Analysis
-
max time kernel
118s -
max time network
135s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
18-12-2021 10:56
Static task
static1
General
-
Target
1e224644880c67be4e40bf9289e1277094d66e7cf7547bb9bc2290c79bd2ac2e.exe
-
Size
5.6MB
-
MD5
b07af9e0cae7f5541c447749a0ac2bfb
-
SHA1
5420cdb06b2482f38c63ddf85ca65a4f836c2c42
-
SHA256
1e224644880c67be4e40bf9289e1277094d66e7cf7547bb9bc2290c79bd2ac2e
-
SHA512
26b9dbf93f9bf554e34e86391b3a8c78da25d678d9b9e583f7a77d503da241974320722bfbd948abe640678aa9aaa643acbea471d5e1eb9ab7b1e406ce680a2c
Malware Config
Extracted
danabot
4
142.11.244.223:443
23.106.122.139:443
-
embedded_hash
0FA95F120D6EB149A5D48E36BC76879D
-
type
loader
Signatures
-
Danabot Loader Component 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\UGVVLJ~1.DLL DanabotLoader2021 \Users\Admin\AppData\Local\Temp\UGVVLJ~1.DLL DanabotLoader2021 behavioral1/memory/1560-156-0x0000000000BB0000-0x0000000000E2C000-memory.dmp DanabotLoader2021 \Users\Admin\AppData\Local\Temp\UGVVLJ~1.DLL DanabotLoader2021 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Blocklisted process makes network request 1 IoCs
Processes:
WScript.exeflow pid process 32 3732 WScript.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
dehkan.exedipodevp.exeugvvljoyxs.exeDpEditor.exepid process 1368 dehkan.exe 2712 dipodevp.exe 1540 ugvvljoyxs.exe 1900 DpEditor.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
DpEditor.exedehkan.exedipodevp.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DpEditor.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DpEditor.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dehkan.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dehkan.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dipodevp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dipodevp.exe -
Loads dropped DLL 3 IoCs
Processes:
1e224644880c67be4e40bf9289e1277094d66e7cf7547bb9bc2290c79bd2ac2e.exerundll32.exepid process 3596 1e224644880c67be4e40bf9289e1277094d66e7cf7547bb9bc2290c79bd2ac2e.exe 1560 rundll32.exe 1560 rundll32.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\faring\dehkan.exe themida C:\Users\Admin\AppData\Local\Temp\faring\dehkan.exe themida C:\Users\Admin\AppData\Local\Temp\faring\dipodevp.exe themida C:\Users\Admin\AppData\Local\Temp\faring\dipodevp.exe themida behavioral1/memory/1368-122-0x0000000000E10000-0x0000000001564000-memory.dmp themida behavioral1/memory/1368-123-0x0000000000E10000-0x0000000001564000-memory.dmp themida behavioral1/memory/1368-125-0x0000000000E10000-0x0000000001564000-memory.dmp themida behavioral1/memory/1368-126-0x0000000000E10000-0x0000000001564000-memory.dmp themida behavioral1/memory/2712-127-0x0000000001000000-0x00000000016C7000-memory.dmp themida behavioral1/memory/2712-128-0x0000000001000000-0x00000000016C7000-memory.dmp themida behavioral1/memory/2712-129-0x0000000001000000-0x00000000016C7000-memory.dmp themida behavioral1/memory/2712-130-0x0000000001000000-0x00000000016C7000-memory.dmp themida C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe themida C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe themida behavioral1/memory/1900-140-0x0000000000AB0000-0x0000000001204000-memory.dmp themida behavioral1/memory/1900-141-0x0000000000AB0000-0x0000000001204000-memory.dmp themida behavioral1/memory/1900-142-0x0000000000AB0000-0x0000000001204000-memory.dmp themida behavioral1/memory/1900-143-0x0000000000AB0000-0x0000000001204000-memory.dmp themida -
Processes:
dehkan.exedipodevp.exeDpEditor.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dehkan.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dipodevp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DpEditor.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 14 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
dehkan.exedipodevp.exeDpEditor.exepid process 1368 dehkan.exe 2712 dipodevp.exe 1900 DpEditor.exe -
