Analysis

  • max time kernel
    123s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    03-05-2021 17:24

General

  • Target

    vpn.exe

  • Size

    1.0MB

  • MD5

    ae672455612bde0a10259c441ffc97b3

  • SHA1

    378527fc598c402982fc0816282fef5e97318a76

  • SHA256

    83c713b4f6938fb03c8ddbbfd0830b90aa9dc33cc8309f8866396860e4b59243

  • SHA512

    f366df4117ff648b3d205dd0c5713054a6733bc86e70018065514d0075c87c50b188a95a159dd6ccda72bce22f3baf5797e3cfc470ac150bf47e6c74851fbe81

Malware Config

Extracted

Family

danabot

Version

1827

Botnet

3

C2

23.106.123.185:443

192.210.198.12:443

192.236.147.83:443

37.220.31.94:443

Attributes
  • embedded_hash

    AEF96B4D339B580ABB737F203C2D0F52

rsa_pubkey.plain
rsa_pubkey.plain

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Blocklisted process makes network request 9 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\vpn.exe
    "C:\Users\Admin\AppData\Local\Temp\vpn.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\System32\svchost.exe"
      2⤵
        PID:784
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c cmd < Avvenne.pst
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1148
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1464
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V /R "^OrbGtAtgShJATMzcwdgeFqmrVYufAJzwsUiIUTHcvjNANrHaHsmcZKvOExKyxOOpTIoYFKAiISGzjZdSsN$" Crudelta.pst
            4⤵
              PID:1596
            • C:\Users\Admin\AppData\Roaming\JlgUrBigQNgWUUeZSjyhQQddkdpgQSSCZanePlRSrGnkCObAsrxjUczSTXIMaT\Ama.exe.com
              Ama.exe.com p
              4⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:992
              • C:\Users\Admin\AppData\Roaming\JlgUrBigQNgWUUeZSjyhQQddkdpgQSSCZanePlRSrGnkCObAsrxjUczSTXIMaT\Ama.exe.com
                C:\Users\Admin\AppData\Roaming\JlgUrBigQNgWUUeZSjyhQQddkdpgQSSCZanePlRSrGnkCObAsrxjUczSTXIMaT\Ama.exe.com p
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Checks processor information in registry
                • Modifies system certificate store
                • Suspicious use of WriteProcessMemory
                PID:316
                • C:\Users\Admin\AppData\Local\Temp\brlqfnhv.exe
                  "C:\Users\Admin\AppData\Local\Temp\brlqfnhv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:1960
                  • C:\Windows\SysWOW64\rundll32.exe
                    C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\BRLQFN~1.DLL,Z C:\Users\Admin\AppData\Local\Temp\brlqfnhv.exe
                    7⤵
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1288
                    • C:\Windows\SysWOW64\RUNDLL32.EXE
                      C:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\BRLQFN~1.DLL,Z2AH
                      8⤵
                      • Blocklisted process makes network request
                      • Loads dropped DLL
                      • Drops desktop.ini file(s)
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1512
                • C:\Windows\SysWOW64\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\osoffybt.vbs"
                  6⤵
                    PID:680
                  • C:\Windows\SysWOW64\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fpqduxkd.vbs"
                    6⤵
                    • Blocklisted process makes network request
                    • Modifies system certificate store
                    PID:1924
              • C:\Windows\SysWOW64\PING.EXE
                ping 127.0.0.1 -n 30
                4⤵
                • Runs ping.exe
                PID:288

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          MD5

          e0e3aba8a2e7f86c2f523b5dc019905a

          SHA1

          97f0e48a80496d0d17ea3905d3c41e1dd6359a22

          SHA256

          3bd3dba56666d45912a35e3a0eaa71c201b8d422b7ea5e33a8dcb12da0ab5ea4

          SHA512

          b5aa9947d9b31565c23a7e0cb30e8a224808c38faee6758538e8972fc08cded09ff1e459690fbd09da9bd6de7b304c3c6b80afd07f9c9e51b33f9fae17d4241c

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L1Y3K90W\json[1].json

          MD5

          0c17abb0ed055fecf0c48bb6e46eb4eb

          SHA1

          a692730c8ec7353c31b94a888f359edb54aaa4c8

          SHA256

          f41e99f954e33e7b0e39930ec8620bf29801efc44275c1ee6b5cfa5e1be202c0

          SHA512

          645a9f2f94461d8a187261b736949df398ece5cfbf1af8653d18d3487ec1269d9f565534c1e249c12f31b3b1a41a8512953b1e991b001fc1360059e3fd494ec3

