Analysis

  • max time kernel
    123s
  • max time network
    135s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    12-06-2021 07:07

General

  • Target

    b805442d06f7fbba1772d15fdad402ce.exe

  • Size

    572KB

  • MD5

    b805442d06f7fbba1772d15fdad402ce

  • SHA1

    2bbc42ae47a2ec9ca1471931f8924197d073bf57

  • SHA256

    f4da967e84e593cadb3e0a622f59dc4bbc7393c4aeef1a29df60b37b57548299

  • SHA512

    f674205f2f28cf76af5960b0728eb2576d3572c9b51b4336309c458e005ec72b8ca197d140d266c2675affb4d2ba780b88406275eace42941cc0f0fdce8b4745

Malware Config

Extracted

Family

danabot

Version

1827

Botnet

3

C2

192.210.198.12:443

37.220.31.50:443

184.95.51.183:443

184.95.51.175:443

Attributes
  • embedded_hash

    410EB249B3A3D8613B29638D583F7193

rsa_pubkey.plain
rsa_pubkey.plain

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Blocklisted process makes network request 5 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b805442d06f7fbba1772d15fdad402ce.exe
    "C:\Users\Admin\AppData\Local\Temp\b805442d06f7fbba1772d15fdad402ce.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:512
    • C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe
      "C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Suspicious use of WriteProcessMemory
      PID:1360
      • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
        "C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: AddClipboardFormatListener
        PID:188
    • C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
      "C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1456
      • C:\Users\Admin\AppData\Local\Temp\gywefwaablbv.exe
        "C:\Users\Admin\AppData\Local\Temp\gywefwaablbv.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1668
        • C:\Windows\SysWOW64\rundll32.exe
          C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\GYWEFW~1.DLL,Z C:\Users\Admin\AppData\Local\Temp\GYWEFW~1.EXE
          4⤵
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4056
          • C:\Windows\SysWOW64\RUNDLL32.EXE
            C:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\GYWEFW~1.DLL,j18wLDbEBeT2
            5⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:2660
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpA0E4.tmp.ps1"
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:736
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpB393.tmp.ps1"
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3336
              • C:\Windows\SysWOW64\nslookup.exe
                "C:\Windows\system32\nslookup.exe" -type=any localhost
                7⤵
                  PID:3920
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
                6⤵
                  PID:1200
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
                  6⤵
                    PID:3168
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\wkfjkajuwjd.vbs"
              3⤵
                PID:3336
              • C:\Windows\SysWOW64\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\dqismtun.vbs"
                3⤵
                • Blocklisted process makes network request
                • Modifies system certificate store
                PID:1972

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

            MD5

            47eebe401625bbc55e75dbfb72e9e89a

            SHA1

            db3b2135942d2532c59b9788253638eb77e5995e

            SHA256

            f1cd56000c44bbdb6880b5b133731f493fe8cba8198c5a861da6ae7b489ed0c3

            SHA512

            590b149863d58be346e7927c28501375cc570858d2f156d234b03d68b86c5c0667a1038e2b6f6639172bf95638ca9f7c70f45270951abbcdf43b1be853b81d56

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            MD5

            1fe4299091ee587112288932f341df40

            SHA1

            2432d05105689ec1da79ea73f15c8c4a3437a5cf

            SHA256

            3898102474e337565e3fd000ea73cd33f85e9221c70736c29d87dd4a805d33bf

            SHA512

            9c97d7c420c87c4b6927be29f957c865b8ecff17b002fa3eb7af4050e5db85d91597a94e12024ce61a0256a32c9a7cc3b9f37aa0d77064f9ac73398094fd085b

          • C:\Users\Admin\AppData\Local\Temp\GYWEFW~1.DLL

            MD5

            d737e87a8c985246adb399d0a8bf9b3b

            SHA1

            2ed4f18c905108e45535ea0e8fa7cb2187675f87

            SHA256

            ab5742f22795a19c1cff270d3d3fef390e43a6a12bba6b69bbe54d479f9502f7

            SHA512

            9257b42d3b4ded392582d72107692d212d46252f218754149882c8faa65aae06881eee8be291f96da43f88f120878faeba23fa3c98f9cf99c9392f702f1a949b

