Analysis

  • max time kernel
    20s
  • max time network
    165s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    18-11-2020 16:58

General

Malware Config

Extracted

Family

formbook

Version

4.0

C2

http://www.worstig.com/w9z/

Decoy

crazzysex.com

hanferd.com

gteesrd.com

bayfrontbabyplace.com

jicuiquan.net

relationshiplink.net

ohchacyberphoto.com

kauegimenes.com

powerful-seldom.com

ketotoken.com

make-money-online-success.com

redgoldcollection.com

hannan-football.com

hamptondc.com

vllii.com

aa8520.com

platform35markethall.com

larozeimmo.com

oligopoly.net

llhak.info

Extracted

Family

gozi_rm3

Attributes
  • exe_type

    loader

Extracted

Family

gozi_rm3

Botnet

86920224

C2

https://sibelikinciel.xyz

Attributes
  • build

    300869

  • exe_type

    loader

  • server_id

    12

  • url_path

    index.htm

rsa_pubkey.plain
serpent.plain

Extracted

Family

danabot

C2

92.204.160.54

2.56.213.179

45.153.186.47

93.115.21.29

185.45.193.50

193.34.166.247

rsa_pubkey.plain

Extracted

Family

formbook

Version

4.1

C2

http://www.norjax.com/app/

Decoy

niresandcard.com

bonusscommesseonline.com

mezhyhirya.com

paklfz.com

bespokewomensuits.com

smarteralarm.info

munespansiyon.com

pmtradehouse.com

hotmobile-uk.com

ntdao.com

zohariaz.com

www145123.com

oceanstateofstyle.com

palermofelicissima.info

yourkinas.com

pthwheel.net

vfmagent.com

xn--3v0bw66b.com

comsystematrisk.win

on9.party

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • CoreEntity .NET Packer ⋅ 1 IoCs

    A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot x86 payload ⋅ 6 IoCs

    Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Gozi RM3

    A heavily modified version of Gozi using RM3 loader.

  • AgentTesla Payload ⋅ 15 IoCs
  • CryptOne packer ⋅ 2 IoCs

    Detects CryptOne packer defined in NCC blogpost.

  • Formbook Payload ⋅ 8 IoCs
  • ReZer0 packer ⋅ 1 IoCs

    Detects ReZer0, a packer with multiple versions used in various campaigns.

