Analysis
-
max time kernel
81s -
max time network
135s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
20-10-2021 23:34
Static task
static1
General
-
Target
aa34ec26ea65a5bb74b2e4c2c37b5d6b49209aeb4485185db82f81823a8f04bd.exe
-
Size
1.1MB
-
MD5
4ed827c1a4a300513ec83251be765f4b
-
SHA1
631cd09db61277cdf576e6c346a2bc1ba9ddf0b4
-
SHA256
aa34ec26ea65a5bb74b2e4c2c37b5d6b49209aeb4485185db82f81823a8f04bd
-
SHA512
cbc7f7b920d7fb2311c7d6e4af7dd1d4894aabc8c41b4f54b35a549b4f4063e5dd1ed8ea22b2df59c49ef1b64a26acd8a6d0e8d91773f6cf3c8bcd07f7f8e740
Malware Config
Extracted
danabot
192.119.110.73:443
192.236.147.159:443
192.210.222.88:443
-
embedded_hash
F4711E27D559B4AEB1A081A1EB0AC465
-
type
loader
Extracted
danabot
2052
4
192.119.110.73:443
192.236.147.159:443
192.210.222.88:443
-
embedded_hash
F4711E27D559B4AEB1A081A1EB0AC465
-
type
main
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeRUNDLL32.EXEflow pid process 20 2432 rundll32.exe 21 2552 RUNDLL32.EXE -
Loads dropped DLL 5 IoCs
Processes:
rundll32.exeRUNDLL32.EXERUNDLL32.EXEpid process 2432 rundll32.exe 2552 RUNDLL32.EXE 2552 RUNDLL32.EXE 2496 RUNDLL32.EXE 2496 RUNDLL32.EXE -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 1 IoCs
Processes:
rundll32.exedescription ioc process File created C:\PROGRA~3\zohplghndapsm.tmp rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3284 2496 WerFault.exe RUNDLL32.EXE -
Checks processor information in registry 2 TTPs 27 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RUNDLL32.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision RUNDLL32.EXE Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz RUNDLL32.EXE -
Processes:
RUNDLL32.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\891DDF9B7BC59727672615272A647726A8AC851B RUNDLL32.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\891DDF9B7BC59727672615272A647726A8AC851B\Blob = 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 RUNDLL32.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
RUNDLL32.EXEpid process 2552 RUNDLL32.EXE 2552 RUNDLL32.EXE 2552 RUNDLL32.EXE 2552 RUNDLL32.EXE 2552 RUNDLL32.EXE 2552 RUNDLL32.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 68 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
aa34ec26ea65a5bb74b2e4c2c37b5d6b49209aeb4485185db82f81823a8f04bd.exerundll32.exeRUNDLL32.EXEdescription pid process target process PID 1680 wrote to memory of 2432 1680 aa34ec26ea65a5bb74b2e4c2c37b5d6b49209aeb4485185db82f81823a8f04bd.exe rundll32.exe PID 1680 wrote to memory of 2432 1680 aa34ec26ea65a5bb74b2e4c2c37b5d6b49209aeb4485185db82f81823a8f04bd.exe rundll32.exe PID 1680 wrote to memory of 2432 1680 aa34ec26ea65a5bb74b2e4c2c37b5d6b49209aeb4485185db82f81823a8f04bd.exe rundll32.exe PID 2432 wrote to memory of 2552 2432 rundll32.exe RUNDLL32.EXE PID 2432 wrote to memory of 2552 2432 rundll32.exe RUNDLL32.EXE PID 2432 wrote to memory of 2552 2432 rundll32.exe RUNDLL32.EXE PID 2552 wrote to memory of 68 2552 RUNDLL32.EXE powershell.exe PID 2552 wrote to memory of 68 2552 RUNDLL32.EXE powershell.exe PID 2552 wrote to memory of 68 2552 RUNDLL32.EXE powershell.exe PID 2552 wrote to memory of 2496 2552 RUNDLL32.EXE RUNDLL32.EXE PID 2552 wrote to memory of 2496 2552 RUNDLL32.EXE RUNDLL32.EXE PID 2552 wrote to memory of 2496 2552 RUNDLL32.EXE RUNDLL32.