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat

          MD5

          c52fd6194cbd8e1bec1b30f1aafeacc9

          SHA1

          4cb86f98a71e15be4fc18d234cb79600cf1eee10

          SHA256

          b06d4f67bd91c03b0cbc29996324ec9dd883c4a1f79b3ecb801bd14c53253925

          SHA512

          5aa61f9142c877b2c5caa927b98667c3a1b54b3c20026f47ba6c0d0c3d9368055a5df9de177b2d021297b8301feb7c3f340632eae1ce6b61fd427061625af603

        • C:\Users\Admin\AppData\Local\Temp\3F03.tmp

          MD5

          0c17abb0ed055fecf0c48bb6e46eb4eb

          SHA1

          a692730c8ec7353c31b94a888f359edb54aaa4c8

          SHA256

          f41e99f954e33e7b0e39930ec8620bf29801efc44275c1ee6b5cfa5e1be202c0

          SHA512

          645a9f2f94461d8a187261b736949df398ece5cfbf1af8653d18d3487ec1269d9f565534c1e249c12f31b3b1a41a8512953b1e991b001fc1360059e3fd494ec3

        • C:\Users\Admin\AppData\Local\Temp\BRLQFN~1.DLL

          MD5

          ce2816dd27b6f679acfbfbad58c5ac6e

          SHA1

          2a1b1d7fa0b4f61ff178b197766943bb338bbe8c

          SHA256

          90f0e6c8e7905975130412bf839e824f72f90d708fcc431f53e5ad9f35666f27

          SHA512

          1f96be6c8259c5baec52cd568f4ab549af0b057f750126cafc5e04c4d1b2b66cfec7a65e2dd541f9f4d59dba9e09197d1f589a563c0f5816cc40dc5fa45ce44e

        • C:\Users\Admin\AppData\Local\Temp\brlqfnhv.exe

          MD5

          31b136df3d075b5b6a35e1acc1c25c91

          SHA1

          4d0ea72897b2ff2152f74801a5188bfe5df0e786

          SHA256

          6418a8143a1f38f1e0050f923d67ff234c7214d59f58a8da3cfb74da892c7419

          SHA512

          4a71d2212b57bf5c9a853ca1b2af52bdd10ed3f3ce9b245eb13011456d0ef2ac6db7d5a6cc62fe31e7fff876c9be21e66004b7722c0d797420563a930e2afcb6

        • C:\Users\Admin\AppData\Local\Temp\brlqfnhv.exe

          MD5

          31b136df3d075b5b6a35e1acc1c25c91

          SHA1

          4d0ea72897b2ff2152f74801a5188bfe5df0e786

          SHA256

          6418a8143a1f38f1e0050f923d67ff234c7214d59f58a8da3cfb74da892c7419

          SHA512

          4a71d2212b57bf5c9a853ca1b2af52bdd10ed3f3ce9b245eb13011456d0ef2ac6db7d5a6cc62fe31e7fff876c9be21e66004b7722c0d797420563a930e2afcb6

        • C:\Users\Admin\AppData\Local\Temp\fpqduxkd.vbs

          MD5

          c0dfc72866e15a8a0eb9893f0896a465

          SHA1

          ab6c56586d2c1a7d62833141cd13f97aa8e709db

          SHA256

          bffb3e0f7dccc74ef7170f72535be768b3a49def7c1f93edc733eb6e2c8a5012

          SHA512

          beff0f21537f7e9f6fc7e7296df03d119575457140e8bd3f0879cf885ec0bb387bf458a0b34ddf60cdcff14066c4cb4681bf930a61a8c9c5465b5178d71eaa39

        • C:\Users\Admin\AppData\Local\Temp\osoffybt.vbs

          MD5

          2f12f5d0a5768ab5262a35117371d3a9

          SHA1

          e4ca3669141978cc8151284c5d9a142b5c87616b

          SHA256

          3fb6f81b296f25ee46e5213e161d90d6782811eaaa4f0da8158d4eb57e96a45e

          SHA512

          35f6086e63e287663568eda7a1660d30a43d95d7eb8cd68e1de08a9b0853048153e6401d86d2ccb923288d08e9b3a1f1b7080465746ea6d6679abddfe4b7af00

        • C:\Users\Admin\AppData\Roaming\JlgUrBigQNgWUUeZSjyhQQddkdpgQSSCZanePlRSrGnkCObAsrxjUczSTXIMaT\Ama.exe.com

