Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    24-07-2021 07:06

General

  • Target

    31e2c3b009290449dc1fe9760c14e85b.exe

  • Size

    1.4MB

  • MD5

    31e2c3b009290449dc1fe9760c14e85b

  • SHA1

    fa2442c7abef11a169088d43bd104ef6d21a12d7

  • SHA256

    4f1af996a6a32b402d0b75a37f4412d3e2b6502ed95a4055e8a2313f83543cfa

  • SHA512

    6ae10f9e51b928a49bafef4549b51dcbd9f83671604c76fc1449ad74d956e800b1d103b20ec7762634d1ad3bef82708d89830150d74eeb229cc6ade0798aa909

Malware Config

Extracted

Family

danabot

Version

1987

Botnet

4

C2

142.11.244.124:443

142.11.206.50:443

Attributes
  • embedded_hash

    6AD9FE4F9E491E785665E0D144F61DAB

rsa_privkey.plain
rsa_pubkey.plain

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Blocklisted process makes network request 6 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 22 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\31e2c3b009290449dc1fe9760c14e85b.exe
    "C:\Users\Admin\AppData\Local\Temp\31e2c3b009290449dc1fe9760c14e85b.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:3912
    • C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
      "C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1516
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c cmd < Arteria.txt
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3432
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:220
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V /R "^ZgzyFwATrTeYtqBoppoMahdYKpdvCROZoFqSzfHBkUcDvLvGdmgiKlZLXcxvKtskyrPmZJPTCGAnSNBYNKyrDGgXGgUXUkQiDpnzVWHH$" Due.txt
            5⤵
              PID:204
            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Disegnato.exe.com
              Disegnato.exe.com q
              5⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:3588
              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Disegnato.exe.com
                C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Disegnato.exe.com q
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2716
                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Disegnato.exe.com
                  C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Disegnato.exe.com
                  7⤵
                  • Executes dropped EXE
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:3480
                  • C:\Users\Admin\AppData\Local\Temp\nxdbwbogkyxy.exe
                    "C:\Users\Admin\AppData\Local\Temp\nxdbwbogkyxy.exe"
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:2340
                    • C:\Windows\SysWOW64\rundll32.exe
                      C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\NXDBWB~1.TMP,S C:\Users\Admin\AppData\Local\Temp\NXDBWB~1.EXE
                      9⤵
                      • Blocklisted process makes network request
                      • Loads dropped DLL
                      • Drops file in Program Files directory
                      • Suspicious use of WriteProcessMemory
                      PID:3176
                      • C:\Windows\SysWOW64\RUNDLL32.EXE
                        C:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\NXDBWB~1.TMP,FhQCa1ZhWA==
                        10⤵
                        • Blocklisted process makes network request
                        • Loads dropped DLL
                        • Checks processor information in registry
                        • Modifies system certificate store
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:3288
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp5204.tmp.ps1"
                          11⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2600
                  • C:\Windows\SysWOW64\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\esgnvaqpjbfp.vbs"
                    8⤵
                      PID:2672
                    • C:\Windows\SysWOW64\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\hmanghbdkshb.vbs"
                      8⤵
                      • Blocklisted process makes network request
                      • Modifies system certificate store
                      PID:3196
              • C:\Windows\SysWOW64\PING.EXE
                ping 127.0.0.1 -n 30
                5⤵
                • Runs ping.exe
                PID:3728
        • C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe
          "C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"
          2⤵
          • Executes dropped EXE
          • Drops startup file
          • Suspicious use of WriteProcessMemory
          PID:1636
          • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
            "C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: AddClipboardFormatListener
            PID:3564

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Install Root Certificate

      1
      T1130

      Modify Registry

      1
      T1112

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Remote System Discovery

      1
      T1018

      Collection

      Data from Local System

      1
      T1005

      Command and Control

      Web Service

      1
      T1102

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\PROGRA~3\Jvgzbfh.tmp
        MD5

