Analysis

  • max time kernel
    42s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-03-2024 20:51

General

  • Target

    dcrat/123.bat

  • Size

    66B

  • MD5

    572472c7cc450eedfcd8061e7f64eb96

  • SHA1

    6d315e5521592f668dc2899eaa83f2ac9cbe99c4

  • SHA256

    b449f5170c97f7328ce8ff6f2d741c489de4fc9640dcd1a4781349c60f25d934

  • SHA512

    f89b64c7300aa52b1bba95f1a45fb1dcc1ef13ed81bb0e671159120f909bba94a9762de9c78056f1f535e2797efffa689e6e10b73ca3a0997b307361619883b6

Malware Config

Signatures

  • Phemedrone

    An information and wallet stealer written in C#.

  • Executes dropped EXE 3 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dcrat\123.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Users\Admin\AppData\Local\Temp\dcrat\DCRat.exe
      DCRat.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4540
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\dcrat\DCRatLauncher.exe'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1364
      • C:\Users\Admin\AppData\Local\Temp\dcrat\DCRatLauncher.exe
        "C:\Users\Admin\AppData\Local\Temp\dcrat\DCRatLauncher.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1740
        • C:\Program Files\Java\jre-1.8\bin\javaw.exe
          "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -Dprism.dirtyopts=false -Dfile.encoding=UTF-8 -classpath "lib\.;lib\..;lib\IIIllllIlIlllIlIIIIlllIlIlIlllllIIIlIIllllIIIlIllIIlIIllllIIllllllIIlIIIIIIlllIIIlIllllllIIllIlIllIlllIllIlIIIIIIIIllllI.jar;lib\IIIllllIlIlllIlIIIIlllIlIlIlllllIIIlIIllllIIIlIllIIlIIllllIIllllllIIlIIIIIIlllIIIlIllllllIIllIlIllIlllIllIlIIIIIIIIllllIIilIl.jar;lib\IIlIlIllIIlIIllIIllIIlIIIllIlIlIlIIIIlIlIllIIlIIllIIIIIllIIIIlIIIlIIlIIlIIlIllIIlllIIIllIIIlIIlIllllIllIIIIlIIIlIllllllI.jar;lib\IlIIlIllllIIIIIlIlllIllIlIlIIIIIlIIIlIlIlllIIllIllIIIIIIlIIlllIIIlIIIlllIIIlllllIlIlIlllllIIlIllIIlIIlIIlIIIlllllllIlIII.jar;lib\IlIlIIIIIIIlIlllllllIllIIlIIllIllllIIIlIIIlIlIIlIIlIIlIllIlllIlIlIIllIIlIIIIIIIlIIIIIIIIIlIlllIIllIlIIlIIIlIlIlllIIIIIIl.jar;lib\IlIllIIllllllllIlIIlllllIIIIllIIIlIIlllIIllIIllllIIllIlIIIlIIIIlIIIIIlllllllIllIIlIlIllIIlIlIlIIllIlIllIIIlIIIIlIllIIIIl.jar;lib\IllIIIIllIlIIIIlIlIllIIlIIllIIlIllIIlllllIlllIllIlIIlIIlllIIlIlIlIllIllIIlIIIlIIIllIIIIIllIIlllllIlIIIIIlIIIIIIIIIIIIlII.jar;lib\lIIllIIlIlllIlIlllIlIIlIIIlllllIIlIlIIllIllIlIlllIlIIlIlIlIIllIlIIIIIllIIlIIlIIlIIllIIIlIIllIlIIIIlIlIIlIIlIllIIlIIlIlIl.jar;lib\llIlIIIIlIlIlllllIlIIllllIIIlIlIllllIIllllIlllIIlllllIIlIlllIIIIIIlIIllIIIlIlIlllIlIIIlIIIIIllIlllIlllIIllIIllIlIlIIlllI.jar;lib\llIlIlIIIllllIIIllllllllllIllIlIlllIIlllIIlllIIllIIllllIlllIIIIIllllIIlllIIllIIIIlIlIlIlIIIlIIIlIlIlIlIIlllIIlllIlIlIlII.jar;lib\lllIIlIlIIlIIllllIIllllIIlIllllIIIlIllllIIllIIIlllIIIIIIlIIlllIIllIllIIlllIlIIlIlIlllIIlllIlllIlIIlIIIllIlllIIIlIIIIIlll.jar;lib\lllIlIIIIIlIllIlIlIIllIlIIIlIIllIllllIIIIIllIlllIllIIllIIllIllIllIIlIlllllIIlIllIllIIlIIlIIIllIlIlIIlIIIIIIIllIIlllIllIl.jar;lib\llllIlIIIIIllllIlIIIlIllIlIIIllllIIIllIllllIIlllIlIIIlllIIlIlIlllIIlIIIIlIIIIlllIIlIIlIlIIIIIIIIllllIllIlIIIlIllIlIlIIll.jar;lib\llllIlIIlIllllIlIlIIIlIIIlIllIlIIIIlIlIIlIlIIIIllIIlIIllIIIllllIlIllIlllllIIIIIIIIllIllIlIlllllllIllIIIllllIIllIIlIllIll.jar" org.develnext.jphp.ext.javafx.FXLauncher
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:924
          • C:\Windows\system32\icacls.exe
            C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
            5⤵
