Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10v200217
  • submitted
    19-03-2020 18:17

General

  • Target

    lEDVIkQSVYhQAzRgNIlEfQ.dll

  • Size

    355KB

  • MD5

    edb09790e89ee476cfb7e66a1f7cad7b

  • SHA1

    f25e69a0447936ec278808bdfb942a4e7125c46c

  • SHA256

    0578160ca0061e8b9b0e61ecb6b057babdeff7580d5a58e0724e7bb4e7e51d93

  • SHA512

    ebd154521917fb876736dcb62ce35517dcf5ccf513a8903544f681ac2d1adacff894dfe3615a1f005e65b8cb738ac47ab83ac85eaa16bfd897a1868e3d16aecb

Malware Config

Extracted

Family

danabot

C2

209.182.218.222

185.227.109.40

185.136.165.128

177.53.120.108

157.123.89.246

238.110.47.221

80.48.35.224

114.236.40.89

33.249.82.114

185.181.8.49

rsa_pubkey.plain

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot x86 payload 5 IoCs

    Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Sets DLL path for service in the registry 2 TTPs
  • Sets service image path in registry 2 TTPs
  • Loads dropped DLL 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 19 IoCs
  • Modifies registry class 7 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
    • Executes dropped EXE
    PID:544
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:2876
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\lEDVIkQSVYhQAzRgNIlEfQ.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3956
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\Temp\lEDVIkQSVYhQAzRgNIlEfQ.dll,#1
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4040
        • C:\Windows\SysWOW64\rundll32.exe
          C:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\lEDVIkQSVYhQAzRgNIlEfQ.dll,f0
          4⤵
          • Blocklisted process makes network request
          • Suspicious use of WriteProcessMemory
          PID:3532
          • C:\Windows\SysWOW64\rundll32.exe
            C:\Windows\system32\\rundll32.exe C:\PROGRA~3\C51C8EAD\F6C1398E.dll,f1 C:\Users\Admin\AppData\Local\Temp\lEDVIkQSVYhQAzRgNIlEfQ.dll@3532
            5⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:3760
            • C:\Windows\system32\rundll32.exe
              C:\Windows\system32\\rundll32.exe C:\PROGRA~3\C51C8EAD\F6C1398E.dll,f1 C:\Users\Admin\AppData\Local\Temp\lEDVIkQSVYhQAzRgNIlEfQ.dll@3532
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:3296
              • C:\Windows\syswow64\rundll32.exe
                C:\Windows\syswow64\rundll32.exe C:\ProgramData\C51C8EAD\CBF14D04.dll,f2 4458A332E9B82FF56A9D22C7A5CF0F74
                7⤵
                • Loads dropped DLL
                • Checks processor information in registry
                • Suspicious use of AdjustPrivilegeToken
                PID:3408
              • C:\Windows\system32\RUNDLL32.EXE
                C:\Windows\system32\RUNDLL32.EXE C:\ProgramData\C51C8EAD\F6C1398E.dll,f2 72D316C1CAD6D793C258DF23A1B24090
                7⤵
                • Loads dropped DLL
                • Checks processor information in registry
                • Suspicious use of AdjustPrivilegeToken
                PID:3400
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 740
          4⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2520
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalService
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3688
    • C:\Windows\syswow64\rundll32.exe
      C:\Windows\syswow64\rundll32.exe C:\ProgramData\C51C8EAD\CBF14D04.dll,f3
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      PID:2900
    • C:\Windows\system32\RUNDLL32.EXE
      C:\Windows\system32\RUNDLL32.EXE C:\ProgramData\C51C8EAD\F6C1398E.dll,f7
      2⤵
      • Loads dropped DLL
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Modifies system certificate store
      PID:3620
    • C:\Windows\syswow64\rundll32.exe
      C:\Windows\syswow64\rundll32.exe C:\ProgramData\C51C8EAD\CBF14D04.dll,f2 B003C6D5EF304D6EC18B5FD767831E49
      2⤵
      • Loads dropped DLL
      • Modifies data under HKEY_USERS
      PID:380

