Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-12-2022 14:30

General

  • Target

    ac3cf4cc11b0b3e744b4685be1b9a81a63fc507702864bdebd165b939e99f549.exe

  • Size

    3.6MB

  • MD5

    2d5452372ed89a637202f5c4311d6b83

  • SHA1

    70f812ddb79efec13fb89c30d29ac9abbc17d623

  • SHA256

    ac3cf4cc11b0b3e744b4685be1b9a81a63fc507702864bdebd165b939e99f549

  • SHA512

    4ad38958af05f101fa07c90a78857af24f641e299315d039596af0c4669095ba68838b0f5a2ba78bf070e143ada84b2a82e25ba004791ee696d9491470bbaba7

  • SSDEEP

    49152:zjvWrU4VyUHA3iRYoySMbSsigAh14tKS2lw4I0LGAEJxQGV3O:3wU4VyUHpRYoESsigAlyG

Malware Config

Extracted

Family

danabot

C2

23.236.181.126:443

123.253.35.251:443

66.85.173.3:443

Attributes
  • embedded_hash

    7525E61580576E908856FBD4614C2F5E

  • type

    loader

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Blocklisted process makes network request 3 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 42 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 64 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 5 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac3cf4cc11b0b3e744b4685be1b9a81a63fc507702864bdebd165b939e99f549.exe
    "C:\Users\Admin\AppData\Local\Temp\ac3cf4cc11b0b3e744b4685be1b9a81a63fc507702864bdebd165b939e99f549.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4900
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Iseiuaqptde.dll,start
      2⤵
      • Blocklisted process makes network request
      • Sets DLL path for service in the registry
      • Sets service image path in registry
      • Loads dropped DLL
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:2504
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 20223
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:5112
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
        3⤵
          PID:3028
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
          3⤵
            PID:4712
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4900 -s 472
          2⤵
          • Program crash
          PID:3912
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4900 -ip 4900
        1⤵
          PID:4796
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:4112
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\SysWOW64\svchost.exe -k LocalService
            1⤵
            • Loads dropped DLL
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1428
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\system32\rundll32.exe" "c:\program files (x86)\msbuild\microsoft\combine_r_rhp..dll",VANRUDI=
              2⤵
              • Loads dropped DLL
              • Checks processor information in registry
              PID:3488

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\MSBuild\Microsoft\Combine_R_RHP..dll

            Filesize

            2.4MB

            MD5

            bb65ba561504883298f8f046ab1f3fd2

            SHA1

            7ebdba39f6717b3165d79d7c5fe825c69543a217

            SHA256

            74f6386468cda2f6773c2b1d0eaa23beca3fa4c7327759cb5058b68ca2df9792

            SHA512

            c12b99e0fa105c83a1b15fc042e70d35002b5a34ce742eeb55fd566977913cd84d968da0e7684c7e58ab8978a3d4a19debf6f948409438e9b08cf9491d033866

          • C:\Program Files (x86)\MSBuild\Microsoft\Combine_R_RHP..dll

            Filesize

            2.4MB

            MD5

            bb65ba561504883298f8f046ab1f3fd2

            SHA1

            7ebdba39f6717b3165d79d7c5fe825c69543a217

            SHA256

            74f6386468cda2f6773c2b1d0eaa23beca3fa4c7327759cb5058b68ca2df9792

            SHA512

            c12b99e0fa105c83a1b15fc042e70d35002b5a34ce742eeb55fd566977913cd84d968da0e7684c7e58ab8978a3d4a19debf6f948409438e9b08cf9491d033866

          • C:\Program Files (x86)\MSBuild\Microsoft\Combine_R_RHP..dll

            Filesize

            2.4MB

            MD5

            bb65ba561504883298f8f046ab1f3fd2

            SHA1

            7ebdba39f6717b3165d79d7c5fe825c69543a217

            SHA256

            74f6386468cda2f6773c2b1d0eaa23beca3fa4c7327759cb5058b68ca2df9792

            SHA512

            c12b99e0fa105c83a1b15fc042e70d35002b5a34ce742eeb55fd566977913cd84d968da0e7684c7e58ab8978a3d4a19debf6f948409438e9b08cf9491d033866

          • C:\Program Files (x86)\MSBuild\Microsoft\Combine_R_RHP..dll

            Filesize

            2.4MB

            MD5

            bb65ba561504883298f8f046ab1f3fd2

            SHA1

            7ebdba39f6717b3165d79d7c5fe825c69543a217

            SHA256

            74f6386468cda2f6773c2b1d0eaa23beca3fa4c7327759cb5058b68ca2df9792

            SHA512

            c12b99e0fa105c83a1b15fc042e70d35002b5a34ce742eeb55fd566977913cd84d968da0e7684c7e58ab8978a3d4a19debf6f948409438e9b08cf9491d033866