        12dc21723f70212b6811a115823b1127

        SHA1

        c7067295be72a164b9aaf73648536aa49df8c3a0

        SHA256

        59d9d829f0770f9b1284a450e02ba290a5d35d4282c3f1e85c5b58250806e574

        SHA512

        33204e7f0ff4ed700cc5e8d1864a4074f21792d5f47a6a6b64c925d06e9ded7abedc63fb74f21688d911b41ded65eae2146e9708bc44871a40cddf897826de45

      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Arteria.txt
        MD5

        913049d98adc90afcba8ab6f7993c8bb

        SHA1

        583d54ed4a513e2de372a55f1f71085781367611

        SHA256

        dcea307303375d72b08178264cd7eba784b4a041ab3dd26ef1ac24f54c54c759

        SHA512

        530bc127160545044ef2ff8ffb89196f8a0cd48fa5b2ed3bfbb1c22e32f775fb7583e7d329ba73c7d1fda90183dc715d783a73c437f2f27bcc9cf79286e8e550

      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Corano.txt
        MD5

        d2de7222ae7c34fcf6e547ecf217a8b6

        SHA1

        38c24783ffd3cc50e2cb71823fd444783b19730c

        SHA256

        0396fa0aa17800fb3e8430a2ee5e05e359fc95bd8c4fd764eaf937503c982c12

        SHA512

        1cbc8d4882919974160b8294de435f9c3088ed29aa0ff11af4ec318157472c05ae26965d775adeb5fb9a7a4254e9f0a55b4969feaac1a97abcccda48582865dd

      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Disegnato.exe.com
        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Disegnato.exe.com
        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Disegnato.exe.com
        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Disegnato.exe.com
        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Due.txt
        MD5

        e417e39487e093be2fa0e3c8db9b8f8e

        SHA1

        eb50eeeea4cc1c710599b7ccfb18566fed677a43

        SHA256

        3d2158cb694bc799d35128f1382da305a23b1a2fe82904394409890624409602

        SHA512

        a0cf7323d9db0b6b3a9ef3a363e23857b3c57cf1d52297c2e96624b07602bb3ecb488575e2f1a4b4943eeba6e277f4361e73334138350f05ac40339fe8bba56d

      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Prediligi.txt
        MD5

        616bc04c44df9cdbbe25cf6abad39f12

        SHA1

        efffd6b11ea8251f6f2adf8481e9c2fde632c757

        SHA256

        6bbde48de84094d7852787c262cd7bff15be16c1adea1529d69221ad0d0e817b

        SHA512

        757b6be32a38d94a9d07a87af1265151fa23dbb11d81a3ca0d1d644be84c5e2c4c286acaae623e21e75b53d36389cf87e1fccc16fc6991bb80a75a1c1c258f56

      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\q
        MD5

        616bc04c44df9cdbbe25cf6abad39f12

        SHA1

        efffd6b11ea8251f6f2adf8481e9c2fde632c757

        SHA256

        6bbde48de84094d7852787c262cd7bff15be16c1adea1529d69221ad0d0e817b

        SHA512

        757b6be32a38d94a9d07a87af1265151fa23dbb11d81a3ca0d1d644be84c5e2c4c286acaae623e21e75b53d36389cf87e1fccc16fc6991bb80a75a1c1c258f56

      • C:\Users\Admin\AppData\Local\Temp\NXDBWB~1.TMP
        MD5

        a432db9b4cfed957e5002cd431366268

        SHA1

        669d7ff42b91febbaeebdaca57d0050e1af9d9d9

        SHA256

        3f353236d65c83d0a61f75ecf8b0f497198f6af23d0f4814ece9b627015f1978

        SHA512

        6adb320dcd4b35bce9974e8a92cf758e3bca00e65cd9717ec762a885bb8047b4f411538add7a582ccad7e9d9a3bda69acfd23bcbf6fd943b7151a2a4a4b4de2f

      • C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe
        MD5

        ee6aa728713c5b63aeef1b9ac9b34f7c

        SHA1

        74f203a30a8c78b38f3a37df1354fccfabf48076

        SHA256

        5dbe065bb00fb53f418fdb9fd3e09e7e5bdf2603483f676c90d25b8071826884

        SHA512

        e9b58078ba21916920187506a2ea738d8bbc7716b0d5cc953774c550edc5fce4a7013ee6a889fee3fccf09e26b04900d39d15eff4c94cde7ba23257ec644e45c