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\C51C8EAD\F6C1398E.dll
    MD5

    dcc8a67295d3b7890bb1cdf21d358435

    SHA1

    f2d9dce8ad0d3be9a9899cfba8f74eeb02911188

    SHA256

    b8ed22b44fca689f73c4ca1a4b3e6d6ee8678215573823410480ba9e5c1de289

    SHA512

    8920b775d9d6d74ffba209228878856a5e39f1bc3cc3606ba9dcb506821d36be3378b2067a32f2ed76da98ae90269d605039acdf3054be90e9d9e20850cd2541

  • C:\ProgramData\C51C8EAD\2670A063
    MD5

    144456111827b52be82c891806af6ab0

    SHA1

    c8d166d5c07c24241de6d4ef9c8aa665177066c4

    SHA256

    8250c2f4ce49c5c70304296feb8c9ffd963f40c0dc49514344f3c59003c124a6

    SHA512

    011fe14b67f6164e0d08366967f85a9b00009dc4004928f2047d1627f620fc7ebdcaf51f5abae95ff820f4501b3c24c8bae29ad9670a9bfce98376bcd8220990

  • C:\ProgramData\C51C8EAD\B7B11B7F\03AC6ECC3749F3C0190A3D1EB8F48332
    MD5

    ad568bb3e7b6ac7f0371a165745b3de9

    SHA1

    248e7b505ab7e91daa809349da29bc40247e8336

    SHA256

    9d85a1b5d1e5e33a84fb979413ad4cd10714089e421d541e5d99a195c23a4e4a

    SHA512

    8bd907fbde7d794ac4ed1493116db85af9451383b2f9c7697bdd0035bd7c97851cc104e6b5931a6bcdaf65564981ccfe0240aaab20277f19aefe37153268ea33

  • C:\ProgramData\C51C8EAD\B7B11B7F\2E35B7D951809866FDF9025B2DFC36A1
    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • C:\ProgramData\C51C8EAD\B7B11B7F\4011997B392D50030E999450CB594B0E
    MD5

    3f8789f9056ac508e525aa59f21a68b5

    SHA1

    61e43e217af04293db1d58da9fe7828e98527eed

    SHA256

    1087de6487d702acd7705ffc73fb16e4617e5b7d04f933014c90f7066c6539a6

    SHA512

    635674570952cbbfe02232097773f3c15032a0f6742f5390ef0c675b9de0181f49b26719c61fa371818551c68bd286228b46afa519c1f7c400901651333852d6

  • C:\ProgramData\C51C8EAD\CBF14D04.dll
    MD5

    6de8aa943211d17c8e114305fdc1a816

    SHA1

    2d4bf9cde7944365845320eb042ad9a4dc4f764d

    SHA256

    d702625e8347914f003f00cfa52b9f7096c52ec86d94b098b3bde533738539bd

    SHA512

    eede0a99331173170164443ef6979520858ec881a33cea3199311c829d7535a8b7fc60229e5aabe16ef3e2d89fe29d5e16b168b8cad9e5055ed415f740649bf4

  • C:\ProgramData\C51C8EAD\DADC2BBD
    MD5

    5fbe44d7da6418c2d13b2499b12aecf8

    SHA1

    401ca81ec9356d72eeac8da55c2b4e5c5136846d

    SHA256

    54bd5441bf76f8e2de43fa7d6219aebaf80b1f9b628385cd2c9c032b0b205248

    SHA512

    8f4a79230f858697a09fbf6daf3cc60ad86c83d6418e83ddfe09058b88c4722d0de66564efb41fd5ad70b86de33eeb79af5dac07c00621b3dc7695e5aef89ee4

  • C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\f79c8a36a2e009013fb6039c707066d2_443e833c-4f92-4bad-9e5e-eec62c6f043e
    MD5

    5282308b60ed631a8bf3a1b96691f11d

    SHA1

    0c5a247adb23957f99ee39c4baa34e442398ee50

    SHA256

    a1f05df54c02e3257170e1b51f85faede482b265e67d909a3833c594865b90f5

    SHA512

    3a1d86f0c4e3a5897b7c201c2e6fcef0efd7e624f185e56aa4c3c1b947d4a6937754681eee5c7fe92ad482e222f56d8bb22163ae544809eb4925b24360c4e5ee