  • Executes dropped EXE ⋅ 12 IoCs
  • Obfuscated with Agile.Net obfuscator ⋅ 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Suspicious use of SetThreadContext ⋅ 3 IoCs
  • Enumerates physical storage devices ⋅ 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam ⋅ 11 IoCs
  • Suspicious behavior: EnumeratesProcesses ⋅ 5 IoCs
  • Suspicious behavior: MapViewOfSection ⋅ 6 IoCs
  • Suspicious use of AdjustPrivilegeToken ⋅ 4 IoCs
  • Suspicious use of SetWindowsHookEx ⋅ 3 IoCs
  • Suspicious use of WriteProcessMemory ⋅ 63 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    Suspicious use of AdjustPrivilegeToken
    Suspicious use of WriteProcessMemory
    PID:1236
    • C:\Users\Admin\AppData\Local\Temp\31.exe
      "C:\Users\Admin\AppData\Local\Temp\31.exe"
      Suspicious use of WriteProcessMemory
      PID:1084
      • C:\Windows\system32\cmd.exe
        "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\8B3F.tmp\8B40.tmp\8B41.bat C:\Users\Admin\AppData\Local\Temp\31.exe"
        Suspicious use of WriteProcessMemory
        PID:1948
        • C:\Program Files\Java\jre7\bin\javaw.exe
          "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\1.jar"
          PID:1444
        • C:\Users\Admin\AppData\Roaming\2.exe
          C:\Users\Admin\AppData\Roaming\2.exe
          Executes dropped EXE
          Suspicious use of SetThreadContext
          Suspicious behavior: CmdExeWriteProcessMemorySpam
          Suspicious behavior: EnumeratesProcesses
          Suspicious behavior: MapViewOfSection
          Suspicious use of WriteProcessMemory
          PID:1020
          • C:\Users\Admin\AppData\Roaming\2.exe
            C:\Users\Admin\AppData\Roaming\2.exe
            Executes dropped EXE
            Suspicious use of SetThreadContext
            Suspicious behavior: EnumeratesProcesses
            Suspicious behavior: MapViewOfSection
            Suspicious use of AdjustPrivilegeToken
            PID:568
        • C:\Users\Admin\AppData\Roaming\3.exe
          C:\Users\Admin\AppData\Roaming\3.exe
          Executes dropped EXE
          Suspicious behavior: CmdExeWriteProcessMemorySpam
          Suspicious use of SetWindowsHookEx
          PID:1664
        • C:\Users\Admin\AppData\Roaming\4.exe
          C:\Users\Admin\AppData\Roaming\4.exe
          Executes dropped EXE
          Suspicious behavior: CmdExeWriteProcessMemorySpam
          PID:668
        • C:\Users\Admin\AppData\Roaming\5.exe
          C:\Users\Admin\AppData\Roaming\5.exe
          Executes dropped EXE
          Suspicious behavior: CmdExeWriteProcessMemorySpam
          Suspicious use of AdjustPrivilegeToken
          Suspicious use of SetWindowsHookEx
          PID:1460
        • C:\Users\Admin\AppData\Roaming\6.exe
          C:\Users\Admin\AppData\Roaming\6.exe
          Executes dropped EXE
          Suspicious behavior: CmdExeWriteProcessMemorySpam
          PID:908
        • C:\Users\Admin\AppData\Roaming\7.exe
          C:\Users\Admin\AppData\Roaming\7.exe
          Executes dropped EXE
          Suspicious behavior: CmdExeWriteProcessMemorySpam
          Suspicious use of SetWindowsHookEx
          PID:428
        • C:\Users\Admin\AppData\Roaming\8.exe
          C:\Users\Admin\AppData\Roaming\8.exe
          Executes dropped EXE
          Suspicious behavior: CmdExeWriteProcessMemorySpam
          PID:812
        • C:\Users\Admin\AppData\Roaming\9.exe
          C:\Users\Admin\AppData\Roaming\9.exe
          Executes dropped EXE
          Suspicious behavior: CmdExeWriteProcessMemorySpam
          PID:1164
        • C:\Users\Admin\AppData\Roaming\10.exe
          C:\Users\Admin\AppData\Roaming\10.exe
          Executes dropped EXE
          Suspicious behavior: CmdExeWriteProcessMemorySpam
          PID:476
        • C:\Users\Admin\AppData\Roaming\11.exe
          C:\Users\Admin\AppData\Roaming\11.exe
          Executes dropped EXE
          Suspicious behavior: CmdExeWriteProcessMemorySpam
          PID:1600
        • C:\Users\Admin\AppData\Roaming\12.exe
          C:\Users\Admin\AppData\Roaming\12.exe
          Executes dropped EXE
          Suspicious behavior: CmdExeWriteProcessMemorySpam
          PID:1720
    • C:\Windows\SysWOW64\help.exe
      "C:\Windows\SysWOW64\help.exe"
      Suspicious use of SetThreadContext
      Suspicious behavior: EnumeratesProcesses
      Suspicious behavior: MapViewOfSection
      Suspicious use of AdjustPrivilegeToken
      Suspicious use of WriteProcessMemory
      PID:340
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Roaming\2.exe"
        PID:1668

