1KB

                                      MD5

                                      3c2d4c4ddd315e8027b3bdfe7d711032

                                      SHA1

                                      0454b717f491ef4b3e8198607687a63f8798c2d5

                                      SHA256

                                      502cf05552b34004f6edcff4c59186ab02544d5922b0c80c2b16a1b5417b0f49

                                      SHA512

                                      a9ee7c456ec8a134c533b1c5cbe80f97614440d41e4440a42d35fbeb6aeda41303521c3823f274ee34e0814471e5a84898092da8dde40b9f656f836bc35bda7d

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259561965.txt

                                      Filesize

                                      1KB

                                      MD5

                                      092a7c96d584b96316373fc6bb57aaac

                                      SHA1

                                      aca82cb441820ced93249bd52acd873b8be7beae

                                      SHA256

                                      bc95299fba620736e48535f59dce0773c66fcfe50c6ae5eba60b856d95b20842

                                      SHA512

                                      4dad4f76fffa64d2d8f501c74b26f76799571c877028053c0345c8ee8c0b60f96378bc56800279e5a838e71ecdb550ef565faf0273211e7f2acfa5c42f32f74f

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259576684.txt

                                      Filesize

                                      1KB

                                      MD5

                                      fec23d72f299b8c4c6a4d57c9d59cf8a

                                      SHA1

                                      138757d90879acbbda4136a2678a4a8a58a0010d

                                      SHA256

                                      13ab2ff4819b6d0ce16a7b18e4863753222b29c81fd71b598a8eff137c580bc6

                                      SHA512

                                      01952683d90243d2cb1a99e66e5515a845ba61d223232823bdb17ddf1271a685abf545c2579704a7e686e17212cc844ab335e3c46ece4a5a1d6870e638139603

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259589244.txt

                                      Filesize

                                      1KB

                                      MD5

                                      68b7e8da76f4764f2aa5c7adf01dd037

                                      SHA1

                                      a6d9341e0ea5b7d54429930c090a125eb22445be

                                      SHA256

                                      2ebbdf6e068100fd711e6a632f90575fcc1333d7f15f867ce642eae244eec3b4

                                      SHA512

                                      d85f79bfa983e7c945c72aa968790a311b35da078e52df9c1637a22a7218344a12b57c3370c3ff008dede901e96ed99a9c36b08b85ce67ad173af0be5ef9e69f

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259612451.txt

                                      Filesize

                                      1KB

                                      MD5

                                      6700506b5673dbc86e49c754966e1228

                                      SHA1

                                      cc8bc8dd4d9a26bfa05a45a202ff05e5e2b2ff11

                                      SHA256

                                      654edc6107c2892f1044c1f34d8ce6698e8a9c4789120fb3b08c7ce67d992814

                                      SHA512

                                      3538c5a080649935fc3f6d99b847540759422ddd6d619bd9446e3c9c931e9113e2878e05a3d8d2500e1afb34b21724e997f1a8153b96ff863a1727087e5033c5

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259624919.txt

                                      Filesize

                                      1KB

                                      MD5

                                      5783631ff2b9d0b86e0925d1c65a94d2

                                      SHA1

                                      e34f28df3d5c6cb6153dee2375850043dfb1178c

                                      SHA256

                                      974854c2d5c7bb33cdaf7c106c9ed1c248fc0d17500e8456afffd613d799b496

                                      SHA512

                                      58fdf40ed4360268f874c1a407ed1156c461db822bd982c33ef015f3d871e80bd2d9d2dcda790847033aa67b3571344d24a926c7c29183424c88367465d6cd10

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259637199.txt

                                      Filesize

                                      1KB

                                      MD5

                                      252128d8abe56305b5b89edf081f0019

                                      SHA1

                                      c99dfc6caa055d0fbf1591baf0403d3f9dfba2cf

                                      SHA256

                                      c520ef0824221bcd5298e24dfd62d7d700ce92d391db43bb78300f2989dd4582

                                      SHA512

                                      33ea36aa5ac3606ba28d6e5cc410b82c07fc2a34067ea486a7a4325331ebb8526d25ca8415aebaa816b9d6280259c296010836bc99ecf62126fbac9db50dc792

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259652683.txt

                                      Filesize

                                      1KB

                                      MD5

                                      5eec36285e3a8f084b4cbbef09f7f465

                                      SHA1

                                      76fc5221558b0bd32730069c44236c5f762ece3d

                                      SHA256

                                      b4a477bfbeeb9e37698475653dd51c786c6aadf009edd2bf90092ea549013b61

                                      SHA512

                                      8f2399ea5b67d4abff5bb4be0a7c9ef623178f419f849d07207300ea88d5630879a9fef286b5b0c734bddda1324bf32ccda65a30937456ad75dbddd42fadf242

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259668663.txt

                                      Filesize

                                      1KB

                                      MD5

                                      e1efc3aae7d3be528a8e5e6a9463fed9

                                      SHA1

                                      14d2b17e060b69ba9733cde5f533bf8b45b98f01

                                      SHA256

                                      a612ee0cff43bd32533f69ce01ecdd2433ba96829edfaeb29da3309ef479a1fa

                                      SHA512

                                      c4b3b7873eb404e866fb1f2d60456f4d3b492ebf96743610273a1ac86d9b0ac1a1e39a39935dc1412753f96671bb4478d6c18edf3c208ce665392c1f28a0f8f3