  • \PROGRA~3\C51C8EAD\F6C1398E.dll
    MD5

    dcc8a67295d3b7890bb1cdf21d358435

    SHA1

    f2d9dce8ad0d3be9a9899cfba8f74eeb02911188

    SHA256

    b8ed22b44fca689f73c4ca1a4b3e6d6ee8678215573823410480ba9e5c1de289

    SHA512

    8920b775d9d6d74ffba209228878856a5e39f1bc3cc3606ba9dcb506821d36be3378b2067a32f2ed76da98ae90269d605039acdf3054be90e9d9e20850cd2541

  • \PROGRA~3\C51C8EAD\F6C1398E.dll
    MD5

    dcc8a67295d3b7890bb1cdf21d358435

    SHA1

    f2d9dce8ad0d3be9a9899cfba8f74eeb02911188

    SHA256

    b8ed22b44fca689f73c4ca1a4b3e6d6ee8678215573823410480ba9e5c1de289

    SHA512

    8920b775d9d6d74ffba209228878856a5e39f1bc3cc3606ba9dcb506821d36be3378b2067a32f2ed76da98ae90269d605039acdf3054be90e9d9e20850cd2541

  • \PROGRA~3\C51C8EAD\F6C1398E.dll
    MD5

    dcc8a67295d3b7890bb1cdf21d358435

    SHA1

    f2d9dce8ad0d3be9a9899cfba8f74eeb02911188

    SHA256

    b8ed22b44fca689f73c4ca1a4b3e6d6ee8678215573823410480ba9e5c1de289

    SHA512

    8920b775d9d6d74ffba209228878856a5e39f1bc3cc3606ba9dcb506821d36be3378b2067a32f2ed76da98ae90269d605039acdf3054be90e9d9e20850cd2541

  • \PROGRA~3\C51C8EAD\F6C1398E.dll
    MD5

    dcc8a67295d3b7890bb1cdf21d358435

    SHA1

    f2d9dce8ad0d3be9a9899cfba8f74eeb02911188

    SHA256

    b8ed22b44fca689f73c4ca1a4b3e6d6ee8678215573823410480ba9e5c1de289

    SHA512

    8920b775d9d6d74ffba209228878856a5e39f1bc3cc3606ba9dcb506821d36be3378b2067a32f2ed76da98ae90269d605039acdf3054be90e9d9e20850cd2541

  • \PROGRA~3\C51C8EAD\F6C1398E.dll
    MD5

    dcc8a67295d3b7890bb1cdf21d358435

    SHA1

    f2d9dce8ad0d3be9a9899cfba8f74eeb02911188

    SHA256

    b8ed22b44fca689f73c4ca1a4b3e6d6ee8678215573823410480ba9e5c1de289

    SHA512

    8920b775d9d6d74ffba209228878856a5e39f1bc3cc3606ba9dcb506821d36be3378b2067a32f2ed76da98ae90269d605039acdf3054be90e9d9e20850cd2541

  • \PROGRA~3\C51C8EAD\F6C1398E.dll
    MD5

    dcc8a67295d3b7890bb1cdf21d358435

    SHA1

    f2d9dce8ad0d3be9a9899cfba8f74eeb02911188

    SHA256

    b8ed22b44fca689f73c4ca1a4b3e6d6ee8678215573823410480ba9e5c1de289

    SHA512

    8920b775d9d6d74ffba209228878856a5e39f1bc3cc3606ba9dcb506821d36be3378b2067a32f2ed76da98ae90269d605039acdf3054be90e9d9e20850cd2541

  • \PROGRA~3\C51C8EAD\F6C1398E.dll
    MD5

    dcc8a67295d3b7890bb1cdf21d358435

    SHA1

    f2d9dce8ad0d3be9a9899cfba8f74eeb02911188

    SHA256

    b8ed22b44fca689f73c4ca1a4b3e6d6ee8678215573823410480ba9e5c1de289

    SHA512

    8920b775d9d6d74ffba209228878856a5e39f1bc3cc3606ba9dcb506821d36be3378b2067a32f2ed76da98ae90269d605039acdf3054be90e9d9e20850cd2541

  • \ProgramData\C51C8EAD\CBF14D04.dll
    MD5

    6de8aa943211d17c8e114305fdc1a816

    SHA1

    2d4bf9cde7944365845320eb042ad9a4dc4f764d

    SHA256

    d702625e8347914f003f00cfa52b9f7096c52ec86d94b098b3bde533738539bd

    SHA512

    eede0a99331173170164443ef6979520858ec881a33cea3199311c829d7535a8b7fc60229e5aabe16ef3e2d89fe29d5e16b168b8cad9e5055ed415f740649bf4