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa34ec26ea65a5bb74b2e4c2c37b5d6b49209aeb4485185db82f81823a8f04bd.exe"C:\Users\Admin\AppData\Local\Temp\aa34ec26ea65a5bb74b2e4c2c37b5d6b49209aeb4485185db82f81823a8f04bd.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\AA34EC~1.DLL,s C:\Users\Admin\AppData\Local\Temp\AA34EC~1.EXE2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\AA34EC~1.DLL,YAxUTXM=3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Local\Temp\AA34EC~1.DLL4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\AA34EC~1.DLL,KhoPaG8y4⤵
- Loads dropped DLL
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\shell32.dll,#61 196385⤵
-
C:\Windows\system32\ctfmon.exectfmon.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2496 -s 8045⤵
- Program crash
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\58cfb4a6.dll,Start4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp3177.tmp.ps1"4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp7299.tmp.ps1"4⤵
-
C:\Windows\SysWOW64\nslookup.exe"C:\Windows\system32\nslookup.exe" -type=any localhost5⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask4⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\PROGRA~3\zohplghndapsm.tmpMD5
885cacc747a33506a56a8b556650dd09
SHA18738f61aa35029d0a6e9258233a947935ad17cc8
SHA256530c992e88ea9129f4fbc245579c552802c15586ddefdf190b6ee01bb85468cc
SHA512cc49dba28b9e2781b2a7ec4923fdab2e12faf338f90454810b998ecc358681ab8fd956b283a31e18cb15fd34a6c2c0eb9122729b2dfcf65d96a6f55547e4d1c0
-
C:\PROGRA~3\zohplghndapsm.tmpMD5
06b1324a65ea541c1b3c29dfac214203
SHA1dcea379db1d179413e7e43ed3bf1c2f838a13867
SHA256585f2e45552726ae68dd442a9e84d447b9912c069425a80608a642c8a29950ce
SHA512f100d64dd12539a014d44e5ecb14a6a43b72c5c8300656c5043e2a0dd04f29288957dcd661afa813f410439355f8596d21930b0c6af0d542dbbe6e5851ed6038
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
47eebe401625bbc55e75dbfb72e9e89a
SHA1db3b2135942d2532c59b9788253638eb77e5995e
SHA256f1cd56000c44bbdb6880b5b133731f493fe8cba8198c5a861da6ae7b489ed0c3
SHA512590b149863d58be346e7927c28501375cc570858d2f156d234b03d68b86c5c0667a1038e2b6f6639172bf95638ca9f7c70f45270951abbcdf43b1be853b81d56
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
beb70cbcc9174b484b51d734453a6482
SHA154423e70db2e6739abd5cfb954ffb30b6fa65b5f
SHA256564b1d7f7a7319bb7be2386b00287172a68408c190ca6c3b3c1580d388068c61
SHA5127305b5bbdda6614598d87213cc675cd9cf39d3e23d15fec9ae15a9c1e59f4e7e84d8ef2982f20f80581eab7ccf2960d4d8733ef7980751a550ad6553652cfe8e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
4e13f51dab08b6b87cc718c1b0aa18a8
SHA1bd233e0008be8215901c887e8fcb43864c405a91
SHA256ae95ba2b991eb24eadf43aa7c5405a41a1f673e4a135ccb497ed47e25b8374e0
SHA5128c4c2cbd6c0fd9bf8c41c9537a7e2e51d8129d3e803413c0e4c84537ec95c2f6d731077126304a79e186e665d68fd8dd59ab6ecd87281a2963df4d6a377ba0ed