          • C:\ProgramData\{1671AAA7-B856-DB35-F1BA-0081C45B4B58}\CiST0000.001

            Filesize

            64KB

            MD5

            2a1801484fed207d6469068f57a62214

            SHA1

            c12999e2fa101c6b6bb3a5f0e66f4e0c5b938d4e

            SHA256

            30c7988571781563e5e697f564b616750e354bcd69e9bf7a39e3854e4b7bec28

            SHA512

            a7e12254278e83710077d5cb3b8162cd74c4211147a6823afa8aa3c67cc3041e066b34e63bcf0cae9087177543c52871e67bac373db1b8ab3d5058ba9f3f41b4

          • C:\ProgramData\{1671AAA7-B856-DB35-F1BA-0081C45B4B58}\CiST0000.002

            Filesize

            64KB

            MD5

            2a1801484fed207d6469068f57a62214

            SHA1

            c12999e2fa101c6b6bb3a5f0e66f4e0c5b938d4e

            SHA256

            30c7988571781563e5e697f564b616750e354bcd69e9bf7a39e3854e4b7bec28

            SHA512

            a7e12254278e83710077d5cb3b8162cd74c4211147a6823afa8aa3c67cc3041e066b34e63bcf0cae9087177543c52871e67bac373db1b8ab3d5058ba9f3f41b4

          • C:\ProgramData\{1671AAA7-B856-DB35-F1BA-0081C45B4B58}\Daowpeywwstdp.tmp

            Filesize

            2.3MB

            MD5

            45af97fa42bd933c57342a0efcc56fa8

            SHA1

            55b8fba0a9de2dfa54ea2a79435906cbb6f077bd

            SHA256

            f98d2b04a97c4e111f9928df2a7dab31ba3cbbeb493ad1f6503c93eb74209d6b

            SHA512

            8bda6ff82a7d6117052ddd8e4964d8fd7833bd5d53f39179839e5f63799a5e144efde32b15e395b260666c0f984f802b24fd43c3136700bfe9e05be4713bccde

          • C:\ProgramData\{1671AAA7-B856-DB35-F1BA-0081C45B4B58}\Daowpeywwstdp.tmp

            Filesize

            2.3MB

            MD5

            45af97fa42bd933c57342a0efcc56fa8

            SHA1

            55b8fba0a9de2dfa54ea2a79435906cbb6f077bd

            SHA256

            f98d2b04a97c4e111f9928df2a7dab31ba3cbbeb493ad1f6503c93eb74209d6b

            SHA512

            8bda6ff82a7d6117052ddd8e4964d8fd7833bd5d53f39179839e5f63799a5e144efde32b15e395b260666c0f984f802b24fd43c3136700bfe9e05be4713bccde

          • C:\ProgramData\{1671AAA7-B856-DB35-F1BA-0081C45B4B58}\DiagnosticLogCSP_Collector_DeviceProvisioning_2022_8_12_19_6_54.etl

            Filesize

            256KB

            MD5

            b5c3f386ba6bf489748767a83ba66310

            SHA1

            28f9ff04c8a1b35baf3eb1933090f572b12a48fc

            SHA256

            2fb189580fa637d418545ef5e45f4b84a4fb2f34c8d00e11b0b35524a543bdd4

            SHA512

            a362c83287399e9c3371ce708be38f83109f0850443a01401941d3cab01e2df71021eca2d0f437b392dc2ac8a582fc9562fa3aacf1027fc332f61876bc0fbe8d

          • C:\ProgramData\{1671AAA7-B856-DB35-F1BA-0081C45B4B58}\MicrosoftOffice2016BackupWin64.xml

            Filesize

            12KB

            MD5

            2d995c7aa8d041ffa18821c898bc2cb7

            SHA1

            f16ef806d79bffeec76f27102bd8e1273a0f3747

            SHA256

            614e99dbea133397b0b4ee8a222df8502f8f782fbcdd44651793c1c894281948

            SHA512

            81dcbfa24e216bf2a06379ca7d830bd6e16b58c16cd595704903a636f770eb70ca2146ec682559b48e9ff2518cbf3e1ed693050938a9a2b2e478eba6b86959e6

          • C:\ProgramData\{1671AAA7-B856-DB35-F1BA-0081C45B4B58}\MicrosoftOutlook2013CAWin64.xml