  • \ProgramData\C51C8EAD\CBF14D04.dll
    MD5

    6de8aa943211d17c8e114305fdc1a816

    SHA1

    2d4bf9cde7944365845320eb042ad9a4dc4f764d

    SHA256

    d702625e8347914f003f00cfa52b9f7096c52ec86d94b098b3bde533738539bd

    SHA512

    eede0a99331173170164443ef6979520858ec881a33cea3199311c829d7535a8b7fc60229e5aabe16ef3e2d89fe29d5e16b168b8cad9e5055ed415f740649bf4

  • \ProgramData\C51C8EAD\CBF14D04.dll
    MD5

    6de8aa943211d17c8e114305fdc1a816

    SHA1

    2d4bf9cde7944365845320eb042ad9a4dc4f764d

    SHA256

    d702625e8347914f003f00cfa52b9f7096c52ec86d94b098b3bde533738539bd

    SHA512

    eede0a99331173170164443ef6979520858ec881a33cea3199311c829d7535a8b7fc60229e5aabe16ef3e2d89fe29d5e16b168b8cad9e5055ed415f740649bf4

  • \ProgramData\C51C8EAD\CBF14D04.dll
    MD5

    6de8aa943211d17c8e114305fdc1a816

    SHA1

    2d4bf9cde7944365845320eb042ad9a4dc4f764d

    SHA256

    d702625e8347914f003f00cfa52b9f7096c52ec86d94b098b3bde533738539bd

    SHA512

    eede0a99331173170164443ef6979520858ec881a33cea3199311c829d7535a8b7fc60229e5aabe16ef3e2d89fe29d5e16b168b8cad9e5055ed415f740649bf4