-
C:\Users\Admin\AppData\Local\Temp\58cfb4a6.dllMD5
5951f0afa96cda14623b4cce74d58cca
SHA1ad4a21bd28a3065037b1ea40fab4d7c4d7549fde
SHA2568b64b8bfd9e36cc40c273deccd4301a6c2ab44df03b976530c1bc517d7220bce
SHA512b098f302ad3446edafa5d9914f4697cbf7731b7c2ae31bc513de532115d7c672bec17e810d153eb0dbaae5b5782c1ac55351377231f7aa6502a3d9c223d55071
-
C:\Users\Admin\AppData\Local\Temp\AA34EC~1.DLLMD5
341f31de052d0ac985e6666d709e8f33
SHA1ca89eb760d619b5b70e1286a53760178fec20f80
SHA2566cc56af9912df7d4d7a37cc8e4818c1b8a4ae92765f229c504a37216defe78b6
SHA512a1606293c449079bffb27da193ef3a2acade62fc9c42fe275b650b81c63054932ab17139c3e4420c506385c81add637dc99d9e0d4df2eea4adb502b958bbc1f7
-
C:\Users\Admin\AppData\Local\Temp\tmp3177.tmp.ps1MD5
7a6b43f8fe151755d9b1551e7db46c0a
SHA1d0967d4d2043172f31171f13996c66b3ec402709
SHA256000102edb2520e5765e7cb5f90d0739c23fd6afbd87aaf469bc132e5e4c4c036
SHA512871fba22023f26dc2168b30bfb4ed881b71ffd0077e896b6a678ce257c1c550dac83ebb28c85ee6337dba358d9b2e1fb3d31006ac933eb2ed1e2c20b53ccbb64
-
C:\Users\Admin\AppData\Local\Temp\tmp3178.tmpMD5
c416c12d1b2b1da8c8655e393b544362
SHA1fb1a43cd8e1c556c2d25f361f42a21293c29e447
SHA2560600d59103840dff210778179fdfba904dcb737a4bfdb35384608698c86ea046
SHA512cb6d3636be4330aa2fd577c3636d0b7165f92ee817e98f21180ba0c918eb76f4e38f025086593a0e508234ca981cfec2c53482b0e9cc0acfa885fefbdf89913c
-
C:\Users\Admin\AppData\Local\Temp\tmp7299.tmp.ps1MD5
13359860a2686765852084551865d8b6
SHA1f2232e9ba467a26b672167f5423f0fbc75550237
SHA2563b35ebbb43107a18cb5b5b82526a6a033b011511415cc7139b4fb95e0051f8f6
SHA51255fe1da7e43c1ac7b5c4b7046e9a1c308f29f82a8c55b53cb215c82258a6e2072894b34ec59457b18b3309bc6b9e83436476210cb99b4b3fe37141b7f203da83
-
C:\Users\Admin\AppData\Local\Temp\tmp729A.tmpMD5
1860260b2697808b80802352fe324782
SHA1f07b4cb6a8133d8dd942fc285d63cb3ce5a1ed6b
SHA2560c4bb6ae7726faa47aef8459bcf37bf9ca16f0b93fd52790932adaf7845d1fb1
SHA512d9fd458e2fe871e93199d7f3783133ded898d824024d9525e8c9af2af31892b13f3fb147d3bfda7dfd7659b7072f5cd1d6c3ebfe2dbf5893afd00e59a96aa94f
-
\Users\Admin\AppData\Local\Temp\58cfb4a6.dllMD5
5951f0afa96cda14623b4cce74d58cca
SHA1ad4a21bd28a3065037b1ea40fab4d7c4d7549fde
SHA2568b64b8bfd9e36cc40c273deccd4301a6c2ab44df03b976530c1bc517d7220bce
SHA512b098f302ad3446edafa5d9914f4697cbf7731b7c2ae31bc513de532115d7c672bec17e810d153eb0dbaae5b5782c1ac55351377231f7aa6502a3d9c223d55071
-
\Users\Admin\AppData\Local\Temp\58cfb4a6.dllMD5
5951f0afa96cda14623b4cce74d58cca
SHA1ad4a21bd28a3065037b1ea40fab4d7c4d7549fde
SHA2568b64b8bfd9e36cc40c273deccd4301a6c2ab44df03b976530c1bc517d7220bce
SHA512b098f302ad3446edafa5d9914f4697cbf7731b7c2ae31bc513de532115d7c672bec17e810d153eb0dbaae5b5782c1ac55351377231f7aa6502a3d9c223d55071
-
\Users\Admin\AppData\Local\Temp\AA34EC~1.DLLMD5
341f31de052d0ac985e6666d709e8f33
SHA1ca89eb760d619b5b70e1286a53760178fec20f80
SHA2566cc56af9912df7d4d7a37cc8e4818c1b8a4ae92765f229c504a37216defe78b6
SHA512a1606293c449079bffb27da193ef3a2acade62fc9c42fe275b650b81c63054932ab17139c3e4420c506385c81add637dc99d9e0d4df2eea4adb502b958bbc1f7