          • C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe

            MD5

            fd227a7538d17ed4f7998b83b730c087

            SHA1

            8370c13e88d96b86d6b55c92218ac328cea9e0da

            SHA256

            b224ac93890d1fbe59e8fd43f12107f2c24c5430a74380b45053207e6b0e412c

            SHA512

            86c0f6f6c72bbca21c9b0f1742e167120df24eb23a95418898eeb4d47322c4ef2d0c60682de6128f663c139385c8a001ff853c917ec818ffbc888560c879c1c5

          • C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe

            MD5

            fd227a7538d17ed4f7998b83b730c087

            SHA1

            8370c13e88d96b86d6b55c92218ac328cea9e0da

            SHA256

            b224ac93890d1fbe59e8fd43f12107f2c24c5430a74380b45053207e6b0e412c

            SHA512

            86c0f6f6c72bbca21c9b0f1742e167120df24eb23a95418898eeb4d47322c4ef2d0c60682de6128f663c139385c8a001ff853c917ec818ffbc888560c879c1c5

          • C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe

            MD5

            06bbc875b35e47505013e38ef5e9c825

            SHA1

            372741d7fc3f7111c7f1a971170aa5c9cc4d3399

            SHA256

            ebe2283591a3fa0b2bc3900b962b765ab09d8e805c1d21e45626c579efac4782

            SHA512

            88af6066457871bf5bf10252487b15c01856f70aec14886e6bcb76023d97ebb3be7ef846e73ed91ac41faca53f0cf75b3c16af36758840d215a7488c80710c03

          • C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe

            MD5

            06bbc875b35e47505013e38ef5e9c825

            SHA1

            372741d7fc3f7111c7f1a971170aa5c9cc4d3399

            SHA256

            ebe2283591a3fa0b2bc3900b962b765ab09d8e805c1d21e45626c579efac4782

            SHA512

            88af6066457871bf5bf10252487b15c01856f70aec14886e6bcb76023d97ebb3be7ef846e73ed91ac41faca53f0cf75b3c16af36758840d215a7488c80710c03

          • C:\Users\Admin\AppData\Local\Temp\dqismtun.vbs

            MD5

            4e50620177bfb7c0138009856caa20bf

            SHA1

            0c14bffa87bab3e1bafdb0358a9e3fa35f01d9eb

            SHA256

            f996088e9cf4ab7971d73c8359160998607b9b0690a77c141560c897181ce18e

            SHA512

            f93171b8557b4a4e70129fc1caa3ca0dc84760a8a1f3739914f59dc8bf7ca99a2bd184f6d04f6de0faa58476b726f21207247894dfd41f3dc86a2a063463786f

          • C:\Users\Admin\AppData\Local\Temp\gywefwaablbv.exe

            MD5

            c45d43d4ea5df3961f5fbbcff0f2f196

            SHA1

            60b162ccd94e5543d9293b03567f0ec365f37a06

            SHA256

            8e723ab9a6a6e9fa3245f7958cef68f02b2e4b11107adc5110e91f034cadd0fd

            SHA512

            365fe5a22cb931c32389fb522f74db312c6520e6ea997447305d0c00c0d438ebbb13182f74dea66e18bbf3a8b023fd01d6da94d40479407199916ed76ee4893b

          • C:\Users\Admin\AppData\Local\Temp\gywefwaablbv.exe

            MD5

            c45d43d4ea5df3961f5fbbcff0f2f196

            SHA1

            60b162ccd94e5543d9293b03567f0ec365f37a06

            SHA256

            8e723ab9a6a6e9fa3245f7958cef68f02b2e4b11107adc5110e91f034cadd0fd

            SHA512

            365fe5a22cb931c32389fb522f74db312c6520e6ea997447305d0c00c0d438ebbb13182f74dea66e18bbf3a8b023fd01d6da94d40479407199916ed76ee4893b

