Analysis

  • max time kernel
    152s
  • max time network
    171s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 05:19

General

  • Target

    c6cc3880215e9efdc78b6cab7f373390ccdb9615f6dcb2f1f92f8bd65b681101.exe

  • Size

    2.7MB

  • MD5

    349b587ed5fda616d179ba9a1718fb4c

  • SHA1

    d503cdd4bd462f182ff328cc262ec0f99486d6f4

  • SHA256

    c6cc3880215e9efdc78b6cab7f373390ccdb9615f6dcb2f1f92f8bd65b681101

  • SHA512

    29e079f1c4449e61231f79917ea1da21991855ff3790c356f2f0a5c70474221a518a060cb0405b3d30fcdab5017b0ed1e8dcc8f89ef3502301b4bf8290f986cd

  • SSDEEP

    24576:SKKTygi5eQlaRERr3Aui0K29imwteZGSzZt3cn5uXPBL7I7noV6jOIyz8+CQBKZq:+IKjOIy3DBKZFOeBYie

Malware Config

Extracted

Family

darkcomet

Botnet

PH

C2

justfordarkcomet.zapto.org:1604

127.0.0.1:1604

192.168.0.2:1604

Mutex

DC_MUTEX-E6M25ZF

Attributes
  • gencode

    ytR7Ej1ChUCo

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies firewall policy service 2 TTPs 3 IoCs
  • Windows security bypass 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Loads dropped DLL 6 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6cc3880215e9efdc78b6cab7f373390ccdb9615f6dcb2f1f92f8bd65b681101.exe
    "C:\Users\Admin\AppData\Local\Temp\c6cc3880215e9efdc78b6cab7f373390ccdb9615f6dcb2f1f92f8bd65b681101.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetWindowsHookEx
      PID:892
    • C:\Windows\SysWOW64\cmd.exe
      "cmd"
      2⤵
      • NTFS ADS
      PID:468
    • C:\Users\Admin\AppData\Roaming\Call Of duty 2 wh.exe
      "C:\Users\Admin\AppData\Roaming\Call Of duty 2 wh.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1616
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        3⤵
        • Adds Run key to start application
        • Suspicious use of SetWindowsHookEx
        PID:1080
      • C:\Windows\SysWOW64\cmd.exe
        "cmd"
        3⤵
        • NTFS ADS
        PID:1952
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1296
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1296 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1488
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\rkceib5x.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1520
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFF09.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFEF8.tmp"
        3⤵
          PID:1688
      • C:\Users\Admin\AppData\Roaming\WLIDSCV.exe
        "C:\Users\Admin\AppData\Roaming\WLIDSCV.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1668
        • C:\Users\Admin\AppData\Roaming\NBfjzsAMLEadIpfE.exe
          "C:\Users\Admin\AppData\Roaming\NBfjzsAMLEadIpfE.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:988
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            4⤵
            • Modifies firewall policy service
            • Windows security bypass
            • Disables RegEdit via registry modification
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1936
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727" +s +h
              5⤵
                PID:1768
                • C:\Windows\SysWOW64\attrib.exe
                  attrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727" +s +h
                  6⤵
                  • Sets file to hidden
                  • Drops file in Windows directory
                  • Views/modifies file attributes
                  PID:1520
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" +s +h
                5⤵
                  PID:380
                  • C:\Windows\SysWOW64\attrib.exe
                    attrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" +s +h
                    6⤵
                    • Sets file to hidden
                    • Drops file in Windows directory
                    • Views/modifies file attributes
                    PID:1100
                • C:\Windows\SysWOW64\notepad.exe
                  notepad
                  5⤵
                    PID:432

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Execution

          Scripting

          1
          T1064

          Persistence

          Modify Existing Service

          1
          T1031

          Hidden Files and Directories

          2
          T1158

          Registry Run Keys / Startup Folder

          1
          T1060

          Defense Evasion

          Modify Registry

          4
          T1112

          Disabling Security Tools

          1
          T1089

          Hidden Files and Directories

          2
          T1158

          Scripting

          1
          T1064

          Discovery

          System Information Discovery

          1
          T1082

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\RESFF09.tmp
            Filesize