            • Modifies file permissions
            PID:2208
          • C:\Windows\System32\cmd.exe
            C:\Windows\System32\cmd.exe /c C:\Windows\System32\wbem\wmic.exe baseboard get Manufac ��
            5⤵
              PID:2540
              • C:\Windows\System32\wbem\WMIC.exe
                C:\Windows\System32\wbem\wmic.exe baseboard get Manufac
                6⤵
                  PID:4296
              • C:\Windows\System32\cmd.exe
                C:\Windows\System32\cmd.exe /c USERPR ��
                5⤵
                  PID:4712
                • C:\Windows\System32\cmd.exe
                  C:\Windows\System32\cmd.exe /c C:\Windows\System32\wbem\wmic.exe baseboap��3���
                  5⤵
                    PID:4864
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\SetupUDPDriver.exe'
                3⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:972
              • C:\Users\Admin\AppData\Local\Temp\SetupUDPDriver.exe
                "C:\Users\Admin\AppData\Local\Temp\SetupUDPDriver.exe"
                3⤵
                • Executes dropped EXE
                • NTFS ADS
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:2024
                • C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt
                  C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"
                  4⤵
                    PID:4332
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Hyfatok.exe'
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2040
                • C:\Users\Admin\AppData\Local\Temp\Hyfatok.exe
                  "C:\Users\Admin\AppData\Local\Temp\Hyfatok.exe"
                  3⤵
                  • Executes dropped EXE
                  PID:1680
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\SetupTCPIP6Driver.exe'
                  3⤵
                    PID:5116
                  • C:\Windows\System32\SetupTCPIP6Driver.exe
                    "C:\Windows\System32\SetupTCPIP6Driver.exe"
                    3⤵
                      PID:1528
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=SetupTCPIP6Driver.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
                        4⤵
                          PID:4020
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\SetupTcpipDriver.exe'
                        3⤵
                          PID:1312
                        • C:\Windows\System32\SetupTcpipDriver.exe
                          "C:\Windows\System32\SetupTcpipDriver.exe"
                          3⤵
                            PID:3976
                        • C:\Users\Admin\AppData\Local\Temp\dcrat\php\php.exe
                          php -S 127.0.0.1:8000 -t ..\server
                          2⤵
                            PID:4748

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

                          Filesize

                          46B

                          MD5

                          a95168e27509e8b1d6a713ad29672e21

                          SHA1

                          985e069294db6fcf9659c1206bd9d8334a195d78

                          SHA256

                          e2adb3326f88b10c4c8dd3b8fb95defa4ef0c08676b9dfdbfce602d06a956c61

                          SHA512

                          6550f6dcf53b6c8f45c05e5b9fbe41cc295f0144862e0b0f34f1c0ba850a8b55cbd13f6a85c8c281a6c04c0e1d026069c969f468f61e82fcf3dd7c07be91adbd