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259682775.txt

                                      Filesize

                                      1KB

                                      MD5

                                      2d4a7281dcfe38fbb0b40f4282750f1a

                                      SHA1

                                      fba4b6dec83dce31bc1600c934ad7dfddceaa08b

                                      SHA256

                                      dba7b38cf70d0c01f76ee19c2460aa1cea71b67e416fa8bfc860553c57a04cd9

                                      SHA512

                                      6884e227693dba4eb87f811f1943ca89f608a27901de3f2eda4e4a440298704265ca9f161cbcdf2dac6245f0aa5b46a77c3c3220619e7f02da8c2c2341acd722

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259695035.txt

                                      Filesize

                                      1KB

                                      MD5

                                      251628b008d232b6e0926bab156ccafe

                                      SHA1

                                      cc3c92c889bdfc076aef04eb7cb6d7845fa02d00

                                      SHA256

                                      6fb516fbd81f593ab11454ebcf0e8d9c11da5c2daf8987f3cbca5df55aee3685

                                      SHA512

                                      5ec600fe86ebacf5716d5a6b2c55c75caa73dd88b30e02f780c3a6741b66c2849248dd1a2d576cac44f7c7c7320a711a4c544915e0ec82317f8c48d7411a55fd

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259717967.txt

                                      Filesize

                                      1KB

                                      MD5

                                      8408a9c0db2e65f7c1ee2dd891add6a5

                                      SHA1

                                      307a74899740426eb8b710ce2c8c1b08f97bf189

                                      SHA256

                                      e84ed144c572d121e05ea5de04ddea718f727b68465b032c908ecda5704b6878

                                      SHA512

                                      ffa1a84e3fe1b113586a7708e2f4a50266083504c12407300a68bc84c3c80c581e51cf12c173020b906ae3c661a65846b9d15823d7324b9a8addb41523186ec8

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259727775.txt

                                      Filesize

                                      1KB

                                      MD5

                                      e23a2f59679e29bccd877fd2167281ba

                                      SHA1

                                      0b4c36fa3ee5ca3e2ccd1d691a4703432d35f0e9

                                      SHA256

                                      c80740f77c3d621c288e54e9d5efcdef079815ba730db65a6a0f72428f1016cf

                                      SHA512

                                      954e4202b6bb77b939ad2f041ea266d74ec514a5e84dce68c151c1eca03cb979386f18b51fba067808f9056385b79ddefd765b522ea1fab78caffa4952eeb648

                                    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259743303.txt

                                      Filesize

                                      1KB

                                      MD5

                                      42fc8cb6843623c5074af7188ebdb316

                                      SHA1

                                      335f03233ac5f664684f5b3771e78303e29b6d70

                                      SHA256

                                      a70d4c7be723343ca1cb48f0abce4adf83f5ffee7cf9bacd41b38e4e69819966

                                      SHA512

                                      f5b81347d39339f7d6c0d5f749fa2dd200c2f95a2ef2caa92ede78dcad80d46a5c7e524bb09d947199ec8f91cd37d50118dea9470e9fd4e70608a9a4c1fb9b7b

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\H32PP1SMCNGMCFFQ83Q6.temp

                                      Filesize

                                      7KB

                                      MD5

                                      e6968996b380915faf9355fce8198abd

                                      SHA1

                                      4da29211188bb543297e4457011d6ac80d5ec168

                                      SHA256

                                      7c86e202669b3428e3b377ad67208d4cffda1f26547b133546de3fa639a55005

                                      SHA512

                                      a2bd8b2ece7029f0ce99254965299453d4e3c9276b0e94a00df54817a86090c9bc360e2fe5b157a258a12406ca752375af094e842bcf7522aa20e892ffa3a6ae

                                    • C:\Users\Admin\AppData\Roaming\yBWGDdceHJjwMqj.vbs

                                      Filesize

                                      2KB

                                      MD5

                                      e8e30a783dd292ea2b3aa52349007106

                                      SHA1

                                      60e55dfc94d07b4147d7147abfb54e809ce9ebc4

                                      SHA256

                                      db4c9673ce906ad583be62458d15ed8f7c32ebb45664a1db06fb5417bcfc7b47

                                      SHA512

                                      119fc00126e077e8f4409167990c89f0bbdcce37e042c4eb748115bb67393576d7a2b462104d1aaa9c65f11295a810d6f1a51393d84870109dae16fe90c837b0

                                    • memory/1852-18-0x0000000002030000-0x0000000002038000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/1852-17-0x000000001B640000-0x000000001B922000-memory.dmp

                                      Filesize

                                      2.9MB

                                    • memory/2552-6-0x000000001B740000-0x000000001BA22000-memory.dmp

                                      Filesize

                                      2.9MB

                                    • memory/2552-7-0x0000000002240000-0x0000000002248000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/2552-8-0x0000000002C10000-0x0000000002C18000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/2552-9-0x0000000002EE0000-0x0000000002EEA000-memory.dmp

                                      Filesize

                                      40KB