            1KB

            MD5

            16f7aa19cb1791520cc7ffa4ada2bb1f

            SHA1

            93200faec416a1327483af192a044755940bde5f

            SHA256

            8c0e694a63eb42a1ea74dc9f9577766bbc1f48653a3a4904fd3435cad71650e7

            SHA512

            a75b4525c6bc35ba735c83029262b56ab35175961296cea2ac78a60e41d504ba716e5c52c82eeb5fd4bfe7e260c1653e304c4abb470059b5c13940796d6c84e1

          • C:\Users\Admin\AppData\Local\Temp\rkceib5x.0.vb
            Filesize

            1KB

            MD5

            807864bc5874b59e52fb57ad8f94cb43

            SHA1

            ebe40463b82af606869fd9eb5fbf7a0c9e2d8eed

            SHA256

            d0d58960f9306f7245f38e44d66f9c8f938eb0e3a3b4e6c29ba2b326ce3acf7d

            SHA512

            ac009ba60a589ca71aace3f8321b11721d0d912c5cab4079cc6075ac607de705817b234a0429b8b4a6cd39e37c72ca755345500fd8391bfc279347e39a9452d6

          • C:\Users\Admin\AppData\Local\Temp\rkceib5x.cmdline
            Filesize

            248B

            MD5

            6de578a06d7c79461c35e958646a9e56

            SHA1

            c32b91b2da888266fdf164e177a41dd12cacde64

            SHA256

            648a044c9384e29be14910664d99accc626364daba9ed7990a251cfc4cfa94c5

            SHA512

            c07af38c9e0f56b833fc9d63320b66e94fc148877562ddd2175e8a5805333dced9055cd89751a341f587b2260a43844512a164725fe7f95ffef13029ee2a70a9

          • C:\Users\Admin\AppData\Local\Temp\vbcFEF8.tmp
            Filesize

            644B

            MD5

            070d19a29fd713891607e27d97ead816

            SHA1

            e42cf75eb53e89ce253dea01274f383bc498cb3b

            SHA256

            1ee0d7a798e175d5a7d518bb3b27d4cebff4bc1bade76f4a3e433d88ee926d1e

            SHA512

            65a26d184056e35d15c6609bc15313742cbc77baeb0228e1081bdc96ff91631fdcf363787a1bfdfa4883155039c7ef2953ad7e4e4f20e2f71005d0bec98e27ef

          • C:\Users\Admin\AppData\Roaming\Call Of duty 2 wh.exe
            Filesize

            1.1MB

            MD5

            5161ef523bfd5701f9b5f5225f040f19

            SHA1

            18fcab853e6e475286caa4f6598aed4169223885

            SHA256

            e00974d91ab5fd276dcfe490a261073dc00a3e9bf8b918880715db74a84d34f0

            SHA512

            898abda2099c81800066be158118400571740c62b8349b60f5c5e724564881c2606f8d1ed70f86610c7e4d238763dc89078cbe30e2c20b3515e80ef181033ad5

          • C:\Users\Admin\AppData\Roaming\Call Of duty 2 wh.exe
            Filesize

            1.1MB

            MD5

            5161ef523bfd5701f9b5f5225f040f19

            SHA1

            18fcab853e6e475286caa4f6598aed4169223885

            SHA256

            e00974d91ab5fd276dcfe490a261073dc00a3e9bf8b918880715db74a84d34f0

            SHA512

            898abda2099c81800066be158118400571740c62b8349b60f5c5e724564881c2606f8d1ed70f86610c7e4d238763dc89078cbe30e2c20b3515e80ef181033ad5

          • C:\Users\Admin\AppData\Roaming\LZrWcMqIG.exe:ZONE.identifier
            Filesize

            27B

            MD5

            130a75a932a2fe57bfea6a65b88da8f6

            SHA1

            b66d7530d150d45c0a390bb3c2cd4ca4fc404d1c

            SHA256

            f2b79cae559d6772afc1c2ed9468988178f8b6833d5028a15dea73ce47d0196e

            SHA512

            6cd147c6f3af95803b7b0898e97ec2ed374c1f56a487b50e3d22003a67cec26a6fa12a3920b1b5624bde156f9601469ae3c7b7354fa8cf37be76c84121767eed

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\GD7DYF3C.txt
            Filesize