      • C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe
        MD5

        ee6aa728713c5b63aeef1b9ac9b34f7c

        SHA1

        74f203a30a8c78b38f3a37df1354fccfabf48076

        SHA256

        5dbe065bb00fb53f418fdb9fd3e09e7e5bdf2603483f676c90d25b8071826884

        SHA512

        e9b58078ba21916920187506a2ea738d8bbc7716b0d5cc953774c550edc5fce4a7013ee6a889fee3fccf09e26b04900d39d15eff4c94cde7ba23257ec644e45c

      • C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
        MD5

        a9c2de9801931f677ba53f6d71953078

        SHA1

        4f283047563c0f2e5dc525748ba8917f1a14e9de

        SHA256

        c503dd992af5bec203691da4df2c66d77f7575fcef7136a326f877fcaf2bc6b5

        SHA512

        18093a4d6bc64e3b597afc53de863b56804312a743163612ee31178f5df4b22e584070231bd5279842048085a59c3fa3e5c8bbf2364123f4281739ded54a4a0f

      • C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
        MD5

        a9c2de9801931f677ba53f6d71953078

        SHA1

        4f283047563c0f2e5dc525748ba8917f1a14e9de

        SHA256

        c503dd992af5bec203691da4df2c66d77f7575fcef7136a326f877fcaf2bc6b5

        SHA512

        18093a4d6bc64e3b597afc53de863b56804312a743163612ee31178f5df4b22e584070231bd5279842048085a59c3fa3e5c8bbf2364123f4281739ded54a4a0f

      • C:\Users\Admin\AppData\Local\Temp\esgnvaqpjbfp.vbs
        MD5

        f8f4a973f6e8012b0c74429826230862

        SHA1

        710e098a3ceb76f58536b620ad33e424ea875ce0

        SHA256

        84d948ce2cdcb143c0cebcb067ac3083729d5e7d2de63d22bcdd1ee31a26dad2

        SHA512

        ddf6f317a1d414b350e16a9f83dd9d1b703d8684ad5c040693316eba9ee836f10395e8ee40b0653d406c8e8678c4c7aaf75afa56bb6e6f7a042f8d85a205f6e8

      • C:\Users\Admin\AppData\Local\Temp\hmanghbdkshb.vbs
        MD5

        689b97e41a383feeb61bd223b6bde9cb

        SHA1

        18f175ee276e0f6d0de47cf215535ca79d2b4c09

        SHA256

        c14fe23e1bcac9713689bbc7c371e0c8e89c2448034603ca81088f3fd3be2fb7

        SHA512

        7916dc0e5cc512f91f7ec1de8f8dd29b6c6eadb88df2b05975c6698899cf536dc1c4a02d1a1d6c13ac75d5cc5ccb8b5b5a62a2a22c6a4db5445c76390aca6f08

      • C:\Users\Admin\AppData\Local\Temp\nxdbwbogkyxy.exe
        MD5

        4faf1c9e670e1e10f3b36b9a3b917966

        SHA1

        cb2b3af9162f2563d28e77917d653c22903acf4a

        SHA256

        c06b536be6df268422c769890fdd0f2e7f86124a736eaaa156ac5cf45a78f44e

        SHA512

        19e742c7e5be419f73ce26ba947adfaf443ca898e73a5b5f7ddd4d17f717eeeeae0acc56a521b9876b2b14d4579754c6102ffba2980b311c614202f662299d0a

      • C:\Users\Admin\AppData\Local\Temp\nxdbwbogkyxy.exe
        MD5

        4faf1c9e670e1e10f3b36b9a3b917966

        SHA1

        cb2b3af9162f2563d28e77917d653c22903acf4a

        SHA256

        c06b536be6df268422c769890fdd0f2e7f86124a736eaaa156ac5cf45a78f44e

        SHA512

        19e742c7e5be419f73ce26ba947adfaf443ca898e73a5b5f7ddd4d17f717eeeeae0acc56a521b9876b2b14d4579754c6102ffba2980b311c614202f662299d0a

