Analysis
-
max time kernel
70s -
max time network
124s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
22-10-2021 04:01
Static task
static1
General
-
Target
ddce05fb0f69a51605f2009de5397b4a6c3bdea6cbb324ae5748a19738df5ef8.exe
-
Size
1.2MB
-
MD5
58b7e49112eb2459752ba27999d74418
-
SHA1
47c8011562853bde1c16732daee476b19982ebb0
-
SHA256
ddce05fb0f69a51605f2009de5397b4a6c3bdea6cbb324ae5748a19738df5ef8
-
SHA512
db795b7e7ed5015f1d43af2f40f43c890e9af6508573077fb2df54012a51687e80a1c902fe5ea8f2560171a5595da14ea0ecbf8b5c798e83101b2febd8d2e430
Malware Config
Extracted
danabot
192.119.110.73:443
192.236.147.159:443
192.210.222.88:443
-
embedded_hash
F4711E27D559B4AEB1A081A1EB0AC465
-
type
loader
Extracted
danabot
2052
4
192.119.110.73:443
192.236.147.159:443
192.210.222.88:443
-
embedded_hash
F4711E27D559B4AEB1A081A1EB0AC465
-
type
main
Signatures
-
Danabot Loader Component 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\DDCE05~1.DLL DanabotLoader2021 \Users\Admin\AppData\Local\Temp\DDCE05~1.DLL DanabotLoader2021 \Users\Admin\AppData\Local\Temp\DDCE05~1.DLL DanabotLoader2021 \Users\Admin\AppData\Local\Temp\DDCE05~1.DLL DanabotLoader2021 -
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 4044 created 708 4044 WerFault.exe ddce05fb0f69a51605f2009de5397b4a6c3bdea6cbb324ae5748a19738df5ef8.exe -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 26 3156 rundll32.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exeRUNDLL32.EXEpid process 3156 rundll32.exe 868 RUNDLL32.EXE -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 1 IoCs
Processes:
rundll32.exedescription ioc process File created C:\PROGRA~3\zohplghndapsm.tmp rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4044 708 WerFault.exe ddce05fb0f69a51605f2009de5397b4a6c3bdea6cbb324ae5748a19738df5ef8.exe -
Checks processor information in registry 2 TTPs 21 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RUNDLL32.EXEdescription ioc process Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
WerFault.exepid process 4044 WerFault.exe 4044 WerFault.exe 4044 WerFault.exe 4044 WerFault.exe 4044 WerFault.exe 4044 WerFault.exe 4044 WerFault.exe 4044 WerFault.exe 4044 WerFault.exe 4044 WerFault.exe 4044 WerFault.exe 4044 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 4044 WerFault.exe Token: SeBackupPrivilege 4044 WerFault.exe Token: SeDebugPrivilege 4044 WerFault.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