            608B

            MD5

            4ab4fb46e254e2f0c15cf8317ec2183f

            SHA1

            40eba42c9d57e032a8231d157c09b195ae79e54c

            SHA256

            b2e780609ba6cfc38b6c4ea9be581b010706a8638121eb7d62dbb906bfa76495

            SHA512

            57e94f7d548da24c1e73aa20401dd704b7e5bbbeced1c1a5c542b72e3fd1ea5b9aab6646cb95a77ca1298eb097a2365ce5a1be6de48379dc23c045092a09b740

          • C:\Users\Admin\AppData\Roaming\NBfjzsAMLEadIpfE.exe
            Filesize

            2.7MB

            MD5

            349b587ed5fda616d179ba9a1718fb4c

            SHA1

            d503cdd4bd462f182ff328cc262ec0f99486d6f4

            SHA256

            c6cc3880215e9efdc78b6cab7f373390ccdb9615f6dcb2f1f92f8bd65b681101

            SHA512

            29e079f1c4449e61231f79917ea1da21991855ff3790c356f2f0a5c70474221a518a060cb0405b3d30fcdab5017b0ed1e8dcc8f89ef3502301b4bf8290f986cd

          • C:\Users\Admin\AppData\Roaming\NBfjzsAMLEadIpfE.exe
            Filesize

            2.7MB

            MD5

            349b587ed5fda616d179ba9a1718fb4c

            SHA1

            d503cdd4bd462f182ff328cc262ec0f99486d6f4

            SHA256

            c6cc3880215e9efdc78b6cab7f373390ccdb9615f6dcb2f1f92f8bd65b681101

            SHA512

            29e079f1c4449e61231f79917ea1da21991855ff3790c356f2f0a5c70474221a518a060cb0405b3d30fcdab5017b0ed1e8dcc8f89ef3502301b4bf8290f986cd

          • C:\Users\Admin\AppData\Roaming\NBfjzsAMLEadIpfE.exe:ZONE.identifier
            Filesize

            27B

            MD5

            130a75a932a2fe57bfea6a65b88da8f6

            SHA1

            b66d7530d150d45c0a390bb3c2cd4ca4fc404d1c

            SHA256

            f2b79cae559d6772afc1c2ed9468988178f8b6833d5028a15dea73ce47d0196e

            SHA512

            6cd147c6f3af95803b7b0898e97ec2ed374c1f56a487b50e3d22003a67cec26a6fa12a3920b1b5624bde156f9601469ae3c7b7354fa8cf37be76c84121767eed

          • C:\Users\Admin\AppData\Roaming\WLIDSCV.exe
            Filesize

            7KB

            MD5

            dd85b585599a1f2a306ce67280db3c7a

            SHA1

            cf0b1257efd26c1fe2dc878275ac7b6c4d7173f5

            SHA256

            22629de901d99f27d0303a886259d99688f0eaa24cd1b878f51eda1e1130ea03

            SHA512

            e587d80fd922d4da6beb982b0734fa87ba9b62ebd30fdf7cbf3177d94fdcb54650e54274c78d887f3cbbace499c534e5c5d5d307eeb2813dccbc5375d8861912

          • C:\Users\Admin\AppData\Roaming\WLIDSCV.exe
            Filesize

            7KB

            MD5

            dd85b585599a1f2a306ce67280db3c7a

            SHA1

            cf0b1257efd26c1fe2dc878275ac7b6c4d7173f5

            SHA256

            22629de901d99f27d0303a886259d99688f0eaa24cd1b878f51eda1e1130ea03

            SHA512

            e587d80fd922d4da6beb982b0734fa87ba9b62ebd30fdf7cbf3177d94fdcb54650e54274c78d887f3cbbace499c534e5c5d5d307eeb2813dccbc5375d8861912

          • C:\Users\Admin\AppData\Roaming\fp.txt
            Filesize

            138B

            MD5

            ce5116376502f7ea74e285546554e7a7

            SHA1

            49e0d08484aff6abbc2074bb7c5c5d1771c695bc

            SHA256

            6f50f66872b7759dba6e033ec4ebeceee513870233fa84467e52750bf8bb1ba6

            SHA512

            06e2cf5747aaef37b9ac5750b082b6012e663367c008c51a1eab4434184e2c4b446d4bc35c98518734a998e042b51d8bbcbedaef6121986df611fd1923f6401a