      • C:\Users\Admin\AppData\Local\Temp\tmp5204.tmp.ps1
        MD5

        147fcbbc50d0de8c64da0c508561602e

        SHA1

        7561dbe00395fe6b3a131c0e14d9a86c8e559ffb

        SHA256

        0c9dc17c4c248886fbf65d0a60475091d73c7a36d5ca2577632217fdaacbb2a1

        SHA512

        ede669593ddeb42652515e21af04d9bb7ae2b1a35dd9ebbeb706dc481b07ed8f9d9ef3459b3441058f837fc04ab64fe2987aa5df14753b5d48ba64d9559afccc

      • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
        MD5

        ee6aa728713c5b63aeef1b9ac9b34f7c

        SHA1

        74f203a30a8c78b38f3a37df1354fccfabf48076

        SHA256

        5dbe065bb00fb53f418fdb9fd3e09e7e5bdf2603483f676c90d25b8071826884

        SHA512

        e9b58078ba21916920187506a2ea738d8bbc7716b0d5cc953774c550edc5fce4a7013ee6a889fee3fccf09e26b04900d39d15eff4c94cde7ba23257ec644e45c

      • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
        MD5

        ee6aa728713c5b63aeef1b9ac9b34f7c

        SHA1

        74f203a30a8c78b38f3a37df1354fccfabf48076

        SHA256

        5dbe065bb00fb53f418fdb9fd3e09e7e5bdf2603483f676c90d25b8071826884

        SHA512

        e9b58078ba21916920187506a2ea738d8bbc7716b0d5cc953774c550edc5fce4a7013ee6a889fee3fccf09e26b04900d39d15eff4c94cde7ba23257ec644e45c

      • \Users\Admin\AppData\Local\Temp\NXDBWB~1.TMP
        MD5

        a432db9b4cfed957e5002cd431366268

        SHA1

        669d7ff42b91febbaeebdaca57d0050e1af9d9d9

        SHA256

        3f353236d65c83d0a61f75ecf8b0f497198f6af23d0f4814ece9b627015f1978

        SHA512

        6adb320dcd4b35bce9974e8a92cf758e3bca00e65cd9717ec762a885bb8047b4f411538add7a582ccad7e9d9a3bda69acfd23bcbf6fd943b7151a2a4a4b4de2f

      • \Users\Admin\AppData\Local\Temp\NXDBWB~1.TMP
        MD5

        a432db9b4cfed957e5002cd431366268

        SHA1

        669d7ff42b91febbaeebdaca57d0050e1af9d9d9

        SHA256

        3f353236d65c83d0a61f75ecf8b0f497198f6af23d0f4814ece9b627015f1978

        SHA512

        6adb320dcd4b35bce9974e8a92cf758e3bca00e65cd9717ec762a885bb8047b4f411538add7a582ccad7e9d9a3bda69acfd23bcbf6fd943b7151a2a4a4b4de2f

      • \Users\Admin\AppData\Local\Temp\NXDBWB~1.TMP
        MD5

        a432db9b4cfed957e5002cd431366268

        SHA1

        669d7ff42b91febbaeebdaca57d0050e1af9d9d9

        SHA256

        3f353236d65c83d0a61f75ecf8b0f497198f6af23d0f4814ece9b627015f1978

        SHA512

        6adb320dcd4b35bce9974e8a92cf758e3bca00e65cd9717ec762a885bb8047b4f411538add7a582ccad7e9d9a3bda69acfd23bcbf6fd943b7151a2a4a4b4de2f

      • \Users\Admin\AppData\Local\Temp\nsc18BF.tmp\UAC.dll
        MD5

        adb29e6b186daa765dc750128649b63d

        SHA1

        160cbdc4cb0ac2c142d361df138c537aa7e708c9

        SHA256

        2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

        SHA512

        b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

      • memory/204-124-0x0000000000000000-mapping.dmp
      • memory/220-123-0x0000000000000000-mapping.dmp
      • memory/1516-115-0x0000000000000000-mapping.dmp
      • memory/1636-138-0x0000000000400000-0x00000000008AC000-memory.dmp
        Filesize