ddce05fb0f69a51605f2009de5397b4a6c3bdea6cbb324ae5748a19738df5ef8.exerundll32.exedescription pid process target process PID 708 wrote to memory of 3156 708 ddce05fb0f69a51605f2009de5397b4a6c3bdea6cbb324ae5748a19738df5ef8.exe rundll32.exe PID 708 wrote to memory of 3156 708 ddce05fb0f69a51605f2009de5397b4a6c3bdea6cbb324ae5748a19738df5ef8.exe rundll32.exe PID 708 wrote to memory of 3156 708 ddce05fb0f69a51605f2009de5397b4a6c3bdea6cbb324ae5748a19738df5ef8.exe rundll32.exe PID 3156 wrote to memory of 868 3156 rundll32.exe RUNDLL32.EXE PID 3156 wrote to memory of 868 3156 rundll32.exe RUNDLL32.EXE PID 3156 wrote to memory of 868 3156 rundll32.exe RUNDLL32.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddce05fb0f69a51605f2009de5397b4a6c3bdea6cbb324ae5748a19738df5ef8.exe"C:\Users\Admin\AppData\Local\Temp\ddce05fb0f69a51605f2009de5397b4a6c3bdea6cbb324ae5748a19738df5ef8.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\DDCE05~1.DLL,s C:\Users\Admin\AppData\Local\Temp\DDCE05~1.EXE2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\DDCE05~1.DLL,IxsI3⤵
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Local\Temp\DDCE05~1.DLL4⤵
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\DDCE05~1.DLL,RkQBTXA=4⤵
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\shell32.dll,#61 196385⤵
-
C:\Windows\system32\ctfmon.exectfmon.exe6⤵
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\58cfb4a6.dll,Start4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpD424.tmp.ps1"4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp2F66.tmp.ps1"4⤵
-
C:\Windows\SysWOW64\nslookup.exe"C:\Windows\system32\nslookup.exe" -type=any localhost5⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 708 -s 5522⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\PROGRA~3\zohplghndapsm.tmpMD5
57534cbb657ab0dea653c02123387ff8
SHA16917ace9e9c6884201f643f19a98813120c2ece2
SHA2560f2ce58ab4543ed4eeb478b3410a2a8775895ec7542c23c3afff9fbe0b02b0b3
SHA5126c703d07a70ae2f4450a285eefb5f79effd5b1a2eee08502aba4c93d73138814ef8735e40334fd1307cbfd5271176ba0aecdb129e72e8e4ac29384c57ea430f4
-
C:\PROGRA~3\zohplghndapsm.tmpMD5
85e1bc53aa9a1b3dc2c09d931a338ef0
SHA152e2d21602ba8a5a147cd11dde21c66517c8941a
SHA2567deaf87f2e06765e05ebad4c2391b969fb8f2f3716a0f9b72f3da73298471005
SHA512c0482cde2289538213e1464826a5844d4021d91f7bc9227512233dec4ec748229b8b755966dd6d29453678473a9279c7ca16f4a6eaebe97c6835d63343607668
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
f7a808b5711f58fb4f85476c1bb24ac3
SHA1fbdf9670d622e8fc3446ad4f53fbbd83016f03d1
SHA256de4aadfe00c4cf41434a12450cdc69d37cb2d9cec951b074c3b5e7bfce9e94ec
SHA512866848d13e999e6a1a79d77c33adb642d78d0a11adee293fca411b4ed5f7bf85324f90b3031148a66ac10dccc577d3c2a7c1ab6ed4237360de9911c27516a5af
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
34cbce7a86066983ddec1c5c7316fa24
SHA1a1135a1ddbfd3ae8079f7e449d7978fdb92f3bd9
SHA25623bf6d99f757f6728c8c896676b0707e190e1acb80ec8758696fa3efa8d6cb42
SHA512f6537a61341ef316200de61d4185d7fdf8169fa5f01446241d34dc74ffdf9edfd520c5d06d54c9df8a8d1eb0eeab53141d75c88f157b72cbcb6b7f0bdb84e769
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
ef8ec2778d2da496dcc32aafa06d69ba
SHA1d5c435bede7e54fa2b96e0eeaf1dcc8acc52283e