                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                          Filesize

                          2KB

                          MD5

                          d85ba6ff808d9e5444a4b369f5bc2730

                          SHA1

                          31aa9d96590fff6981b315e0b391b575e4c0804a

                          SHA256

                          84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                          SHA512

                          8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                          Filesize

                          944B

                          MD5

                          5cfe303e798d1cc6c1dab341e7265c15

                          SHA1

                          cd2834e05191a24e28a100f3f8114d5a7708dc7c

                          SHA256

                          c4d16552769ca1762f6867bce85589c645ac3dc490b650083d74f853f898cfab

                          SHA512

                          ef151bbe0033a2caf2d40aff74855a3f42c8171e05a11c8ce93c7039d9430482c43fe93d9164ee94839aff253cad774dbf619dde9a8af38773ca66d59ac3400e

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                          Filesize

                          944B

                          MD5

                          d437e3e0401ed5efb5afb191e588df04

                          SHA1

                          b72e2e04028dbf329ce6f1f89aa43e224475b371

                          SHA256

                          a58c96b0f9ffe77f83c7dc6cc24e8be42db83eb1e0eeabc7fb1133fb81d5da2a

                          SHA512

                          7e5d2f8b8ff5db026750ed9c86a73fdb4a9b46069a47354a123f16c1af0bdb7145e8caf2ed8296e1b2329a3d752568098804cb54d0ae83bdca7f65daa46ef362

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                          Filesize

                          944B

                          MD5

                          d28a889fd956d5cb3accfbaf1143eb6f

                          SHA1

                          157ba54b365341f8ff06707d996b3635da8446f7

                          SHA256

                          21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

                          SHA512

                          0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

                        • C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt

                          Filesize

                          320KB

                          MD5

                          8fcf3ed249059a1078baebd5f0f405c0

                          SHA1

                          4fd0e210e324ffbfe1c1c23a54f862f7d7b73744

                          SHA256

                          6b6c810e477be2e4ceec884d345f24df4c6251c3487494124d08dc57d05a3ca6

                          SHA512

                          ee48ca5d55e6c7b307ce003d952f40f69fd2bcda2264de0530bd168b9b17dcb31fa346464cc6bc78448dc54bfa482a4f20a5fb6cd88875b4e597533d5ebf365d

                        • C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt

                          Filesize

                          704KB

                          MD5

                          ba79ff8f162a8d284b819aee1e604697

                          SHA1

                          bb72613f2d25314fbfe6edee2441f1a76084f38f

                          SHA256

                          1593637260e7bb94fb50b6b37be3d7155d40ae62f2c9c2c9e49721aaecafb8ef

                          SHA512

                          46c3a27cc7c144e9b8d4b0465c73e160a15f4b4dd178d48c77efdb30c90f9484d42e880d81e0dd7778819fb961970c62c7e61beb33997acdf5d8df9068850eaa

                        • C:\Users\Admin\AppData\Local\Temp\Hyfatok.exe

                          Filesize

                          84KB

                          MD5

                          9095c3e7ce04dd48e72178ebee7cd5c1

                          SHA1

                          bb21d1cb98b0ebfde2be9079c18152b340b26418

                          SHA256

                          9a212f20a8b74e3a0662ace826537cff60bd30a20cdb2b4dd43b8c69e5770bc1

                          SHA512

                          d01706a02e6de418bbacf2a0bd26c4706a66531934fdcdbd582df7403427293b7fe565ccfee7d941d30ec293bf09309c86fb52e2af7908d26f33fcb296f99c5a