Network

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Defense Evasion

          Execution

            Exfiltration

              Impact

                Initial Access

                  Lateral Movement

                    Persistence

                      Privilege Escalation

                        Replay Monitor

                        00:00 00:00

                        Downloads

                        • C:\Program Files (x86)\Zdnilg\autochkujotnv.exe
                        • C:\Program Files (x86)\Zdnilg\autochkujotnv.exe
                        • C:\Users\Admin\AppData\Local\Temp\8B3F.tmp\8B40.tmp\8B41.bat
                        • C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe
                        • C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe
                        • C:\Users\Admin\AppData\Local\Temp\tmp4089.tmp
                        • C:\Users\Admin\AppData\Local\Temp\tmpA093.tmp
                        • C:\Users\Admin\AppData\Roaming\1.jar
                        • C:\Users\Admin\AppData\Roaming\10.exe
                        • C:\Users\Admin\AppData\Roaming\10.exe
                        • C:\Users\Admin\AppData\Roaming\11.exe
                        • C:\Users\Admin\AppData\Roaming\11.exe
                        • C:\Users\Admin\AppData\Roaming\11.exe
                        • C:\Users\Admin\AppData\Roaming\12.exe
                        • C:\Users\Admin\AppData\Roaming\12.exe
                        • C:\Users\Admin\AppData\Roaming\2.exe
                        • C:\Users\Admin\AppData\Roaming\2.exe
                        • C:\Users\Admin\AppData\Roaming\2.exe
                        • C:\Users\Admin\AppData\Roaming\3.exe
                        • C:\Users\Admin\AppData\Roaming\3.exe
                        • C:\Users\Admin\AppData\Roaming\3.exe
                        • C:\Users\Admin\AppData\Roaming\4.dll
                          MD5

                          647d2e78c8b882a4d308fc6e89812b0b

                          SHA1

                          b5cdc337cb41667409269a56c3092e1bd1917974

                          SHA256

                          da584a6b77aa53c232193a4757975aac5d5121bdc5266096e746432c453502c3

                          SHA512

                          a01641aba2c2a02932c18e25dafb8058a1d9e11cd4f25d17a06731e39c7738614b833b856e7fc26ad0100212772d57dbccfd5a6297b6cb21fa4dec48f1aff1bb

                        • C:\Users\Admin\AppData\Roaming\4.exe
                        • C:\Users\Admin\AppData\Roaming\4.exe
                        • C:\Users\Admin\AppData\Roaming\5.exe
                        • C:\Users\Admin\AppData\Roaming\5.exe
                        • C:\Users\Admin\AppData\Roaming\6.exe
                          MD5

                          cf04c482d91c7174616fb8e83288065a

                          SHA1

                          6444eb10ec9092826d712c1efad73e74c2adae14

                          SHA256

                          7b01d36ac9a77abfa6a0ddbf27d630effae555aac9ae75b051c6eedaf18d1dcf

                          SHA512

                          3eca1e17e698c427bc916465526f61caee356d7586836b022f573c33a6533ce4b4b0f3fbd05cc2b7b44568e814121854fdf82480757f02d925e293f7d92a2af6

                        • C:\Users\Admin\AppData\Roaming\6.exe
                          MD5

                          cf04c482d91c7174616fb8e83288065a

                          SHA1

                          6444eb10ec9092826d712c1efad73e74c2adae14

                          SHA256

                          7b01d36ac9a77abfa6a0ddbf27d630effae555aac9ae75b051c6eedaf18d1dcf

                          SHA512

                          3eca1e17e698c427bc916465526f61caee356d7586836b022f573c33a6533ce4b4b0f3fbd05cc2b7b44568e814121854fdf82480757f02d925e293f7d92a2af6

                        • C:\Users\Admin\AppData\Roaming\7.exe
                        • C:\Users\Admin\AppData\Roaming\7.exe
                        • C:\Users\Admin\AppData\Roaming\8.exe
                          MD5