-
\Users\Admin\AppData\Local\Temp\AA34EC~1.DLLMD5
341f31de052d0ac985e6666d709e8f33
SHA1ca89eb760d619b5b70e1286a53760178fec20f80
SHA2566cc56af9912df7d4d7a37cc8e4818c1b8a4ae92765f229c504a37216defe78b6
SHA512a1606293c449079bffb27da193ef3a2acade62fc9c42fe275b650b81c63054932ab17139c3e4420c506385c81add637dc99d9e0d4df2eea4adb502b958bbc1f7
-
\Users\Admin\AppData\Local\Temp\AA34EC~1.DLLMD5
341f31de052d0ac985e6666d709e8f33
SHA1ca89eb760d619b5b70e1286a53760178fec20f80
SHA2566cc56af9912df7d4d7a37cc8e4818c1b8a4ae92765f229c504a37216defe78b6
SHA512a1606293c449079bffb27da193ef3a2acade62fc9c42fe275b650b81c63054932ab17139c3e4420c506385c81add637dc99d9e0d4df2eea4adb502b958bbc1f7
-
\Users\Admin\AppData\Local\Temp\AA34EC~1.DLLMD5
341f31de052d0ac985e6666d709e8f33
SHA1ca89eb760d619b5b70e1286a53760178fec20f80
SHA2566cc56af9912df7d4d7a37cc8e4818c1b8a4ae92765f229c504a37216defe78b6
SHA512a1606293c449079bffb27da193ef3a2acade62fc9c42fe275b650b81c63054932ab17139c3e4420c506385c81add637dc99d9e0d4df2eea4adb502b958bbc1f7
-
\Users\Admin\AppData\Local\Temp\AA34EC~1.DLLMD5
341f31de052d0ac985e6666d709e8f33
SHA1ca89eb760d619b5b70e1286a53760178fec20f80
SHA2566cc56af9912df7d4d7a37cc8e4818c1b8a4ae92765f229c504a37216defe78b6
SHA512a1606293c449079bffb27da193ef3a2acade62fc9c42fe275b650b81c63054932ab17139c3e4420c506385c81add637dc99d9e0d4df2eea4adb502b958bbc1f7
-
memory/68-205-0x00000000090E0000-0x00000000090E1000-memory.dmpFilesize
4KB
-
memory/68-152-0x0000000007960000-0x0000000007961000-memory.dmpFilesize
4KB
-
memory/68-140-0x0000000004510000-0x0000000004511000-memory.dmpFilesize
4KB
-
memory/68-136-0x0000000004510000-0x0000000004511000-memory.dmpFilesize
4KB
-
memory/68-134-0x0000000000000000-mapping.dmp
-
memory/68-143-0x0000000007080000-0x0000000007081000-memory.dmpFilesize
4KB
-
memory/68-142-0x0000000004640000-0x0000000004641000-memory.dmpFilesize
4KB
-
memory/68-210-0x0000000009230000-0x0000000009231000-memory.dmpFilesize
4KB
-
memory/68-195-0x0000000009100000-0x0000000009133000-memory.dmpFilesize
204KB
-
memory/68-147-0x00000000045F2000-0x00000000045F3000-memory.dmpFilesize
4KB
-
memory/68-146-0x00000000045F0000-0x00000000045F1000-memory.dmpFilesize
4KB
-
memory/68-149-0x00000000076E0000-0x00000000076E1000-memory.dmpFilesize
4KB
-
memory/68-175-0x00000000081A0000-0x00000000081A1000-memory.dmpFilesize
4KB
-
memory/68-214-0x00000000045F3000-0x00000000045F4000-memory.dmpFilesize
4KB
-
memory/68-174-0x0000000007F10000-0x0000000007F11000-memory.dmpFilesize
4KB
-
memory/68-200-0x000000007F9D0000-0x000000007F9D1000-memory.dmpFilesize
4KB
-
memory/68-172-0x0000000006CF0000-0x0000000006CF1000-memory.dmpFilesize
4KB
-
memory/68-154-0x0000000007780000-0x0000000007781000-memory.dmpFilesize
4KB
-
memory/68-156-0x0000000007A80000-0x0000000007A81000-memory.dmpFilesize
4KB
-
memory/68-182-0x0000000004510000-0x0000000004511000-memory.dmpFilesize
4KB
-
memory/764-171-0x0000000000000000-mapping.dmp
-
memory/1516-456-0x0000000000000000-mapping.dmp
-
memory/1680-120-0x0000000000400000-0x0000000002FE9000-memory.dmpFilesize