SHA256771b7f637b3dae039280112cfa8fae7bfd60cde94632a413132e4ae1c8fafbee
SHA5129ef7b862ce5795801b3b094e85cdeeceee622315503963e8bac4648f0e8cb044bedc7ef5801ac1c66a6f01b6f354cdfbcbbb11abd967c97629f21a67950187f0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
df98c9e5330bdf46bf0435b8ffc9518b
SHA1667b96f0f2e14faf413eef2fd834e275f7a6fec5
SHA256cd79149720e87805f024f863e9ae293fd3b1734a12f3f7a314f3aa99b8a4667b
SHA512af5f60132a83a2f8101e6f0e000404e5af3d885a7467ab98f99d8a732a2bf0d267f55deff3f0e13017c03387c5c6c2d6ac828a2e1aaac5e72e2d0329e4139050
-
C:\Users\Admin\AppData\Local\Temp\58cfb4a6.dllMD5
5951f0afa96cda14623b4cce74d58cca
SHA1ad4a21bd28a3065037b1ea40fab4d7c4d7549fde
SHA2568b64b8bfd9e36cc40c273deccd4301a6c2ab44df03b976530c1bc517d7220bce
SHA512b098f302ad3446edafa5d9914f4697cbf7731b7c2ae31bc513de532115d7c672bec17e810d153eb0dbaae5b5782c1ac55351377231f7aa6502a3d9c223d55071
-
C:\Users\Admin\AppData\Local\Temp\DDCE05~1.DLLMD5
dfe49033eac220daf5b00e8f53db3366
SHA1896522919f0f3ad5579683f04e088e256eb3eb15
SHA256da2ff41490a3addcf47d024b1bcf68000d37de5cfdb874b0a36ca10e149f4055
SHA5121a24374520deb3abf265c0026569479ca97690052a16e1c8728518a0c4a1ee5c7b47a93f5be89bc203b4f500328f3e87030df501329b649c0a541e26623ef4a0
-
C:\Users\Admin\AppData\Local\Temp\tmp2F66.tmp.ps1MD5
c1e70fa2c298d679179f60e7f048e007
SHA10309de0e0b24d3ab8c4b94fe006c1e3958d4cfee
SHA2561793b19bc23a2a3541f05f0c87f795ea99afa7656bc7622b799cc34c12722619
SHA51235172b817e217794f2c28f1bf974573c8911aebada92e8dab81924eabdad4e9f7b0ed54b1dc508474d0fbf87399a20523b52534ab926e79bb5ac51fd7a8ea007
-
C:\Users\Admin\AppData\Local\Temp\tmp2F67.tmpMD5
1860260b2697808b80802352fe324782
SHA1f07b4cb6a8133d8dd942fc285d63cb3ce5a1ed6b
SHA2560c4bb6ae7726faa47aef8459bcf37bf9ca16f0b93fd52790932adaf7845d1fb1
SHA512d9fd458e2fe871e93199d7f3783133ded898d824024d9525e8c9af2af31892b13f3fb147d3bfda7dfd7659b7072f5cd1d6c3ebfe2dbf5893afd00e59a96aa94f
-
C:\Users\Admin\AppData\Local\Temp\tmpD424.tmp.ps1MD5
47eb0e5fafa5ae06b7def4f705f722f4
SHA155a5b10b9c8a42021b312f0b20d081cbc456eea5
SHA256bd9e249e1dcf863a3bdc264cd83c3dc17b5a1c4e437dcb41fbc2307f7b89cc2d
SHA512f43ef23941f4236a5851745509975ab02949d429159c20ebf57c9771d29214c034d9daf0a17fe4ac68ab3c56cd4829e01ebcf780f94a1d933ed8d245217d2a90
-
C:\Users\Admin\AppData\Local\Temp\tmpD425.tmpMD5
c416c12d1b2b1da8c8655e393b544362
SHA1fb1a43cd8e1c556c2d25f361f42a21293c29e447
SHA2560600d59103840dff210778179fdfba904dcb737a4bfdb35384608698c86ea046
SHA512cb6d3636be4330aa2fd577c3636d0b7165f92ee817e98f21180ba0c918eb76f4e38f025086593a0e508234ca981cfec2c53482b0e9cc0acfa885fefbdf89913c
-
\Users\Admin\AppData\Local\Temp\58cfb4a6.dllMD5
5951f0afa96cda14623b4cce74d58cca
SHA1ad4a21bd28a3065037b1ea40fab4d7c4d7549fde
SHA2568b64b8bfd9e36cc40c273deccd4301a6c2ab44df03b976530c1bc517d7220bce