                          dea5598aaf3e9dcc3073ba73d972ab17

                          SHA1

                          51da8356e81c5acff3c876dffbf52195fe87d97f

                          SHA256

                          8ec9516ac0a765c28adfe04c132619170e986df07b1ea541426be124fb7cfd2c

                          SHA512

                          a6c674ba3d510120a1d163be7e7638f616eedb15af5653b0952e63b7fd4c2672fafc9638ab7795e76b7f07d995196437d6c35e5b8814e9ad866ea903f620e81e

                        • C:\Users\Admin\AppData\Roaming\8.exe
                          MD5

                          dea5598aaf3e9dcc3073ba73d972ab17

                          SHA1

                          51da8356e81c5acff3c876dffbf52195fe87d97f

                          SHA256

                          8ec9516ac0a765c28adfe04c132619170e986df07b1ea541426be124fb7cfd2c

                          SHA512

                          a6c674ba3d510120a1d163be7e7638f616eedb15af5653b0952e63b7fd4c2672fafc9638ab7795e76b7f07d995196437d6c35e5b8814e9ad866ea903f620e81e

                        • C:\Users\Admin\AppData\Roaming\9.exe
                        • C:\Users\Admin\AppData\Roaming\9.exe
                        • C:\Users\Admin\AppData\Roaming\9.exe
                        • C:\Users\Admin\AppData\Roaming\J-96T9R9\J-9logim.jpeg
                        • C:\Users\Admin\AppData\Roaming\J-96T9R9\J-9logrf.ini
                        • C:\Users\Admin\AppData\Roaming\J-96T9R9\J-9logri.ini
                        • C:\Users\Admin\AppData\Roaming\J-96T9R9\J-9logrv.ini
                        • C:\Users\Admin\AppData\Roaming\feeed.exe
                          MD5

                          dea5598aaf3e9dcc3073ba73d972ab17

                          SHA1

                          51da8356e81c5acff3c876dffbf52195fe87d97f

                          SHA256

                          8ec9516ac0a765c28adfe04c132619170e986df07b1ea541426be124fb7cfd2c

                          SHA512

                          a6c674ba3d510120a1d163be7e7638f616eedb15af5653b0952e63b7fd4c2672fafc9638ab7795e76b7f07d995196437d6c35e5b8814e9ad866ea903f620e81e

                        • C:\Users\Admin\AppData\Roaming\feeed.exe
                          MD5

                          dea5598aaf3e9dcc3073ba73d972ab17

                          SHA1

                          51da8356e81c5acff3c876dffbf52195fe87d97f

                          SHA256

                          8ec9516ac0a765c28adfe04c132619170e986df07b1ea541426be124fb7cfd2c

                          SHA512

                          a6c674ba3d510120a1d163be7e7638f616eedb15af5653b0952e63b7fd4c2672fafc9638ab7795e76b7f07d995196437d6c35e5b8814e9ad866ea903f620e81e

                        • \Users\Admin\AppData\Local\Temp\InstallUtil.exe
                        • \Users\Admin\AppData\Roaming\10.exe
                        • \Users\Admin\AppData\Roaming\10.exe
                        • \Users\Admin\AppData\Roaming\11.exe
                        • \Users\Admin\AppData\Roaming\11.exe
                        • \Users\Admin\AppData\Roaming\12.exe
                        • \Users\Admin\AppData\Roaming\12.exe
                        • \Users\Admin\AppData\Roaming\3.exe
                        • \Users\Admin\AppData\Roaming\3.exe
                        • \Users\Admin\AppData\Roaming\4.dll
                          MD5

                          647d2e78c8b882a4d308fc6e89812b0b

                          SHA1

                          b5cdc337cb41667409269a56c3092e1bd1917974

                          SHA256

                          da584a6b77aa53c232193a4757975aac5d5121bdc5266096e746432c453502c3

                          SHA512

                          a01641aba2c2a02932c18e25dafb8058a1d9e11cd4f25d17a06731e39c7738614b833b856e7fc26ad0100212772d57dbccfd5a6297b6cb21fa4dec48f1aff1bb