          • C:\Users\Admin\AppData\Local\Temp\tmpA0E4.tmp.ps1

            MD5

            47ab01d037312e0905e98a0a789a868a

            SHA1

            7ed46549080f7aeab3da53cd1ccdd6ecdb1da188

            SHA256

            2ecfa692548c71c563e8f5974fd77bbe4db53449299a76bf296034f648700b8a

            SHA512

            f104ac8e1c1a43c63909d817d7edc3ec553b013ed6915392dc39015b7d0b0877f309bddd798e6c007e38cd9238549f6f92306985d2b79591aa438cb7dcc5087d

          • C:\Users\Admin\AppData\Local\Temp\tmpA0E5.tmp

            MD5

            c416c12d1b2b1da8c8655e393b544362

            SHA1

            fb1a43cd8e1c556c2d25f361f42a21293c29e447

            SHA256

            0600d59103840dff210778179fdfba904dcb737a4bfdb35384608698c86ea046

            SHA512

            cb6d3636be4330aa2fd577c3636d0b7165f92ee817e98f21180ba0c918eb76f4e38f025086593a0e508234ca981cfec2c53482b0e9cc0acfa885fefbdf89913c

          • C:\Users\Admin\AppData\Local\Temp\tmpB393.tmp.ps1

            MD5

            d180cd64b246382890be62143d4ecd02

            SHA1

            35829a6432e18e3731609e5c48c722841c0eae03

            SHA256

            139c2c45dc98eaa35b78b2ef1cc1b6b84611b2e56033d16e78e7be8ffc3899a7

            SHA512

            7c93bb94983911e771073856696a1a4836f3f63e57b8a5679d98035b8f3ffe70024688a5696d3ef3b90097dc4766669f57714ccd6e5965432f783d58d927c9b0

          • C:\Users\Admin\AppData\Local\Temp\tmpB394.tmp

            MD5

            1860260b2697808b80802352fe324782

            SHA1

            f07b4cb6a8133d8dd942fc285d63cb3ce5a1ed6b

            SHA256

            0c4bb6ae7726faa47aef8459bcf37bf9ca16f0b93fd52790932adaf7845d1fb1

            SHA512

            d9fd458e2fe871e93199d7f3783133ded898d824024d9525e8c9af2af31892b13f3fb147d3bfda7dfd7659b7072f5cd1d6c3ebfe2dbf5893afd00e59a96aa94f

          • C:\Users\Admin\AppData\Local\Temp\wkfjkajuwjd.vbs

            MD5

            5bffce6dd43318c45851574c1451a704

            SHA1

            545c0c5f98fb2d8bc6465a9762f10b87dd2cb841

            SHA256

            e2f0f522fd786a53dc2a5a4c563496d1bfaa7503dba0ca93c2b6ef2c87a8fd40

            SHA512

            5aed8593cd77d1ab60a12f0bbd47e517bf57fa3d10a34268ee5e3bba53728a329760330e518ebd0264fdcdc3be709dd391e0ab2f2193ecfa9849c5721a12ce6c

          • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe

            MD5

            fd227a7538d17ed4f7998b83b730c087

            SHA1

            8370c13e88d96b86d6b55c92218ac328cea9e0da

            SHA256

            b224ac93890d1fbe59e8fd43f12107f2c24c5430a74380b45053207e6b0e412c

            SHA512

            86c0f6f6c72bbca21c9b0f1742e167120df24eb23a95418898eeb4d47322c4ef2d0c60682de6128f663c139385c8a001ff853c917ec818ffbc888560c879c1c5

          • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe

            MD5

            fd227a7538d17ed4f7998b83b730c087

            SHA1

            8370c13e88d96b86d6b55c92218ac328cea9e0da

            SHA256

            b224ac93890d1fbe59e8fd43f12107f2c24c5430a74380b45053207e6b0e412c

            SHA512

            86c0f6f6c72bbca21c9b0f1742e167120df24eb23a95418898eeb4d47322c4ef2d0c60682de6128f663c139385c8a001ff853c917ec818ffbc888560c879c1c5