                        • C:\Users\Admin\AppData\Local\Temp\Hyfatok.exe

                          Filesize

                          64KB

                          MD5

                          bbfd1537caf4cd685210cbdc05717fa9

                          SHA1

                          246456d4737b44f6d2838827c4e3f691558cb8f1

                          SHA256

                          c0cf1dc8393831fea28bc07e7c7dbdd6662b97ee46ac388d3c85e16f7310186c

                          SHA512

                          4bf5037bcc873da023dca89b8b9e7aa40e2863f962beffbb1584ccde00d986fb33b1f4bf32d35d0fcc8f8434809d0b1a92591f06e7cf827c8ecfda966cfe11ff

                        • C:\Users\Admin\AppData\Local\Temp\SetupUDPDriver.exe

                          Filesize

                          1.7MB

                          MD5

                          f7a774b0855b7745778a874cc79436ee

                          SHA1

                          0f3f48ac32ef984bafd4208c56f33c6229a45bfb

                          SHA256

                          6bb994f8e4b16f38880f5934988bd8e23b9af30cc5cad824692bbad3df4901c7

                          SHA512

                          96e28713ca24eff353362b05c1af3f25fd27f9174eb24ef78998bbc18b5580e35f96889d5a1d76301d1f66b29107ea2ed8668fcce219a3b7af98070e41b059d3

                        • C:\Users\Admin\AppData\Local\Temp\SetupUDPDriver.exe

                          Filesize

                          3.6MB

                          MD5

                          a1a439643266113fa14ff0dd6db1a752

                          SHA1

                          dd6545e6c2f243900d5a91f6272535b8ed49f34e

                          SHA256

                          26fc81027d50f18ac2cdaa4c0bd3785f4be659c3913df4b6764416c9f84d1e1a

                          SHA512

                          cf8a87d3950ffa5ed183df60567262d337d722c39492302bf73dee281238341cca0566a327eeeb319d38ac04307c668db328ae77d04c24568e08c4962566f0b3

                        • C:\Users\Admin\AppData\Local\Temp\SetupUDPDriver.exe

                          Filesize

                          3.0MB

                          MD5

                          f5f001406bc11334a3eb52c1526ec218

                          SHA1

                          4a532361699d554f6dfa556383da2dfb1c0b1577

                          SHA256

                          39b630afad54222d2c8209f6bd63e9ed1b60562402e96814110ca8c38262139f

                          SHA512

                          47907cdeebc65e8243cc551ab3f8ddf8df4fb9206a6514884efb9bf4ba33b4a274b888f7bd10f4e8514c6269bf780ac213d130fe82ce0853b8ac0b1c6f2f3c12

                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bqb5cw0f.yqe.ps1

                          Filesize

                          60B

                          MD5

                          d17fe0a3f47be24a6453e9ef58c94641

                          SHA1

                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                          SHA256

                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                          SHA512

                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                        • C:\Users\Admin\AppData\Local\Temp\aut9105.tmp

                          Filesize

                          384KB

                          MD5

                          15e44fbff1d7a4181213b8c5a54e4ccb

                          SHA1

                          86172f9cfad27d2833be6e47dbe217148226545e

                          SHA256

                          f6c1c229bb4c377aa5914d52dd454e70dbee7819475219e95b889ca53672a9be

                          SHA512

                          4cbe159305ec6efef1b15f474d698f9ff0240f061d9cf64882013c200bbb57ebf995bd053bf0707cc41ddc14163fc0c992e70c0f47c993d5cc87b306264089e0

                        • C:\Users\Admin\AppData\Local\Temp\dcrat\DCRatLauncher.exe

                          Filesize

                          72KB

                          MD5

                          2c7d37e90dd8ab57d06dad5bc7956885

                          SHA1

                          da789c107c4c68b8250b6589e45e5a3cf7a9a143

                          SHA256

                          5ede5d774ab65f25357cf5a1fa5e354f6f2a9868651a0fa717485802b21b1939

                          SHA512

                          e74ae891771bfd9c6fcdfbe8e4f33f0d5f7c3457cd84b257500cdaf8fa8b16fe458a18db9b3a60591465982fc2871f4c3f2e7541c765f00a0516f805e7e9ca0f