          • C:\Users\Admin\AppData\Roaming\fp.txt
            Filesize

            74B

            MD5

            98aae9187c8f33add1f036a632df36e1

            SHA1

            e882acb6a1b6a9970b6d5f6063a955970db13d01

            SHA256

            30f496723a7b1fc9e5e4e4dde14a0a084deac35e44f1e2c0bb88a1f884a9a67a

            SHA512

            af94dce01956734948e2214931d3472a9f94efd3a26130e9d8242ead68d7167ab0b1eff9bd0d66244ffbb03f38a4c27801e9994a85796290212e4838a0692a0b

          • \Users\Admin\AppData\Roaming\Call Of duty 2 wh.exe
            Filesize

            1.1MB

            MD5

            5161ef523bfd5701f9b5f5225f040f19

            SHA1

            18fcab853e6e475286caa4f6598aed4169223885

            SHA256

            e00974d91ab5fd276dcfe490a261073dc00a3e9bf8b918880715db74a84d34f0

            SHA512

            898abda2099c81800066be158118400571740c62b8349b60f5c5e724564881c2606f8d1ed70f86610c7e4d238763dc89078cbe30e2c20b3515e80ef181033ad5

          • \Users\Admin\AppData\Roaming\Call Of duty 2 wh.exe
            Filesize

            1.1MB

            MD5

            5161ef523bfd5701f9b5f5225f040f19

            SHA1

            18fcab853e6e475286caa4f6598aed4169223885

            SHA256

            e00974d91ab5fd276dcfe490a261073dc00a3e9bf8b918880715db74a84d34f0

            SHA512

            898abda2099c81800066be158118400571740c62b8349b60f5c5e724564881c2606f8d1ed70f86610c7e4d238763dc89078cbe30e2c20b3515e80ef181033ad5

          • \Users\Admin\AppData\Roaming\NBfjzsAMLEadIpfE.exe
            Filesize

            2.7MB

            MD5

            349b587ed5fda616d179ba9a1718fb4c

            SHA1

            d503cdd4bd462f182ff328cc262ec0f99486d6f4

            SHA256

            c6cc3880215e9efdc78b6cab7f373390ccdb9615f6dcb2f1f92f8bd65b681101

            SHA512

            29e079f1c4449e61231f79917ea1da21991855ff3790c356f2f0a5c70474221a518a060cb0405b3d30fcdab5017b0ed1e8dcc8f89ef3502301b4bf8290f986cd

          • \Users\Admin\AppData\Roaming\NBfjzsAMLEadIpfE.exe
            Filesize

            2.7MB

            MD5

            349b587ed5fda616d179ba9a1718fb4c

            SHA1

            d503cdd4bd462f182ff328cc262ec0f99486d6f4

            SHA256

            c6cc3880215e9efdc78b6cab7f373390ccdb9615f6dcb2f1f92f8bd65b681101

            SHA512

            29e079f1c4449e61231f79917ea1da21991855ff3790c356f2f0a5c70474221a518a060cb0405b3d30fcdab5017b0ed1e8dcc8f89ef3502301b4bf8290f986cd

          • \Users\Admin\AppData\Roaming\WLIDSCV.exe
            Filesize

            7KB

            MD5

            dd85b585599a1f2a306ce67280db3c7a

            SHA1

            cf0b1257efd26c1fe2dc878275ac7b6c4d7173f5

            SHA256

            22629de901d99f27d0303a886259d99688f0eaa24cd1b878f51eda1e1130ea03

            SHA512

            e587d80fd922d4da6beb982b0734fa87ba9b62ebd30fdf7cbf3177d94fdcb54650e54274c78d887f3cbbace499c534e5c5d5d307eeb2813dccbc5375d8861912

          • \Users\Admin\AppData\Roaming\WLIDSCV.exe
            Filesize

            7KB

            MD5

            dd85b585599a1f2a306ce67280db3c7a

            SHA1

            cf0b1257efd26c1fe2dc878275ac7b6c4d7173f5

            SHA256

            22629de901d99f27d0303a886259d99688f0eaa24cd1b878f51eda1e1130ea03

            SHA512

            e587d80fd922d4da6beb982b0734fa87ba9b62ebd30fdf7cbf3177d94fdcb54650e54274c78d887f3cbbace499c534e5c5d5d307eeb2813dccbc5375d8861912

          • memory/380-135-0x0000000000000000-mapping.dmp
          • memory/432-139-0x0000000000000000-mapping.dmp
          • memory/468-69-0x0000000000000000-mapping.dmp
          • memory/892-60-0x0000000000400000-0x0000000000405000-memory.dmp
            Filesize