SHA512b098f302ad3446edafa5d9914f4697cbf7731b7c2ae31bc513de532115d7c672bec17e810d153eb0dbaae5b5782c1ac55351377231f7aa6502a3d9c223d55071
-
\Users\Admin\AppData\Local\Temp\DDCE05~1.DLLMD5
dfe49033eac220daf5b00e8f53db3366
SHA1896522919f0f3ad5579683f04e088e256eb3eb15
SHA256da2ff41490a3addcf47d024b1bcf68000d37de5cfdb874b0a36ca10e149f4055
SHA5121a24374520deb3abf265c0026569479ca97690052a16e1c8728518a0c4a1ee5c7b47a93f5be89bc203b4f500328f3e87030df501329b649c0a541e26623ef4a0
-
\Users\Admin\AppData\Local\Temp\DDCE05~1.DLLMD5
dfe49033eac220daf5b00e8f53db3366
SHA1896522919f0f3ad5579683f04e088e256eb3eb15
SHA256da2ff41490a3addcf47d024b1bcf68000d37de5cfdb874b0a36ca10e149f4055
SHA5121a24374520deb3abf265c0026569479ca97690052a16e1c8728518a0c4a1ee5c7b47a93f5be89bc203b4f500328f3e87030df501329b649c0a541e26623ef4a0
-
\Users\Admin\AppData\Local\Temp\DDCE05~1.DLLMD5
dfe49033eac220daf5b00e8f53db3366
SHA1896522919f0f3ad5579683f04e088e256eb3eb15
SHA256da2ff41490a3addcf47d024b1bcf68000d37de5cfdb874b0a36ca10e149f4055
SHA5121a24374520deb3abf265c0026569479ca97690052a16e1c8728518a0c4a1ee5c7b47a93f5be89bc203b4f500328f3e87030df501329b649c0a541e26623ef4a0
-
memory/708-115-0x0000000000E05000-0x0000000000EF5000-memory.dmpFilesize
960KB
-
memory/708-119-0x0000000000400000-0x0000000000957000-memory.dmpFilesize
5.3MB
-
memory/708-118-0x0000000000F80000-0x0000000001087000-memory.dmpFilesize
1.0MB
-
memory/868-126-0x0000000004E41000-0x0000000005E25000-memory.dmpFilesize
15.9MB
-
memory/868-127-0x0000000000570000-0x0000000000571000-memory.dmpFilesize
4KB
-
memory/868-123-0x0000000000000000-mapping.dmp
-
memory/956-202-0x0000000006980000-0x0000000006981000-memory.dmpFilesize
4KB
-
memory/956-260-0x00000000068A3000-0x00000000068A4000-memory.dmpFilesize
4KB
-
memory/956-172-0x00000000068A2000-0x00000000068A3000-memory.dmpFilesize
4KB
-
memory/956-171-0x00000000068A0000-0x00000000068A1000-memory.dmpFilesize
4KB
-
memory/956-167-0x00000000002C0000-0x00000000002C1000-memory.dmpFilesize
4KB
-
memory/956-168-0x00000000002C0000-0x00000000002C1000-memory.dmpFilesize
4KB
-
memory/956-165-0x0000000000000000-mapping.dmp
-
memory/1172-194-0x0000000007E30000-0x0000000007E31000-memory.dmpFilesize
4KB
-
memory/1172-130-0x0000000000980000-0x0000000000981000-memory.dmpFilesize
4KB
-
memory/1172-128-0x0000000000000000-mapping.dmp
-
memory/1172-129-0x0000000000980000-0x0000000000981000-memory.dmpFilesize
4KB
-
memory/1172-133-0x0000000006E30000-0x0000000006E31000-memory.dmpFilesize
4KB
-
memory/1172-204-0x0000000009090000-0x0000000009091000-memory.dmpFilesize
4KB
-
memory/1172-203-0x0000000004453000-0x0000000004454000-memory.dmpFilesize
4KB
-
memory/1172-132-0x00000000042C0000-0x00000000042C1000-memory.dmpFilesize
4KB
-
memory/1172-200-0x0000000008EB0000-0x0000000008EB1000-memory.dmpFilesize
4KB
-
memory/1172-138-0x0000000004452000-0x0000000004453000-memory.dmpFilesize
4KB
-