43.9MB
-
memory/1680-119-0x0000000004FA0000-0x00000000050A8000-memory.dmpFilesize
1.0MB
-
memory/1680-118-0x0000000004EB0000-0x0000000004FA0000-memory.dmpFilesize
960KB
-
memory/1736-460-0x0000000002EA3000-0x0000000002EA4000-memory.dmpFilesize
4KB
-
memory/1736-354-0x0000000000000000-mapping.dmp
-
memory/1736-385-0x0000000002EA2000-0x0000000002EA3000-memory.dmpFilesize
4KB
-
memory/1736-383-0x0000000002EA0000-0x0000000002EA1000-memory.dmpFilesize
4KB
-
memory/2080-164-0x000001F65FC80000-0x000001F65FC82000-memory.dmpFilesize
8KB
-
memory/2080-161-0x00007FF7283A5FD0-mapping.dmp
-
memory/2080-166-0x000001F65FC80000-0x000001F65FC82000-memory.dmpFilesize
8KB
-
memory/2080-165-0x0000000000B00000-0x0000000000CA0000-memory.dmpFilesize
1.6MB
-
memory/2080-173-0x000001F65FE80000-0x000001F660032000-memory.dmpFilesize
1.7MB
-
memory/2180-461-0x0000000000000000-mapping.dmp
-
memory/2284-459-0x0000000000000000-mapping.dmp
-
memory/2396-170-0x0000000000440000-0x000000000046F000-memory.dmpFilesize
188KB
-
memory/2396-163-0x0000000000000000-mapping.dmp
-
memory/2432-115-0x0000000000000000-mapping.dmp
-
memory/2432-122-0x0000000000570000-0x0000000000571000-memory.dmpFilesize
4KB
-
memory/2432-121-0x0000000005151000-0x0000000006135000-memory.dmpFilesize
15.9MB
-
memory/2496-159-0x0000000005990000-0x0000000005AD0000-memory.dmpFilesize
1.2MB
-
memory/2496-155-0x0000000005990000-0x0000000005AD0000-memory.dmpFilesize
1.2MB
-
memory/2496-135-0x0000000000000000-mapping.dmp
-
memory/2496-139-0x00000000042B0000-0x0000000004415000-memory.dmpFilesize
1.4MB
-
memory/2496-144-0x00000000048E1000-0x00000000058C5000-memory.dmpFilesize
15.9MB
-
memory/2496-145-0x0000000005AE0000-0x0000000005AE1000-memory.dmpFilesize
4KB
-
memory/2496-160-0x0000000005990000-0x0000000005AD0000-memory.dmpFilesize
1.2MB
-
memory/2496-150-0x0000000005990000-0x0000000005AD0000-memory.dmpFilesize
1.2MB
-
memory/2496-158-0x0000000005BD0000-0x0000000005BD1000-memory.dmpFilesize
4KB
-
memory/2496-151-0x0000000005990000-0x0000000005AD0000-memory.dmpFilesize
1.2MB
-
memory/2496-157-0x0000000005990000-0x0000000005AD0000-memory.dmpFilesize
1.2MB
-
memory/2496-148-0x0000000005BC0000-0x0000000005BC1000-memory.dmpFilesize
4KB
-
memory/2552-129-0x0000000005CA0000-0x0000000005CA1000-memory.dmpFilesize
4KB
-
memory/2552-128-0x0000000004AA1000-0x0000000005A85000-memory.dmpFilesize
15.9MB
-
memory/2552-126-0x00000000044B0000-0x0000000004615000-memory.dmpFilesize
1.4MB
-
memory/2552-123-0x0000000000000000-mapping.dmp
-
memory/3652-188-0x00000000068F2000-0x00000000068F3000-memory.dmpFilesize
4KB
-
memory/3652-272-0x00000000068F3000-0x00000000068F4000-memory.dmpFilesize
4KB
-
memory/3652-212-0x0000000008180000-0x0000000008181000-memory.dmpFilesize
4KB
-
memory/3652-176-0x0000000000000000-mapping.dmp
-
memory/3652-177-0x00000000043E0000-0x00000000043E1000-memory.dmpFilesize
4KB
-
memory/3652-178-0x00000000043E0000-0x00000000043E1000-memory.dmpFilesize
4KB
-
memory/3652-186-0x00000000068F0000-0x00000000068F1000-memory.dmpFilesize
4KB