          MD5

          78ba0653a340bac5ff152b21a83626cc

          SHA1

          b12da9cb5d024555405040e65ad89d16ae749502

          SHA256

          05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7

          SHA512

          efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

        • C:\Users\Admin\AppData\Roaming\JlgUrBigQNgWUUeZSjyhQQddkdpgQSSCZanePlRSrGnkCObAsrxjUczSTXIMaT\Ama.exe.com

          MD5

          78ba0653a340bac5ff152b21a83626cc

          SHA1

          b12da9cb5d024555405040e65ad89d16ae749502

          SHA256

          05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7

          SHA512

          efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

        • C:\Users\Admin\AppData\Roaming\JlgUrBigQNgWUUeZSjyhQQddkdpgQSSCZanePlRSrGnkCObAsrxjUczSTXIMaT\Ama.exe.com

          MD5

          78ba0653a340bac5ff152b21a83626cc

          SHA1

          b12da9cb5d024555405040e65ad89d16ae749502

          SHA256

          05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7

          SHA512

          efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

        • C:\Users\Admin\AppData\Roaming\JlgUrBigQNgWUUeZSjyhQQddkdpgQSSCZanePlRSrGnkCObAsrxjUczSTXIMaT\Arcate.pst

          MD5

          cb84d48d8a79791bee0d1e52740ccb92

          SHA1

          902e3d817e09274d47c1d00fc10e0e831a0a4964

          SHA256

          f253dece3b82426eecbd65c4f34d9a5dcb02a8710c83fc4a48d9edc8f6b89f65

          SHA512

          20d0dccc6e80dc44c2beba3c0dceaf23e886e68b3b36de6675a8357f27a60da8dde0e7df4450a8491ae1dee1e8c4c8d6f1cf37231326cdd86793bf2088f01a68

        • C:\Users\Admin\AppData\Roaming\JlgUrBigQNgWUUeZSjyhQQddkdpgQSSCZanePlRSrGnkCObAsrxjUczSTXIMaT\Avvenne.pst

          MD5

          3a9d03cccbf783554b8350fff9bbc8df

          SHA1

          636b49abfcadb9c4242772c65b1a4d6485df1cea

          SHA256

          e1f3771ea85d11ed1ce2f3686c087f5e53b94b6165d4105a8dc76f03ef8cbd1b

          SHA512

          c3c620e1e34fcfcbdfa7d84ab015c070a40265b67f40d9a7d857a4f695d6a05ab660dac767f1e9d6f9e667b5c040b9e807c610ade9cfa6f7931e3cd1c476fb8b

        • C:\Users\Admin\AppData\Roaming\JlgUrBigQNgWUUeZSjyhQQddkdpgQSSCZanePlRSrGnkCObAsrxjUczSTXIMaT\Crudelta.pst

          MD5

          0d540d5ad9aae4b04416a647d36e6b8f

          SHA1

          1dc0f743995d6706927c2b01d5fa6860fb4ac118

          SHA256

          31c317f12b408beed5e0da60734a083797d0d0a599710875352cccab59970049

          SHA512

          d723b84e6fa7752a4bc2afa74aee80f88a3d0d6fb9c62462866738a37c7f77dfa7f8c590670afadd26dcdbdd9415d51de7df424a9c0eaf3b7af9458a3646ebbd

        • C:\Users\Admin\AppData\Roaming\JlgUrBigQNgWUUeZSjyhQQddkdpgQSSCZanePlRSrGnkCObAsrxjUczSTXIMaT\Ora.pst

          MD5

          3ca4dc18e084c073dbd4976dc9dfb602

          SHA1

          6a2f962587ab39e0ad7322d71ad590612052d466

          SHA256

          115b36d44dd6636f4fe7659c898d2440194ae6a6d9073e28475269c65fd53c17

          SHA512

          6d5a8285a010f250a2b8117b6f1b4cdab5d625f56feb3fe4aaff3036436db22d207ce823232881e93dcbae0cb5625f05c4227f4d3a7726334765c391b78b5fb4

        • C:\Users\Admin\AppData\Roaming\JlgUrBigQNgWUUeZSjyhQQddkdpgQSSCZanePlRSrGnkCObAsrxjUczSTXIMaT\p

          MD5

          cb84d48d8a79791bee0d1e52740ccb92

          SHA1

          902e3d817e09274d47c1d00fc10e0e831a0a4964

          SHA256

          f253dece3b82426eecbd65c4f34d9a5dcb02a8710c83fc4a48d9edc8f6b89f65

          SHA512

          20d0dccc6e80dc44c2beba3c0dceaf23e886e68b3b36de6675a8357f27a60da8dde0e7df4450a8491ae1dee1e8c4c8d6f1cf37231326cdd86793bf2088f01a68