                        • \Users\Admin\AppData\Roaming\4.dll
                          MD5

                          647d2e78c8b882a4d308fc6e89812b0b

                          SHA1

                          b5cdc337cb41667409269a56c3092e1bd1917974

                          SHA256

                          da584a6b77aa53c232193a4757975aac5d5121bdc5266096e746432c453502c3

                          SHA512

                          a01641aba2c2a02932c18e25dafb8058a1d9e11cd4f25d17a06731e39c7738614b833b856e7fc26ad0100212772d57dbccfd5a6297b6cb21fa4dec48f1aff1bb

                        • \Users\Admin\AppData\Roaming\4.dll
                          MD5

                          647d2e78c8b882a4d308fc6e89812b0b

                          SHA1

                          b5cdc337cb41667409269a56c3092e1bd1917974

                          SHA256

                          da584a6b77aa53c232193a4757975aac5d5121bdc5266096e746432c453502c3

                          SHA512

                          a01641aba2c2a02932c18e25dafb8058a1d9e11cd4f25d17a06731e39c7738614b833b856e7fc26ad0100212772d57dbccfd5a6297b6cb21fa4dec48f1aff1bb

                        • \Users\Admin\AppData\Roaming\4.dll
                          MD5

                          647d2e78c8b882a4d308fc6e89812b0b

                          SHA1

                          b5cdc337cb41667409269a56c3092e1bd1917974

                          SHA256

                          da584a6b77aa53c232193a4757975aac5d5121bdc5266096e746432c453502c3

                          SHA512

                          a01641aba2c2a02932c18e25dafb8058a1d9e11cd4f25d17a06731e39c7738614b833b856e7fc26ad0100212772d57dbccfd5a6297b6cb21fa4dec48f1aff1bb

                        • \Users\Admin\AppData\Roaming\4.dll
                          MD5

                          647d2e78c8b882a4d308fc6e89812b0b

                          SHA1

                          b5cdc337cb41667409269a56c3092e1bd1917974

                          SHA256

                          da584a6b77aa53c232193a4757975aac5d5121bdc5266096e746432c453502c3

                          SHA512

                          a01641aba2c2a02932c18e25dafb8058a1d9e11cd4f25d17a06731e39c7738614b833b856e7fc26ad0100212772d57dbccfd5a6297b6cb21fa4dec48f1aff1bb

                        • \Users\Admin\AppData\Roaming\5.exe
                        • \Users\Admin\AppData\Roaming\5.exe
                        • \Users\Admin\AppData\Roaming\7.exe
                        • \Users\Admin\AppData\Roaming\7.exe
                        • \Users\Admin\AppData\Roaming\8.exe
                          MD5

                          dea5598aaf3e9dcc3073ba73d972ab17

                          SHA1

                          51da8356e81c5acff3c876dffbf52195fe87d97f

                          SHA256

                          8ec9516ac0a765c28adfe04c132619170e986df07b1ea541426be124fb7cfd2c

                          SHA512

                          a6c674ba3d510120a1d163be7e7638f616eedb15af5653b0952e63b7fd4c2672fafc9638ab7795e76b7f07d995196437d6c35e5b8814e9ad866ea903f620e81e

                        • \Users\Admin\AppData\Roaming\8.exe
                          MD5

                          dea5598aaf3e9dcc3073ba73d972ab17

                          SHA1

                          51da8356e81c5acff3c876dffbf52195fe87d97f

                          SHA256

                          8ec9516ac0a765c28adfe04c132619170e986df07b1ea541426be124fb7cfd2c

                          SHA512

                          a6c674ba3d510120a1d163be7e7638f616eedb15af5653b0952e63b7fd4c2672fafc9638ab7795e76b7f07d995196437d6c35e5b8814e9ad866ea903f620e81e

                        • \Users\Admin\AppData\Roaming\9.exe
                        • \Users\Admin\AppData\Roaming\9.exe
                        • \Users\Admin\AppData\Roaming\feeed.exe
                          MD5