memory/1172-188-0x000000007F150000-0x000000007F151000-memory.dmpFilesize
4KB
-
memory/1172-184-0x0000000008D80000-0x0000000008DB3000-memory.dmpFilesize
204KB
-
memory/1172-143-0x0000000007660000-0x0000000007661000-memory.dmpFilesize
4KB
-
memory/1172-173-0x0000000000980000-0x0000000000981000-memory.dmpFilesize
4KB
-
memory/1172-137-0x0000000004450000-0x0000000004451000-memory.dmpFilesize
4KB
-
memory/1172-139-0x0000000006D10000-0x0000000006D11000-memory.dmpFilesize
4KB
-
memory/1172-142-0x00000000075D0000-0x00000000075D1000-memory.dmpFilesize
4KB
-
memory/1172-163-0x00000000079B0000-0x00000000079B1000-memory.dmpFilesize
4KB
-
memory/1172-164-0x0000000007F10000-0x0000000007F11000-memory.dmpFilesize
4KB
-
memory/1172-141-0x0000000006DB0000-0x0000000006DB1000-memory.dmpFilesize
4KB
-
memory/1172-166-0x0000000007D90000-0x0000000007D91000-memory.dmpFilesize
4KB
-
memory/1776-151-0x0000000005E10000-0x0000000005F50000-memory.dmpFilesize
1.2MB
-
memory/1776-140-0x0000000000570000-0x0000000000571000-memory.dmpFilesize
4KB
-
memory/1776-146-0x0000000005E10000-0x0000000005F50000-memory.dmpFilesize
1.2MB
-
memory/1776-145-0x0000000005E10000-0x0000000005F50000-memory.dmpFilesize
1.2MB
-
memory/1776-131-0x0000000000000000-mapping.dmp
-
memory/1776-144-0x0000000005F80000-0x0000000005F81000-memory.dmpFilesize
4KB
-
memory/1776-149-0x0000000005E10000-0x0000000005F50000-memory.dmpFilesize
1.2MB
-
memory/1776-150-0x0000000005F90000-0x0000000005F91000-memory.dmpFilesize
4KB
-
memory/1776-148-0x0000000005E10000-0x0000000005F50000-memory.dmpFilesize
1.2MB
-
memory/1776-136-0x0000000004D51000-0x0000000005D35000-memory.dmpFilesize
15.9MB
-
memory/1776-152-0x0000000005E10000-0x0000000005F50000-memory.dmpFilesize
1.2MB
-
memory/2524-153-0x00007FF6767B5FD0-mapping.dmp
-
memory/2524-155-0x000001E858AB0000-0x000001E858AB2000-memory.dmpFilesize
8KB
-
memory/2524-158-0x0000000000930000-0x0000000000AD0000-memory.dmpFilesize
1.6MB
-
memory/2524-159-0x000001E858D70000-0x000001E858F22000-memory.dmpFilesize
1.7MB
-
memory/2524-157-0x000001E858AB0000-0x000001E858AB2000-memory.dmpFilesize
8KB
-
memory/2704-447-0x0000000000000000-mapping.dmp
-
memory/2820-156-0x0000000000000000-mapping.dmp
-
memory/3156-122-0x0000000000570000-0x0000000000571000-memory.dmpFilesize
4KB
-
memory/3156-121-0x0000000004C21000-0x0000000005C05000-memory.dmpFilesize
15.9MB
-
memory/3156-116-0x0000000000000000-mapping.dmp
-
memory/3164-162-0x0000000000000000-mapping.dmp
-
memory/3880-451-0x0000000000000000-mapping.dmp
-
memory/4168-386-0x0000000004342000-0x0000000004343000-memory.dmpFilesize
4KB
-
memory/4168-384-0x0000000004340000-0x0000000004341000-memory.dmpFilesize
4KB
-
memory/4168-358-0x0000000000000000-mapping.dmp
-
memory/4168-450-0x0000000004343000-0x0000000004344000-memory.dmpFilesize
4KB
-
memory/4376-452-0x0000000000000000-mapping.dmp