            Filesize

            1KB

            MD5

            880227fa1e5c41f3a7ea11e13f156de7

            SHA1

            042b7a68c2b3c588522edd750209bb4576638991

            SHA256

            c7f9df2f4c59a9f856761c82d28874f752cad8bdca8102bff4ff41c514f0b9fc

            SHA512

            caa06d82bb2e828e4e08fcca96c4b789b31611864b827ae9468e9dfbadbe10a48ae366d3d96bf92567f41d0c6792986363a0dfa6564332296fe1c111ffef4f30

          • C:\ProgramData\{1671AAA7-B856-DB35-F1BA-0081C45B4B58}\SmsInterceptStore.db

            Filesize

            192KB

            MD5

            b85cff0869b27cb9b319c8695ff13ecb

            SHA1

            20acc437243a95409d7048c3f50cd6605a460c17

            SHA256

            c645e9de8051cd91b6fd1829a3ff3b39a9b73fcd7da6ec56c4ef0feb7ca6a440

            SHA512

            1cded0944a62c0e58a5284aaeb4363bfcecdf83f231604e7e15871e195dde506eba8c91f3d01723eb2fd46cb530ef99e7184da44e3a8038d3328b05b02c31e0e

          • C:\ProgramData\{1671AAA7-B856-DB35-F1BA-0081C45B4B58}\SmsInterceptStore.jfm

            Filesize

            16KB

            MD5

            42503cb1e39818ef9265e178f1c15cb6

            SHA1

            3a7ae377387bbff92f8f66cf5608a581ae0d7a84

            SHA256

            7cb882655d38dc1eba3f35810fa95138decf03fc90a828f17994d6bc76acb0d2

            SHA512

            a39900fdf1f5012992824a470c26d9e0c61e34cca1987d06ee9802d1c81aef4197a9bfe941cd50a3954b485239db906f771953fc0795919f80f7bfdc88aba294

          • C:\ProgramData\{1671AAA7-B856-DB35-F1BA-0081C45B4B58}\SystemIndex.1.gthr

            Filesize

            12KB

            MD5

            bd3b9cbb0a1784dab0766f8e32697994

            SHA1

            69800df48894e8feb5e259b86bb0f07f438f6a36

            SHA256

            514d7c3812fc63a88c447660b03ab84780d902859bb5a57c18c72551ddaa0348

            SHA512

            3439dd2a4b6b293f51f376d40caf447a285ec147eb4761d5898d5b3b6301b25f5ea5aeaa14d4932010c2ac45854ef7483b8cf3f6fba9ff5ce4374cee29bf6ac5

          • C:\ProgramData\{1671AAA7-B856-DB35-F1BA-0081C45B4B58}\resource.xml

            Filesize

            1KB

            MD5

            0e190f6bbc7898c31d4eae77c6abebfe

            SHA1

            fb6673c8116b650f0536d56be09eb188d7bdc930

            SHA256

            f7f461d92f4a45d1232e7e5ad76cffbbb7b83abd69df864387c757051494d118

            SHA512

            faaf0699ddb7e4e152afaf54bed0794c9e816cb762454c277f5d52acf88a44535cc3a44797c73393fc50db8afe2566bcaf9a4f93d945c6b0b3d8458d16ae5312

          • C:\ProgramData\{1671AAA7-B856-DB35-F1BA-0081C45B4B58}\stream.x64.x-none.hash

            Filesize

            128B

            MD5

            2b4d6d3b95916f9810449019372fbbde

            SHA1

            2c9f59c51fc6b290f758aed25a899dba37459fc6

            SHA256

            cea19b915390806a9677165794194c66b19e3198a342d51e5a880e7b55768ac7

            SHA512

            5cbb012b89989d53a7814dcb9f0391a761ebea6a7c9d1dcaae0efb476e61b30ce678387c4ff6fcebea0643f96d2f3bf126cff9511a75c1780ec89b51ba79c8db

          • C:\ProgramData\{1671AAA7-B856-DB35-F1BA-0081C45B4B58}\tasks.xml

            Filesize

            11KB

            MD5

            6ab160b8998020e6d4373c003e9879d4

            SHA1

            efa87d3fb95a73a892ed88b08651c44fe03c150f

            SHA256

            faf021b3c06abc41a9fb8e021171fd0ea41684b732a8e77433e447af8e527516

            SHA512

            c923c48b0b5c741777666ca161864879defd50c299ae76d9f093ffb846d144600c99d281d879f9328509061f3ae6784a706f15248e0fed7bfd7a595b389aae1b