  • memory/380-52-0x0000000004A10000-0x0000000004A11000-memory.dmp
    Filesize

    4KB

  • memory/380-176-0x0000000004A10000-0x0000000004A11000-memory.dmp
    Filesize

    4KB

  • memory/380-136-0x0000000004A10000-0x0000000004A11000-memory.dmp
    Filesize

    4KB

  • memory/380-76-0x0000000004A10000-0x0000000004A11000-memory.dmp
    Filesize

    4KB

  • memory/380-53-0x0000000004A10000-0x0000000004A11000-memory.dmp
    Filesize

    4KB

  • memory/380-165-0x0000000004A10000-0x0000000004A11000-memory.dmp
    Filesize

    4KB

  • memory/380-138-0x0000000004A10000-0x0000000004A11000-memory.dmp
    Filesize

    4KB

  • memory/380-147-0x0000000004A10000-0x0000000004A11000-memory.dmp
    Filesize

    4KB

  • memory/380-50-0x0000000004A10000-0x0000000004A11000-memory.dmp
    Filesize

    4KB

  • memory/380-49-0x0000000005210000-0x0000000005211000-memory.dmp
    Filesize

    4KB

  • memory/380-48-0x0000000004A10000-0x0000000004A11000-memory.dmp
    Filesize

    4KB

  • memory/380-44-0x0000000003D60000-0x0000000004606000-memory.dmp
    Filesize

    8.6MB

  • memory/380-41-0x00000000038E0000-0x0000000003A6E000-memory.dmp
    Filesize

    1.6MB

  • memory/380-137-0x0000000005210000-0x0000000005211000-memory.dmp
    Filesize

    4KB

  • memory/544-29-0x000001E1579D0000-0x000001E157B10000-memory.dmp
    Filesize

    1.2MB

  • memory/544-26-0x000001E157750000-0x000001E1579C9000-memory.dmp
    Filesize

    2.5MB

  • memory/544-28-0x000001E1579D0000-0x000001E157B10000-memory.dmp
    Filesize

    1.2MB

  • memory/2520-0-0x00000000042D0000-0x00000000042D1000-memory.dmp
    Filesize

    4KB

  • memory/2520-1-0x00000000046D0000-0x00000000046D1000-memory.dmp
    Filesize

    4KB

  • memory/2520-2-0x0000000004AC0000-0x0000000004AC1000-memory.dmp
    Filesize

    4KB

  • memory/2876-36-0x0000000006E10000-0x0000000007089000-memory.dmp
    Filesize

    2.5MB

  • memory/2876-37-0x0000000005440000-0x0000000005580000-memory.dmp
    Filesize

    1.2MB

  • memory/2876-38-0x0000000005440000-0x0000000005580000-memory.dmp
    Filesize

    1.2MB

  • memory/2900-24-0x0000000004840000-0x00000000049CE000-memory.dmp
    Filesize

    1.6MB

  • memory/3296-7-0x0000021895EF0000-0x0000021896169000-memory.dmp
    Filesize

    2.5MB

  • memory/3400-12-0x0000025A5A0A0000-0x0000025A5A319000-memory.dmp
    Filesize

    2.5MB

  • memory/3400-13-0x0000025A5A620000-0x0000025A5A98D000-memory.dmp
    Filesize

    3.4MB

  • memory/3408-11-0x00000000048C0000-0x0000000004A4E000-memory.dmp
    Filesize

    1.6MB

  • memory/3408-15-0x0000000004DF0000-0x00000000052A6000-memory.dmp
    Filesize

    4.7MB

  • memory/3620-30-0x000001BECEF40000-0x000001BECF1B9000-memory.dmp
    Filesize

    2.5MB

  • memory/3688-236-0x0000019316340000-0x0000019316341000-memory.dmp
    Filesize

    4KB

  • memory/3688-247-0x0000019316B40000-0x0000019316B41000-memory.dmp
    Filesize

    4KB

  • memory/3688-129-0x0000019316340000-0x0000019316341000-memory.dmp
    Filesize

    4KB

  • memory/3688-131-0x0000019316B40000-0x0000019316B41000-memory.dmp
    Filesize

    4KB

  • memory/3688-21-0x0000019316A00000-0x0000019316A01000-memory.dmp
    Filesize

    4KB

  • memory/3688-18-0x0000019316200000-0x0000019316201000-memory.dmp
    Filesize

    4KB

  • memory/3688-16-0x0000019315B70000-0x0000019315DE9000-memory.dmp
    Filesize

    2.5MB

  • memory/3688-63-0x0000019316B40000-0x0000019316B41000-memory.dmp
    Filesize

    4KB

  • memory/3688-61-0x0000019316340000-0x0000019316341000-memory.dmp
    Filesize

    4KB

  • memory/3688-47-0x0000019316B40000-0x0000019316B41000-memory.dmp
    Filesize

    4KB

  • memory/3688-191-0x0000019316B40000-0x0000019316B41000-memory.dmp
    Filesize

    4KB

  • memory/3688-221-0x0000019316340000-0x0000019316341000-memory.dmp
    Filesize

    4KB

  • memory/3688-31-0x0000019316340000-0x0000019316341000-memory.dmp
    Filesize

    4KB

  • memory/3688-224-0x0000019316340000-0x0000019316341000-memory.dmp
    Filesize

    4KB

  • memory/3688-225-0x0000019316B40000-0x0000019316B41000-memory.dmp
    Filesize

    4KB

  • memory/3688-226-0x0000019316340000-0x0000019316341000-memory.dmp
    Filesize

    4KB

  • memory/3688-229-0x0000019316B40000-0x0000019316B41000-memory.dmp