            20KB

          • memory/892-68-0x0000000000400000-0x0000000000405000-memory.dmp
            Filesize

            20KB

          • memory/892-61-0x0000000000401238-mapping.dmp
          • memory/892-58-0x0000000000400000-0x0000000000405000-memory.dmp
            Filesize

            20KB

          • memory/892-56-0x0000000000400000-0x0000000000405000-memory.dmp
            Filesize

            20KB

          • memory/892-55-0x0000000000400000-0x0000000000405000-memory.dmp
            Filesize

            20KB

          • memory/988-131-0x0000000074510000-0x0000000074ABB000-memory.dmp
            Filesize

            5.7MB

          • memory/988-143-0x0000000074510000-0x0000000074ABB000-memory.dmp
            Filesize

            5.7MB

          • memory/988-110-0x0000000000000000-mapping.dmp
          • memory/1080-87-0x0000000000401238-mapping.dmp
          • memory/1080-93-0x0000000000400000-0x0000000000405000-memory.dmp
            Filesize

            20KB

          • memory/1100-138-0x0000000000000000-mapping.dmp
          • memory/1376-104-0x0000000074510000-0x0000000074ABB000-memory.dmp
            Filesize

            5.7MB

          • memory/1376-54-0x0000000075B61000-0x0000000075B63000-memory.dmp
            Filesize

            8KB

          • memory/1376-65-0x0000000074510000-0x0000000074ABB000-memory.dmp
            Filesize

            5.7MB

          • memory/1376-71-0x0000000074510000-0x0000000074ABB000-memory.dmp
            Filesize

            5.7MB

          • memory/1520-137-0x0000000000000000-mapping.dmp
          • memory/1520-79-0x0000000000000000-mapping.dmp
          • memory/1616-140-0x0000000074510000-0x0000000074ABB000-memory.dmp
            Filesize

            5.7MB

          • memory/1616-74-0x0000000000000000-mapping.dmp
          • memory/1616-78-0x0000000074510000-0x0000000074ABB000-memory.dmp
            Filesize

            5.7MB

          • memory/1668-125-0x0000000074510000-0x0000000074ABB000-memory.dmp
            Filesize

            5.7MB

          • memory/1668-101-0x0000000000000000-mapping.dmp
          • memory/1668-142-0x0000000074510000-0x0000000074ABB000-memory.dmp
            Filesize

            5.7MB

          • memory/1688-95-0x0000000000000000-mapping.dmp
          • memory/1768-136-0x0000000000000000-mapping.dmp
          • memory/1936-126-0x0000000000400000-0x00000000004BD000-memory.dmp
            Filesize

            756KB

          • memory/1936-122-0x0000000000400000-0x00000000004BD000-memory.dmp
            Filesize

            756KB

          • memory/1936-130-0x0000000000400000-0x00000000004BD000-memory.dmp
            Filesize

            756KB

          • memory/1936-133-0x0000000000400000-0x00000000004BD000-memory.dmp
            Filesize

            756KB

          • memory/1936-134-0x0000000000400000-0x00000000004BD000-memory.dmp
            Filesize

            756KB

          • memory/1936-129-0x0000000000490888-mapping.dmp
          • memory/1936-113-0x0000000000400000-0x00000000004BD000-memory.dmp
            Filesize

            756KB

          • memory/1936-128-0x0000000000400000-0x00000000004BD000-memory.dmp
            Filesize

            756KB

          • memory/1936-123-0x0000000000400000-0x00000000004BD000-memory.dmp
            Filesize

            756KB

          • memory/1936-120-0x0000000000400000-0x00000000004BD000-memory.dmp
            Filesize

            756KB

          • memory/1936-118-0x0000000000400000-0x00000000004BD000-memory.dmp
            Filesize

            756KB

          • memory/1936-116-0x0000000000400000-0x00000000004BD000-memory.dmp
            Filesize

            756KB

          • memory/1936-114-0x0000000000400000-0x00000000004BD000-memory.dmp
            Filesize

            756KB

          • memory/1936-144-0x0000000000400000-0x00000000004BD000-memory.dmp
            Filesize

            756KB

          • memory/1952-105-0x0000000000000000-mapping.dmp