          • \Users\Admin\AppData\Local\Temp\GYWEFW~1.DLL

            MD5

            d737e87a8c985246adb399d0a8bf9b3b

            SHA1

            2ed4f18c905108e45535ea0e8fa7cb2187675f87

            SHA256

            ab5742f22795a19c1cff270d3d3fef390e43a6a12bba6b69bbe54d479f9502f7

            SHA512

            9257b42d3b4ded392582d72107692d212d46252f218754149882c8faa65aae06881eee8be291f96da43f88f120878faeba23fa3c98f9cf99c9392f702f1a949b

          • \Users\Admin\AppData\Local\Temp\GYWEFW~1.DLL

            MD5

            d737e87a8c985246adb399d0a8bf9b3b

            SHA1

            2ed4f18c905108e45535ea0e8fa7cb2187675f87

            SHA256

            ab5742f22795a19c1cff270d3d3fef390e43a6a12bba6b69bbe54d479f9502f7

            SHA512

            9257b42d3b4ded392582d72107692d212d46252f218754149882c8faa65aae06881eee8be291f96da43f88f120878faeba23fa3c98f9cf99c9392f702f1a949b

          • \Users\Admin\AppData\Local\Temp\GYWEFW~1.DLL

            MD5

            d737e87a8c985246adb399d0a8bf9b3b

            SHA1

            2ed4f18c905108e45535ea0e8fa7cb2187675f87

            SHA256

            ab5742f22795a19c1cff270d3d3fef390e43a6a12bba6b69bbe54d479f9502f7

            SHA512

            9257b42d3b4ded392582d72107692d212d46252f218754149882c8faa65aae06881eee8be291f96da43f88f120878faeba23fa3c98f9cf99c9392f702f1a949b

          • \Users\Admin\AppData\Local\Temp\GYWEFW~1.DLL

            MD5

            d737e87a8c985246adb399d0a8bf9b3b

            SHA1

            2ed4f18c905108e45535ea0e8fa7cb2187675f87

            SHA256

            ab5742f22795a19c1cff270d3d3fef390e43a6a12bba6b69bbe54d479f9502f7

            SHA512

            9257b42d3b4ded392582d72107692d212d46252f218754149882c8faa65aae06881eee8be291f96da43f88f120878faeba23fa3c98f9cf99c9392f702f1a949b