                        • C:\Windows\System32\SetupTCPIP6Driver.exe

                          Filesize

                          8KB

                          MD5

                          488bfa6d9fd5c874585daa3f960e6804

                          SHA1

                          aa8ca3927c318716e14210fc0a3ed70ea483eb23

                          SHA256

                          a84bfef2ce112366349e3ce8c70e120ec63731535696b405a458e5ccfcdf7f48

                          SHA512

                          952db3ec6548421b8c013c1482545e005c7526f0c4f432b12bde8460a13c88d0f1022cfe3008af88bb043d9fdede9e341bcc406d7d2fc8370249da75642a07a1

                        • C:\Windows\System32\SetupTcpipDriver.exe

                          Filesize

                          28KB

                          MD5

                          2fbe46325e890bee1e21aba30c9345be

                          SHA1

                          2c860d226f6b8f59caa058e39d06d6ae24007227

                          SHA256

                          cfbd108945d203a6a5ced2dc4eee0084ba66972c1361c05b6b7065276f15eb4b

                          SHA512

                          133e2c1a9bad1b7a9c7e519c6132a4494af5a0233c47ee3eecae263f72bce8345356f032bbbcdefc934776020b210327f18a52b72138006808975f8bad2ebc34

                        • memory/924-226-0x000001CF62D50000-0x000001CF62D51000-memory.dmp

                          Filesize

                          4KB

                        • memory/924-155-0x000001CF62D50000-0x000001CF62D51000-memory.dmp

                          Filesize

                          4KB

                        • memory/924-253-0x000001CF64650000-0x000001CF65650000-memory.dmp

                          Filesize

                          16.0MB

                        • memory/924-47-0x000001CF64650000-0x000001CF65650000-memory.dmp

                          Filesize

                          16.0MB

                        • memory/924-248-0x000001CF62D50000-0x000001CF62D51000-memory.dmp

                          Filesize

                          4KB

                        • memory/924-232-0x000001CF64650000-0x000001CF65650000-memory.dmp

                          Filesize

                          16.0MB

                        • memory/924-228-0x000001CF62D50000-0x000001CF62D51000-memory.dmp

                          Filesize

                          4KB

                        • memory/924-298-0x000001CF64650000-0x000001CF65650000-memory.dmp

                          Filesize

                          16.0MB

                        • memory/924-78-0x000001CF64650000-0x000001CF65650000-memory.dmp

                          Filesize

                          16.0MB

                        • memory/924-195-0x000001CF64650000-0x000001CF65650000-memory.dmp

                          Filesize

                          16.0MB

                        • memory/924-192-0x000001CF62D50000-0x000001CF62D51000-memory.dmp

                          Filesize

                          4KB

                        • memory/924-103-0x000001CF64650000-0x000001CF65650000-memory.dmp

                          Filesize

                          16.0MB

                        • memory/924-109-0x000001CF64650000-0x000001CF65650000-memory.dmp

                          Filesize

                          16.0MB

                        • memory/924-112-0x000001CF64650000-0x000001CF65650000-memory.dmp

                          Filesize

                          16.0MB

                        • memory/924-56-0x000001CF62D50000-0x000001CF62D51000-memory.dmp

                          Filesize

                          4KB

                        • memory/924-330-0x000001CF64650000-0x000001CF65650000-memory.dmp

                          Filesize

                          16.0MB

                        • memory/924-183-0x000001CF64650000-0x000001CF65650000-memory.dmp

                          Filesize

                          16.0MB

                        • memory/924-163-0x000001CF64650000-0x000001CF65650000-memory.dmp

                          Filesize

                          16.0MB

                        • memory/924-140-0x000001CF64650000-0x000001CF65650000-memory.dmp

                          Filesize

                          16.0MB

                        • memory/924-169-0x000001CF62D50000-0x000001CF62D51000-memory.dmp

                          Filesize

                          4KB

                        • memory/924-326-0x000001CF64650000-0x000001CF65650000-memory.dmp

                          Filesize

                          16.0MB

                        • memory/924-147-0x000001CF64650000-0x000001CF65650000-memory.dmp

                          Filesize

                          16.0MB

                        • memory/924-166-0x000001CF64650000-0x000001CF65650000-memory.dmp