                          dea5598aaf3e9dcc3073ba73d972ab17

                          SHA1

                          51da8356e81c5acff3c876dffbf52195fe87d97f

                          SHA256

                          8ec9516ac0a765c28adfe04c132619170e986df07b1ea541426be124fb7cfd2c

                          SHA512

                          a6c674ba3d510120a1d163be7e7638f616eedb15af5653b0952e63b7fd4c2672fafc9638ab7795e76b7f07d995196437d6c35e5b8814e9ad866ea903f620e81e

                        • memory/340-66-0x0000000001840000-0x00000000019CD000-memory.dmp
                        • memory/340-57-0x0000000000000000-mapping.dmp
                        • memory/340-116-0x0000000002F60000-0x0000000003035000-memory.dmp
                        • memory/340-152-0x00000000031B0000-0x000000000331E000-memory.dmp
                        • memory/340-127-0x0000000002F60000-0x0000000003035000-memory.dmp
                        • memory/340-58-0x0000000000950000-0x0000000000956000-memory.dmp
                        • memory/428-29-0x0000000000000000-mapping.dmp
                        • memory/428-30-0x0000000000000000-mapping.dmp
                        • memory/476-42-0x0000000000000000-mapping.dmp
                        • memory/476-43-0x0000000000000000-mapping.dmp
                        • memory/476-63-0x0000000002F0A000-0x0000000002F0B000-memory.dmp
                        • memory/476-64-0x00000000031A0000-0x00000000031B1000-memory.dmp
                        • memory/568-15-0x0000000000400000-0x000000000042D000-memory.dmp
                        • memory/568-16-0x000000000041E2D0-mapping.dmp
                        • memory/652-80-0x0000000000000000-mapping.dmp
                        • memory/668-13-0x0000000000000000-mapping.dmp
                        • memory/668-14-0x0000000000000000-mapping.dmp
                        • memory/668-60-0x0000000003220000-0x0000000003497000-memory.dmp
                        • memory/668-65-0x00000000034A0000-0x00000000034B1000-memory.dmp
                        • memory/812-113-0x0000000000930000-0x0000000000932000-memory.dmp
                        • memory/812-82-0x0000000000DE0000-0x0000000000DE1000-memory.dmp
                        • memory/812-34-0x0000000000000000-mapping.dmp
                        • memory/812-61-0x0000000072E90000-0x000000007357E000-memory.dmp
                        • memory/812-33-0x0000000000000000-mapping.dmp
                        • memory/812-109-0x0000000000750000-0x000000000075F000-memory.dmp
                        • memory/812-114-0x0000000000A40000-0x0000000000A42000-memory.dmp
                        • memory/812-111-0x0000000000760000-0x0000000000762000-memory.dmp
                        • memory/908-56-0x0000000000280000-0x0000000000290000-memory.dmp
                        • memory/908-25-0x0000000000000000-mapping.dmp
                        • memory/908-24-0x0000000000000000-mapping.dmp
                        • memory/1020-4-0x0000000000000000-mapping.dmp
                        • memory/1020-5-0x0000000000000000-mapping.dmp
                        • memory/1164-110-0x0000000004CF0000-0x0000000004D43000-memory.dmp
                        • memory/1164-108-0x0000000000670000-0x0000000000672000-memory.dmp
                        • memory/1164-39-0x0000000000000000-mapping.dmp
                        • memory/1164-38-0x0000000000000000-mapping.dmp
                        • memory/1164-81-0x0000000000F70000-0x0000000000F71000-memory.dmp
                        • memory/1164-62-0x0000000072E90000-0x000000007357E000-memory.dmp
                        • memory/1444-2-0x0000000000000000-mapping.dmp
                        • memory/1460-21-0x0000000000000000-mapping.dmp
                        • memory/1460-22-0x0000000000000000-mapping.dmp