        • \Users\Admin\AppData\Local\Temp\BRLQFN~1.DLL

          MD5

          ce2816dd27b6f679acfbfbad58c5ac6e

          SHA1

          2a1b1d7fa0b4f61ff178b197766943bb338bbe8c

          SHA256

          90f0e6c8e7905975130412bf839e824f72f90d708fcc431f53e5ad9f35666f27

          SHA512

          1f96be6c8259c5baec52cd568f4ab549af0b057f750126cafc5e04c4d1b2b66cfec7a65e2dd541f9f4d59dba9e09197d1f589a563c0f5816cc40dc5fa45ce44e

        • \Users\Admin\AppData\Local\Temp\BRLQFN~1.DLL

          MD5

          ce2816dd27b6f679acfbfbad58c5ac6e

          SHA1

          2a1b1d7fa0b4f61ff178b197766943bb338bbe8c

          SHA256

          90f0e6c8e7905975130412bf839e824f72f90d708fcc431f53e5ad9f35666f27

          SHA512

          1f96be6c8259c5baec52cd568f4ab549af0b057f750126cafc5e04c4d1b2b66cfec7a65e2dd541f9f4d59dba9e09197d1f589a563c0f5816cc40dc5fa45ce44e

        • \Users\Admin\AppData\Local\Temp\BRLQFN~1.DLL

          MD5

          ce2816dd27b6f679acfbfbad58c5ac6e

          SHA1

          2a1b1d7fa0b4f61ff178b197766943bb338bbe8c

          SHA256

          90f0e6c8e7905975130412bf839e824f72f90d708fcc431f53e5ad9f35666f27

          SHA512

          1f96be6c8259c5baec52cd568f4ab549af0b057f750126cafc5e04c4d1b2b66cfec7a65e2dd541f9f4d59dba9e09197d1f589a563c0f5816cc40dc5fa45ce44e

        • \Users\Admin\AppData\Local\Temp\BRLQFN~1.DLL

          MD5

          ce2816dd27b6f679acfbfbad58c5ac6e

          SHA1

          2a1b1d7fa0b4f61ff178b197766943bb338bbe8c

          SHA256

          90f0e6c8e7905975130412bf839e824f72f90d708fcc431f53e5ad9f35666f27

          SHA512

          1f96be6c8259c5baec52cd568f4ab549af0b057f750126cafc5e04c4d1b2b66cfec7a65e2dd541f9f4d59dba9e09197d1f589a563c0f5816cc40dc5fa45ce44e

        • \Users\Admin\AppData\Local\Temp\BRLQFN~1.DLL

          MD5

          ce2816dd27b6f679acfbfbad58c5ac6e

          SHA1

          2a1b1d7fa0b4f61ff178b197766943bb338bbe8c

          SHA256

          90f0e6c8e7905975130412bf839e824f72f90d708fcc431f53e5ad9f35666f27

          SHA512

          1f96be6c8259c5baec52cd568f4ab549af0b057f750126cafc5e04c4d1b2b66cfec7a65e2dd541f9f4d59dba9e09197d1f589a563c0f5816cc40dc5fa45ce44e

        • \Users\Admin\AppData\Local\Temp\BRLQFN~1.DLL

          MD5

          ce2816dd27b6f679acfbfbad58c5ac6e

          SHA1

          2a1b1d7fa0b4f61ff178b197766943bb338bbe8c

          SHA256

          90f0e6c8e7905975130412bf839e824f72f90d708fcc431f53e5ad9f35666f27

          SHA512

          1f96be6c8259c5baec52cd568f4ab549af0b057f750126cafc5e04c4d1b2b66cfec7a65e2dd541f9f4d59dba9e09197d1f589a563c0f5816cc40dc5fa45ce44e

        • \Users\Admin\AppData\Local\Temp\BRLQFN~1.DLL

          MD5

          ce2816dd27b6f679acfbfbad58c5ac6e

          SHA1

          2a1b1d7fa0b4f61ff178b197766943bb338bbe8c

          SHA256

          90f0e6c8e7905975130412bf839e824f72f90d708fcc431f53e5ad9f35666f27

          SHA512

          1f96be6c8259c5baec52cd568f4ab549af0b057f750126cafc5e04c4d1b2b66cfec7a65e2dd541f9f4d59dba9e09197d1f589a563c0f5816cc40dc5fa45ce44e