          • \Users\Admin\AppData\Local\Temp\nsf21E6.tmp\UAC.dll

            MD5

            adb29e6b186daa765dc750128649b63d

            SHA1

            160cbdc4cb0ac2c142d361df138c537aa7e708c9

            SHA256

            2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

            SHA512

            b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

          • memory/188-121-0x0000000000000000-mapping.dmp

          • memory/188-128-0x00000000005A0000-0x00000000006EA000-memory.dmp

            Filesize

            1.3MB

          • memory/188-129-0x0000000000400000-0x0000000000464000-memory.dmp

            Filesize

            400KB

          • memory/736-182-0x00000000093D0000-0x00000000093D1000-memory.dmp

            Filesize

            4KB

          • memory/736-171-0x00000000078F0000-0x00000000078F1000-memory.dmp

            Filesize

            4KB

          • memory/736-175-0x0000000007D50000-0x0000000007D51000-memory.dmp

            Filesize

            4KB

          • memory/736-183-0x0000000008950000-0x0000000008951000-memory.dmp

            Filesize

            4KB

          • memory/736-173-0x0000000007C70000-0x0000000007C71000-memory.dmp

            Filesize

            4KB

          • memory/736-172-0x0000000007C20000-0x0000000007C21000-memory.dmp

            Filesize

            4KB

          • memory/736-170-0x00000000074E0000-0x00000000074E1000-memory.dmp

            Filesize

            4KB

          • memory/736-169-0x0000000006C00000-0x0000000006C01000-memory.dmp

            Filesize

            4KB

          • memory/736-168-0x0000000007470000-0x0000000007471000-memory.dmp

            Filesize

            4KB

          • memory/736-167-0x0000000006B60000-0x0000000006B61000-memory.dmp

            Filesize

            4KB

          • memory/736-187-0x0000000001153000-0x0000000001154000-memory.dmp

            Filesize

            4KB

          • memory/736-166-0x0000000001152000-0x0000000001153000-memory.dmp

            Filesize

            4KB

          • memory/736-184-0x0000000008A20000-0x0000000008A21000-memory.dmp

            Filesize

            4KB

          • memory/736-160-0x0000000000000000-mapping.dmp

          • memory/736-163-0x0000000001090000-0x0000000001091000-memory.dmp

            Filesize

            4KB

          • memory/736-164-0x0000000006D40000-0x0000000006D41000-memory.dmp

            Filesize

            4KB

          • memory/736-165-0x0000000001150000-0x0000000001151000-memory.dmp

            Filesize

            4KB

          • memory/1200-215-0x0000000000000000-mapping.dmp

          • memory/1360-126-0x0000000000400000-0x0000000000464000-memory.dmp

            Filesize

            400KB

          • memory/1360-124-0x0000000000580000-0x00000000006CA000-memory.dmp

            Filesize

            1.3MB

          • memory/1360-115-0x0000000000000000-mapping.dmp

          • memory/1456-127-0x0000000000400000-0x0000000000464000-memory.dmp

            Filesize

            400KB

          • memory/1456-125-0x0000000002080000-0x00000000020A4000-memory.dmp

            Filesize

            144KB

          • memory/1456-117-0x0000000000000000-mapping.dmp

          • memory/1668-135-0x0000000002D80000-0x0000000003487000-memory.dmp

            Filesize

            7.0MB

          • memory/1668-136-0x0000000000400000-0x0000000000B13000-memory.dmp

            Filesize

            7.1MB

          • memory/1668-137-0x0000000002720000-0x0000000002721000-memory.dmp

            Filesize

            4KB

          • memory/1668-130-0x0000000000000000-mapping.dmp

          • memory/1972-176-0x0000000000000000-mapping.dmp

          • memory/2660-159-0x0000000005271000-0x00000000058D0000-memory.dmp

            Filesize

            6.4MB

          • memory/2660-151-0x0000000004620000-0x0000000004BE5000-memory.dmp

            Filesize

            5.8MB

          • memory/2660-154-0x0000000004CE0000-0x0000000004CE1000-memory.dmp

            Filesize

            4KB

          • memory/2660-203-0x0000000000970000-0x0000000000971000-memory.dmp

            Filesize

            4KB

          • memory/2660-148-0x0000000000000000-mapping.dmp

          • memory/3168-217-0x0000000000000000-mapping.dmp

          • memory/3336-200-0x0000000007910000-0x0000000007911000-memory.dmp

            Filesize

            4KB

          • memory/3336-197-0x0000000007500000-0x0000000007501000-memory.dmp

            Filesize

            4KB

          • memory/3336-133-0x0000000000000000-mapping.dmp

          • memory/3336-188-0x0000000000000000-mapping.dmp

          • memory/3336-204-0x0000000000A90000-0x0000000000BDA000-memory.dmp

            Filesize

            1.3MB

          • memory/3336-205-0x0000000000A90000-0x0000000000BDA000-memory.dmp

            Filesize

            1.3MB

          • memory/3336-216-0x0000000000A90000-0x0000000000BDA000-memory.dmp

            Filesize

            1.3MB

          • memory/3920-212-0x0000000000000000-mapping.dmp

          • memory/4056-153-0x0000000002E40000-0x0000000002E41000-memory.dmp

            Filesize

            4KB

          • memory/4056-152-0x00000000054C1000-0x0000000005B20000-memory.dmp

            Filesize

            6.4MB

          • memory/4056-143-0x0000000004EF0000-0x0000000004EF1000-memory.dmp

            Filesize

            4KB

          • memory/4056-142-0x00000000047E0000-0x0000000004DA5000-memory.dmp

            Filesize

            5.8MB

          • memory/4056-138-0x0000000000000000-mapping.dmp