                        • memory/1600-46-0x0000000000000000-mapping.dmp
                        • memory/1600-47-0x0000000000000000-mapping.dmp
                        • memory/1652-71-0x0000000000000000-mapping.dmp
                        • memory/1664-9-0x0000000000000000-mapping.dmp
                        • memory/1664-10-0x0000000000000000-mapping.dmp
                        • memory/1668-59-0x0000000000000000-mapping.dmp
                        • memory/1720-50-0x0000000000000000-mapping.dmp
                        • memory/1720-51-0x0000000000000000-mapping.dmp
                        • memory/1812-176-0x0000000000000000-mapping.dmp
                        • memory/1948-0-0x0000000000000000-mapping.dmp
                        • memory/2056-106-0x00000000004015B0-mapping.dmp
                        • memory/2136-185-0x0000000000000000-mapping.dmp
                        • memory/2188-169-0x0000000072E90000-0x000000007357E000-memory.dmp
                        • memory/2188-168-0x0000000000400000-0x0000000000452000-memory.dmp
                        • memory/2188-159-0x0000000000400000-0x0000000000452000-memory.dmp
                        • memory/2188-165-0x000000000044CF8E-mapping.dmp
                        • memory/2188-167-0x0000000000400000-0x0000000000452000-memory.dmp
                        • memory/2256-112-0x000007FEF7800000-0x000007FEF7A7A000-memory.dmp
                        • memory/2308-180-0x0000000000000000-mapping.dmp
                        • memory/2332-115-0x0000000000000000-mapping.dmp
                        • memory/2368-118-0x0000000000000000-mapping.dmp
                        • memory/2376-117-0x0000000000000000-mapping.dmp
                        • memory/2428-128-0x0000000000000048-mapping.dmp
                        • memory/2428-175-0x0000000006FF0000-0x0000000007013000-memory.dmp
                        • memory/2428-120-0x0000000000000000-mapping.dmp
                        • memory/2428-158-0x0000000002EE0000-0x0000000002EE1000-memory.dmp
                        • memory/2428-174-0x0000000002EE0000-0x0000000002EE1000-memory.dmp
                        • memory/2452-122-0x000000000041E270-mapping.dmp
                        • memory/2452-121-0x0000000000400000-0x000000000042D000-memory.dmp
                        • memory/2508-157-0x0000000076B50000-0x0000000076C6D000-memory.dmp
                        • memory/2508-156-0x0000000076990000-0x000000007699C000-memory.dmp
                        • memory/2508-125-0x0000000000300000-0x0000000000318000-memory.dmp
                        • memory/2508-124-0x0000000000000000-mapping.dmp
                        • memory/2508-129-0x0000000001E20000-0x0000000001ECD000-memory.dmp
                        • memory/2564-126-0x0000000000000000-mapping.dmp
                        • memory/2668-172-0x0000000000000000-mapping.dmp
                        • memory/2668-173-0x000000013FA20000-0x000000013FAB3000-memory.dmp
                        • memory/2740-153-0x0000000000000048-mapping.dmp
                        • memory/2740-131-0x0000000000000000-mapping.dmp
                        • memory/2812-132-0x0000000000000000-mapping.dmp
                        • memory/2896-139-0x0000000072E90000-0x000000007357E000-memory.dmp
                        • memory/2896-138-0x0000000000400000-0x0000000000452000-memory.dmp
                        • memory/2896-137-0x0000000000400000-0x0000000000452000-memory.dmp
                        • memory/2896-135-0x000000000044CCFE-mapping.dmp
                        • memory/2896-134-0x0000000000400000-0x0000000000452000-memory.dmp
                        • memory/2948-146-0x0000000000020000-0x0000000000021000-memory.dmp
                        • memory/2948-144-0x0000000072E90000-0x000000007357E000-memory.dmp
                        • memory/2948-141-0x0000000000000000-mapping.dmp