        4.7MB

      • memory/1636-116-0x0000000000000000-mapping.dmp
      • memory/1636-137-0x0000000000AE0000-0x0000000000B06000-memory.dmp
        Filesize

        152KB

      • memory/2340-154-0x0000000000400000-0x0000000000986000-memory.dmp
        Filesize

        5.5MB

      • memory/2340-153-0x0000000002830000-0x000000000292F000-memory.dmp
        Filesize

        1020KB

      • memory/2340-145-0x0000000000000000-mapping.dmp
      • memory/2600-177-0x0000000007480000-0x0000000007481000-memory.dmp
        Filesize

        4KB

      • memory/2600-180-0x0000000007CE0000-0x0000000007CE1000-memory.dmp
        Filesize

        4KB

      • memory/2600-178-0x0000000007E60000-0x0000000007E61000-memory.dmp
        Filesize

        4KB

      • memory/2600-179-0x00000000067A2000-0x00000000067A3000-memory.dmp
        Filesize

        4KB

      • memory/2600-167-0x0000000000000000-mapping.dmp
      • memory/2600-188-0x0000000008A40000-0x0000000008A41000-memory.dmp
        Filesize

        4KB

      • memory/2600-175-0x00000000075D0000-0x00000000075D1000-memory.dmp
        Filesize

        4KB

      • memory/2600-176-0x0000000007650000-0x0000000007651000-memory.dmp
        Filesize

        4KB

      • memory/2600-174-0x00000000074F0000-0x00000000074F1000-memory.dmp
        Filesize

        4KB

      • memory/2600-182-0x0000000007DE0000-0x0000000007DE1000-memory.dmp
        Filesize

        4KB

      • memory/2600-170-0x0000000004220000-0x0000000004221000-memory.dmp
        Filesize

        4KB

      • memory/2600-173-0x0000000006C40000-0x0000000006C41000-memory.dmp
        Filesize

        4KB

      • memory/2600-187-0x00000000094B0000-0x00000000094B1000-memory.dmp
        Filesize

        4KB

      • memory/2600-172-0x0000000006DE0000-0x0000000006DE1000-memory.dmp
        Filesize

        4KB

      • memory/2600-171-0x00000000067A0000-0x00000000067A1000-memory.dmp
        Filesize

        4KB

      • memory/2672-148-0x0000000000000000-mapping.dmp
      • memory/2716-131-0x0000000000000000-mapping.dmp
      • memory/2716-140-0x00000000018C0000-0x00000000018C1000-memory.dmp
        Filesize

        4KB

      • memory/3176-150-0x0000000000000000-mapping.dmp
      • memory/3176-164-0x0000000004A40000-0x0000000005CD6000-memory.dmp
        Filesize

        18.6MB

      • memory/3196-155-0x0000000000000000-mapping.dmp
      • memory/3288-165-0x0000000004600000-0x0000000005896000-memory.dmp
        Filesize

        18.6MB

      • memory/3288-162-0x0000000003EB0000-0x000000000400D000-memory.dmp
        Filesize

        1.4MB

      • memory/3288-159-0x0000000000000000-mapping.dmp
      • memory/3288-166-0x0000000005BD0000-0x0000000005BD1000-memory.dmp
        Filesize

        4KB

      • memory/3432-121-0x0000000000000000-mapping.dmp
      • memory/3480-141-0x0000000000ED0000-0x0000000000EF7000-memory.dmp
        Filesize

        156KB

      • memory/3480-143-0x0000000000ED0000-0x0000000000EF7000-memory.dmp
        Filesize

        156KB

      • memory/3564-139-0x0000000000400000-0x00000000008AC000-memory.dmp
        Filesize

        4.7MB

      • memory/3564-134-0x0000000000000000-mapping.dmp
      • memory/3588-127-0x0000000000000000-mapping.dmp
      • memory/3728-130-0x0000000000000000-mapping.dmp