          • C:\ProgramData\{1671AAA7-B856-DB35-F1BA-0081C45B4B58}\telemetry.P-ARIA-4bb4d6f7cafc4e9292f972dca2dcde42-bd019ee8-e59c-4b0f-a02c-84e72157a3ef-7485.json

            Filesize

            121B

            MD5

            289935a24fcaf93d1d41b4842414bdb0

            SHA1

            5e83951c0aeaefa25b0f918e9b3ceddb7d23d949

            SHA256

            12493caa467a364b7cc88d930fb41372ae8960605b12547f0283577b1564c58c

            SHA512

            e8dfa0c926def3a80aef8ace3edd8da408cf3e286a3bd5769db29c0d99be7febf166131b750898f48aa6932de6b4b8598f076b90aa9666696de9d7cc29063aa8

          • C:\ProgramData\{1671AAA7-B856-DB35-F1BA-0081C45B4B58}\telemetry.P-ARIA-af397ef28e484961ba48646a5d38cf54-77418283-d6f6-4a90-b0c8-37e0f5e7b087-7425.json

            Filesize

            121B

            MD5

            656d587b76da4f43efb839ef9a83026e

            SHA1

            daf648eb7f98cfcec644be29d92c1990c1e56b2c

            SHA256

            e02fa7cef7c82a24fdcb99658cc8522ba93d7cffb2abffd7f2c633835a968e7d

            SHA512

            19251a2c09553896a67eac9afee213fd400c436661997de859df6960194a19a728ec0aa1ea11ca1095bd7fde4cc6142ac4973d6d4d600172372f25d6e8031ac7

          • C:\ProgramData\{1671AAA7-B856-DB35-F1BA-0081C45B4B58}\user-48.png

            Filesize

            617B

            MD5

            e738274439f0bcf555425a00af9a2f75

            SHA1

            cf0d5425bda34e865bc73601ac299d425d9064ef

            SHA256

            191e237f5a862cdbafa4562bebf080680a051d2c07b4f256c9b856f10d63d010

            SHA512

            2c2c1ccb38d14150dcb89249c3a2ee995e9467fb99ea20cc4819c4a683b50be0753b04264048084ae2611399b56736ca50d7a94dd98bd3dd055f430471188c8d

          • C:\Users\Admin\AppData\Local\Temp\Iseiuaqptde.dll

            Filesize

            2.4MB

            MD5

            db2c90b448fb54d7e74dee29f58d0a64

            SHA1

            79977831931ad48aa32d80298b754a26bbd4a9d3

            SHA256

            59a59284c8115307a3931ccec90c78faf5cfd96794c4b4f7d702b8a7ee4d83b4

            SHA512

            514c880223c801ca6fe338b99ee5b5256e359686376d698e6a6ff5afc62f6908da285541cb432c817195fd01134e86a1ce6adc337708dd2087eebb56f59ddbfd

          • C:\Users\Admin\AppData\Local\Temp\Iseiuaqptde.dll

            Filesize

            2.4MB

            MD5

            db2c90b448fb54d7e74dee29f58d0a64

            SHA1

            79977831931ad48aa32d80298b754a26bbd4a9d3

            SHA256

            59a59284c8115307a3931ccec90c78faf5cfd96794c4b4f7d702b8a7ee4d83b4

            SHA512

            514c880223c801ca6fe338b99ee5b5256e359686376d698e6a6ff5afc62f6908da285541cb432c817195fd01134e86a1ce6adc337708dd2087eebb56f59ddbfd

          • C:\Users\Admin\AppData\Local\Temp\Iseiuaqptde.dll

            Filesize

            2.4MB

            MD5

            db2c90b448fb54d7e74dee29f58d0a64

            SHA1

            79977831931ad48aa32d80298b754a26bbd4a9d3

            SHA256

            59a59284c8115307a3931ccec90c78faf5cfd96794c4b4f7d702b8a7ee4d83b4

            SHA512

            514c880223c801ca6fe338b99ee5b5256e359686376d698e6a6ff5afc62f6908da285541cb432c817195fd01134e86a1ce6adc337708dd2087eebb56f59ddbfd

          • \??\c:\program files (x86)\msbuild\microsoft\combine_r_rhp..dll

            Filesize

            2.4MB

            MD5

            bb65ba561504883298f8f046ab1f3fd2

            SHA1

            7ebdba39f6717b3165d79d7c5fe825c69543a217

            SHA256

            74f6386468cda2f6773c2b1d0eaa23beca3fa4c7327759cb5058b68ca2df9792

            SHA512

            c12b99e0fa105c83a1b15fc042e70d35002b5a34ce742eeb55fd566977913cd84d968da0e7684c7e58ab8978a3d4a19debf6f948409438e9b08cf9491d033866