        • \Users\Admin\AppData\Local\Temp\BRLQFN~1.DLL

          MD5

          ce2816dd27b6f679acfbfbad58c5ac6e

          SHA1

          2a1b1d7fa0b4f61ff178b197766943bb338bbe8c

          SHA256

          90f0e6c8e7905975130412bf839e824f72f90d708fcc431f53e5ad9f35666f27

          SHA512

          1f96be6c8259c5baec52cd568f4ab549af0b057f750126cafc5e04c4d1b2b66cfec7a65e2dd541f9f4d59dba9e09197d1f589a563c0f5816cc40dc5fa45ce44e

        • \Users\Admin\AppData\Local\Temp\brlqfnhv.exe

          MD5

          31b136df3d075b5b6a35e1acc1c25c91

          SHA1

          4d0ea72897b2ff2152f74801a5188bfe5df0e786

          SHA256

          6418a8143a1f38f1e0050f923d67ff234c7214d59f58a8da3cfb74da892c7419

          SHA512

          4a71d2212b57bf5c9a853ca1b2af52bdd10ed3f3ce9b245eb13011456d0ef2ac6db7d5a6cc62fe31e7fff876c9be21e66004b7722c0d797420563a930e2afcb6

        • \Users\Admin\AppData\Local\Temp\brlqfnhv.exe

          MD5

          31b136df3d075b5b6a35e1acc1c25c91

          SHA1

          4d0ea72897b2ff2152f74801a5188bfe5df0e786

          SHA256

          6418a8143a1f38f1e0050f923d67ff234c7214d59f58a8da3cfb74da892c7419

          SHA512

          4a71d2212b57bf5c9a853ca1b2af52bdd10ed3f3ce9b245eb13011456d0ef2ac6db7d5a6cc62fe31e7fff876c9be21e66004b7722c0d797420563a930e2afcb6

        • \Users\Admin\AppData\Roaming\JlgUrBigQNgWUUeZSjyhQQddkdpgQSSCZanePlRSrGnkCObAsrxjUczSTXIMaT\Ama.exe.com

          MD5

          78ba0653a340bac5ff152b21a83626cc

          SHA1

          b12da9cb5d024555405040e65ad89d16ae749502

          SHA256

          05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7

          SHA512

          efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

        • memory/288-70-0x0000000000000000-mapping.dmp

        • memory/316-77-0x00000000000A0000-0x00000000000A1000-memory.dmp

          Filesize

          4KB

        • memory/316-73-0x0000000000000000-mapping.dmp

        • memory/680-83-0x0000000000000000-mapping.dmp

        • memory/784-60-0x0000000000000000-mapping.dmp

        • memory/992-68-0x0000000000000000-mapping.dmp

        • memory/1148-61-0x0000000000000000-mapping.dmp

        • memory/1288-99-0x00000000026B0000-0x00000000026B1000-memory.dmp

          Filesize

          4KB

        • memory/1288-101-0x0000000002AD1000-0x000000000312F000-memory.dmp

          Filesize

          6.4MB

        • memory/1288-103-0x0000000000120000-0x0000000000121000-memory.dmp

          Filesize

          4KB

        • memory/1288-96-0x0000000001FB0000-0x000000000256A000-memory.dmp

          Filesize

          5.7MB

        • memory/1288-87-0x0000000000000000-mapping.dmp

        • memory/1464-63-0x0000000000000000-mapping.dmp

        • memory/1512-110-0x0000000003070000-0x0000000003071000-memory.dmp

          Filesize

          4KB

        • memory/1512-100-0x0000000000000000-mapping.dmp

        • memory/1512-108-0x0000000002050000-0x000000000260A000-memory.dmp

          Filesize

          5.7MB

        • memory/1512-109-0x0000000002A01000-0x000000000305F000-memory.dmp

          Filesize

          6.4MB

        • memory/1596-64-0x0000000000000000-mapping.dmp

        • memory/1848-59-0x00000000757C1000-0x00000000757C3000-memory.dmp

          Filesize

          8KB

        • memory/1924-112-0x0000000000000000-mapping.dmp

        • memory/1960-89-0x0000000002F20000-0x0000000003615000-memory.dmp

          Filesize

          7.0MB

        • memory/1960-94-0x0000000000400000-0x0000000000DF2000-memory.dmp

          Filesize

          9.9MB

        • memory/1960-97-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB

        • memory/1960-81-0x0000000000000000-mapping.dmp