                          Filesize

                          16.0MB

                        • memory/924-165-0x000001CF62D50000-0x000001CF62D51000-memory.dmp

                          Filesize

                          4KB

                        • memory/924-157-0x000001CF62D50000-0x000001CF62D51000-memory.dmp

                          Filesize

                          4KB

                        • memory/924-289-0x000001CF64650000-0x000001CF65650000-memory.dmp

                          Filesize

                          16.0MB

                        • memory/924-161-0x000001CF64650000-0x000001CF65650000-memory.dmp

                          Filesize

                          16.0MB

                        • memory/972-31-0x000001BA3B640000-0x000001BA3B650000-memory.dmp

                          Filesize

                          64KB

                        • memory/972-33-0x000001BA3B640000-0x000001BA3B650000-memory.dmp

                          Filesize

                          64KB

                        • memory/972-55-0x00007FFF97C10000-0x00007FFF986D1000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/972-30-0x00007FFF97C10000-0x00007FFF986D1000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/1312-284-0x000002E2722E3000-0x000002E2722E5000-memory.dmp

                          Filesize

                          8KB

                        • memory/1312-274-0x000002E2722E0000-0x000002E2722F0000-memory.dmp

                          Filesize

                          64KB

                        • memory/1312-273-0x00007FFF97C10000-0x00007FFF986D1000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/1312-288-0x00007FFF97C10000-0x00007FFF986D1000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/1364-10-0x00007FFF97C10000-0x00007FFF986D1000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/1364-18-0x00007FFF97C10000-0x00007FFF986D1000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/1364-14-0x000001FA62140000-0x000001FA62150000-memory.dmp

                          Filesize

                          64KB

                        • memory/1364-9-0x000001FA62280000-0x000001FA622A2000-memory.dmp

                          Filesize

                          136KB

                        • memory/1364-15-0x000001FA62140000-0x000001FA62150000-memory.dmp

                          Filesize

                          64KB

                        • memory/1680-144-0x0000000000850000-0x000000000086C000-memory.dmp

                          Filesize

                          112KB

                        • memory/1680-200-0x00007FFF97C10000-0x00007FFF986D1000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/1680-156-0x000000001B960000-0x000000001B970000-memory.dmp

                          Filesize

                          64KB

                        • memory/1680-154-0x00007FFF97C10000-0x00007FFF986D1000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/1740-29-0x0000000000400000-0x000000000041F000-memory.dmp

                          Filesize

                          124KB

                        • memory/2040-126-0x00007FFF97C10000-0x00007FFF986D1000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2040-74-0x000001E251720000-0x000001E251730000-memory.dmp

                          Filesize

                          64KB

                        • memory/2040-72-0x00007FFF97C10000-0x00007FFF986D1000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/3976-320-0x00000000001C0000-0x00000000001CC000-memory.dmp

                          Filesize

                          48KB

                        • memory/3976-322-0x00007FFF97C10000-0x00007FFF986D1000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/4540-119-0x00007FFF97C10000-0x00007FFF986D1000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/4540-2-0x0000000004AE0000-0x0000000004AF0000-memory.dmp

                          Filesize

                          64KB

                        • memory/4540-0-0x00007FFF97C10000-0x00007FFF986D1000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/4540-1-0x0000000000F20000-0x0000000001ECE000-memory.dmp

                          Filesize

                          15.7MB

                        • memory/4540-321-0x00007FFF97C10000-0x00007FFF986D1000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/4540-122-0x0000000004AE0000-0x0000000004AF0000-memory.dmp

                          Filesize

                          64KB

                        • memory/5116-180-0x000001D67D840000-0x000001D67D850000-memory.dmp

                          Filesize

                          64KB

                        • memory/5116-170-0x00007FFF97C10000-0x00007FFF986D1000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/5116-168-0x000001D67D840000-0x000001D67D850000-memory.dmp

                          Filesize

                          64KB