          • memory/1428-195-0x0000000001E60000-0x0000000002585000-memory.dmp

            Filesize

            7.1MB

          • memory/1428-194-0x0000000001500000-0x0000000001771000-memory.dmp

            Filesize

            2.4MB

          • memory/1428-158-0x0000000001500000-0x0000000001771000-memory.dmp

            Filesize

            2.4MB

          • memory/1428-177-0x0000000001E60000-0x0000000002585000-memory.dmp

            Filesize

            7.1MB

          • memory/1428-159-0x0000000001500000-0x0000000001771000-memory.dmp

            Filesize

            2.4MB

          • memory/1428-174-0x0000000001E60000-0x0000000002585000-memory.dmp

            Filesize

            7.1MB

          • memory/1428-173-0x0000000001E60000-0x0000000002585000-memory.dmp

            Filesize

            7.1MB

          • memory/2504-137-0x00000000024C0000-0x0000000002731000-memory.dmp

            Filesize

            2.4MB

          • memory/2504-138-0x00000000024C0000-0x0000000002731000-memory.dmp

            Filesize

            2.4MB

          • memory/2504-143-0x0000000003CD0000-0x0000000003E10000-memory.dmp

            Filesize

            1.2MB

          • memory/2504-142-0x0000000003CD0000-0x0000000003E10000-memory.dmp

            Filesize

            1.2MB

          • memory/2504-141-0x00000000034A0000-0x0000000003BC5000-memory.dmp

            Filesize

            7.1MB

          • memory/2504-140-0x00000000034A0000-0x0000000003BC5000-memory.dmp

            Filesize

            7.1MB

          • memory/2504-139-0x00000000034A0000-0x0000000003BC5000-memory.dmp

            Filesize

            7.1MB

          • memory/2504-136-0x00000000024C0000-0x0000000002731000-memory.dmp

            Filesize

            2.4MB

          • memory/2504-151-0x0000000003D49000-0x0000000003D4B000-memory.dmp

            Filesize

            8KB

          • memory/2504-145-0x0000000003CD0000-0x0000000003E10000-memory.dmp

            Filesize

            1.2MB

          • memory/2504-146-0x0000000003CD0000-0x0000000003E10000-memory.dmp

            Filesize

            1.2MB

          • memory/2504-147-0x0000000003CD0000-0x0000000003E10000-memory.dmp

            Filesize

            1.2MB

          • memory/2504-144-0x0000000003CD0000-0x0000000003E10000-memory.dmp

            Filesize

            1.2MB

          • memory/2504-154-0x00000000034A0000-0x0000000003BC5000-memory.dmp

            Filesize

            7.1MB

          • memory/2504-132-0x0000000000000000-mapping.dmp

          • memory/3028-192-0x0000000000000000-mapping.dmp

          • memory/3488-178-0x0000000000000000-mapping.dmp

          • memory/3488-181-0x0000000002B80000-0x0000000002DF1000-memory.dmp

            Filesize

            2.4MB

          • memory/3488-183-0x0000000002B80000-0x0000000002DF1000-memory.dmp

            Filesize

            2.4MB

          • memory/3488-184-0x0000000003640000-0x0000000003D65000-memory.dmp

            Filesize

            7.1MB

          • memory/3488-185-0x0000000003640000-0x0000000003D65000-memory.dmp

            Filesize

            7.1MB

          • memory/3488-190-0x0000000002B80000-0x0000000002DF1000-memory.dmp

            Filesize

            2.4MB

          • memory/3488-191-0x0000000003640000-0x0000000003D65000-memory.dmp

            Filesize

            7.1MB

          • memory/4712-193-0x0000000000000000-mapping.dmp

          • memory/5112-150-0x000001D5356E0000-0x000001D535820000-memory.dmp

            Filesize

            1.2MB

          • memory/5112-149-0x000001D5356E0000-0x000001D535820000-memory.dmp

            Filesize

            1.2MB

          • memory/5112-148-0x00007FF6A0756890-mapping.dmp

          • memory/5112-153-0x000001D533D10000-0x000001D533F3A000-memory.dmp

            Filesize

            2.2MB

          • memory/5112-152-0x00000000009C0000-0x0000000000BD9000-memory.dmp

            Filesize

            2.1MB