    Filesize

    4KB

  • memory/3688-230-0x0000019316340000-0x0000019316341000-memory.dmp
    Filesize

    4KB

  • memory/3688-231-0x0000019316B40000-0x0000019316B41000-memory.dmp
    Filesize

    4KB

  • memory/3688-232-0x0000019316340000-0x0000019316341000-memory.dmp
    Filesize

    4KB

  • memory/3688-233-0x0000019316B40000-0x0000019316B41000-memory.dmp
    Filesize

    4KB

  • memory/3688-234-0x0000019316340000-0x0000019316341000-memory.dmp
    Filesize

    4KB

  • memory/3688-235-0x0000019316B40000-0x0000019316B41000-memory.dmp
    Filesize

    4KB

  • memory/3688-34-0x0000019316340000-0x0000019316341000-memory.dmp
    Filesize

    4KB

  • memory/3688-237-0x0000019316B40000-0x0000019316B41000-memory.dmp
    Filesize

    4KB

  • memory/3688-238-0x0000019316340000-0x0000019316341000-memory.dmp
    Filesize

    4KB

  • memory/3688-239-0x0000019316B40000-0x0000019316B41000-memory.dmp
    Filesize

    4KB

  • memory/3688-243-0x0000019316B40000-0x0000019316B41000-memory.dmp
    Filesize

    4KB

  • memory/3688-244-0x0000019316340000-0x0000019316341000-memory.dmp
    Filesize

    4KB

  • memory/3688-245-0x0000019316B40000-0x0000019316B41000-memory.dmp
    Filesize

    4KB

  • memory/3688-246-0x0000019316340000-0x0000019316341000-memory.dmp
    Filesize

    4KB

  • memory/3688-23-0x0000019316200000-0x0000019316201000-memory.dmp
    Filesize

    4KB

  • memory/3688-249-0x0000019316B40000-0x0000019316B41000-memory.dmp
    Filesize

    4KB

  • memory/3688-251-0x0000019316B40000-0x0000019316B41000-memory.dmp
    Filesize

    4KB

  • memory/3688-250-0x0000019316340000-0x0000019316341000-memory.dmp
    Filesize

    4KB

  • memory/3688-253-0x0000019316B40000-0x0000019316B41000-memory.dmp
    Filesize

    4KB

  • memory/3688-254-0x0000019316340000-0x0000019316341000-memory.dmp
    Filesize

    4KB

  • memory/3688-255-0x0000019316B40000-0x0000019316B41000-memory.dmp
    Filesize

    4KB

  • memory/3688-257-0x0000019316B40000-0x0000019316B41000-memory.dmp
    Filesize

    4KB

  • memory/3688-258-0x0000019316340000-0x0000019316341000-memory.dmp
    Filesize

    4KB

  • memory/3688-259-0x0000019316B40000-0x0000019316B41000-memory.dmp
    Filesize

    4KB

  • memory/3688-260-0x0000019316340000-0x0000019316341000-memory.dmp
    Filesize

    4KB

  • memory/3688-262-0x0000019316340000-0x0000019316341000-memory.dmp
    Filesize

    4KB

  • memory/3688-263-0x0000019316B40000-0x0000019316B41000-memory.dmp
    Filesize

    4KB

  • memory/3688-266-0x0000019316340000-0x0000019316341000-memory.dmp
    Filesize

    4KB

  • memory/3688-267-0x0000019316B40000-0x0000019316B41000-memory.dmp
    Filesize

    4KB

  • memory/3688-278-0x0000019316340000-0x0000019316341000-memory.dmp
    Filesize

    4KB

  • memory/3688-43-0x0000019316B40000-0x0000019316B41000-memory.dmp
    Filesize

    4KB

  • memory/3688-32-0x0000019316B40000-0x0000019316B41000-memory.dmp
    Filesize

    4KB

  • memory/3688-33-0x0000019316340000-0x0000019316341000-memory.dmp
    Filesize

    4KB

  • memory/3688-289-0x0000019316340000-0x0000019316341000-memory.dmp
    Filesize

    4KB

  • memory/3688-290-0x0000019316B40000-0x0000019316B41000-memory.dmp
    Filesize

    4KB

  • memory/3688-291-0x0000019316340000-0x0000019316341000-memory.dmp
    Filesize

    4KB

  • memory/3688-292-0x0000019316B40000-0x0000019316B41000-memory.dmp
    Filesize

    4KB

  • memory/3688-293-0x0000019316340000-0x0000019316341000-memory.dmp
    Filesize

    4KB

  • memory/3688-295-0x0000019316340000-0x0000019316341000-memory.dmp
    Filesize

    4KB

  • memory/3688-296-0x0000019316B40000-0x0000019316B41000-memory.dmp
    Filesize

    4KB

  • memory/3688-304-0x0000019316B40000-0x0000019316B41000-memory.dmp
    Filesize

    4KB

  • memory/3688-305-0x0000019316340000-0x0000019316341000-memory.dmp
    Filesize

    4KB

  • memory/3688-319-0x0000019316340000-0x0000019316341000-memory.dmp
    Filesize

    4KB

  • memory/3688-320-0x0000019316B40000-0x0000019316B41000-memory.dmp
    Filesize

    4KB

  • memory/3688-324-0x0000019316B40000-0x0000019316B41000-memory.dmp
    Filesize

    4KB

  • memory/3688-337-0x0000019316340000-0x0000019316341000-memory.dmp
    Filesize

    4KB