Drops file in Program Files directory 3 IoCs
Processes:
1e224644880c67be4e40bf9289e1277094d66e7cf7547bb9bc2290c79bd2ac2e.exedescription ioc process File created C:\Program Files (x86)\foler\olader\acledit.dll 1e224644880c67be4e40bf9289e1277094d66e7cf7547bb9bc2290c79bd2ac2e.exe File created C:\Program Files (x86)\foler\olader\acppage.dll 1e224644880c67be4e40bf9289e1277094d66e7cf7547bb9bc2290c79bd2ac2e.exe File created C:\Program Files (x86)\foler\olader\adprovider.dll 1e224644880c67be4e40bf9289e1277094d66e7cf7547bb9bc2290c79bd2ac2e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dipodevp.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dipodevp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dipodevp.exe -
Modifies registry class 1 IoCs
Processes:
dipodevp.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings dipodevp.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
DpEditor.exepid process 1900 DpEditor.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
dehkan.exedipodevp.exeDpEditor.exepid process 1368 dehkan.exe 1368 dehkan.exe 2712 dipodevp.exe 2712 dipodevp.exe 1900 DpEditor.exe 1900 DpEditor.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
1e224644880c67be4e40bf9289e1277094d66e7cf7547bb9bc2290c79bd2ac2e.exedipodevp.exedehkan.exeugvvljoyxs.exedescription pid process target process PID 3596 wrote to memory of 1368 3596 1e224644880c67be4e40bf9289e1277094d66e7cf7547bb9bc2290c79bd2ac2e.exe dehkan.exe PID 3596 wrote to memory of 1368 3596 1e224644880c67be4e40bf9289e1277094d66e7cf7547bb9bc2290c79bd2ac2e.exe dehkan.exe PID 3596 wrote to memory of 1368 3596 1e224644880c67be4e40bf9289e1277094d66e7cf7547bb9bc2290c79bd2ac2e.exe dehkan.exe PID 3596 wrote to memory of 2712 3596 1e224644880c67be4e40bf9289e1277094d66e7cf7547bb9bc2290c79bd2ac2e.exe dipodevp.exe PID 3596 wrote to memory of 2712 3596 1e224644880c67be4e40bf9289e1277094d66e7cf7547bb9bc2290c79bd2ac2e.exe dipodevp.exe PID 3596 wrote to memory of 2712 3596 1e224644880c67be4e40bf9289e1277094d66e7cf7547bb9bc2290c79bd2ac2e.exe dipodevp.exe PID 2712 wrote to memory of 1540 2712 dipodevp.exe ugvvljoyxs.exe PID 2712 wrote to memory of 1540 2712 dipodevp.exe ugvvljoyxs.exe PID 2712 wrote to memory of 1540 2712 dipodevp.exe ugvvljoyxs.exe PID 2712 wrote to memory of 784 2712 dipodevp.exe WScript.exe PID 2712 wrote to memory of 784 2712 dipodevp.exe WScript.exe PID 2712 wrote to memory of 784 2712 dipodevp.exe WScript.exe PID 1368 wrote to memory of 1900 1368 dehkan.exe DpEditor.exe PID 1368 wrote to memory of 1900 1368 dehkan.exe DpEditor.exe PID 1368 wrote to memory of 1900 1368 dehkan.exe DpEditor.exe PID 2712 wrote to memory of 3732 2712 dipodevp.exe WScript.exe PID 2712 wrote to memory of 3732 2712 dipodevp.exe WScript.exe PID 2712 wrote to memory of 3732 2712 dipodevp.exe WScript.exe PID 1540 wrote to memory of 1560 1540 ugvvljoyxs.exe rundll32.exe PID 1540 wrote to memory of 1560 1540 ugvvljoyxs.exe rundll32.exe PID 1540 wrote to memory of 1560 1540 ugvvljoyxs.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e224644880c67be4e40bf9289e1277094d66e7cf7547bb9bc2290c79bd2ac2e.exe"C:\Users\Admin\AppData\Local\Temp\1e224644880c67be4e40bf9289e1277094d66e7cf7547bb9bc2290c79bd2ac2e.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\faring\dehkan.exe"C:\Users\Admin\AppData\Local\Temp\faring\dehkan.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\faring\dipodevp.exe"C:\Users\Admin\AppData\Local\Temp\faring\dipodevp.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ugvvljoyxs.exe"C:\Users\Admin\AppData\Local\Temp\ugvvljoyxs.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\UGVVLJ~1.DLL,s C:\Users\Admin\AppData\Local\Temp\UGVVLJ~1.EXE4⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\cagdoybtci.vbs"3⤵
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\jvnpuom.vbs"3⤵
- Blocklisted process makes network request
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751MD5
54e9306f95f32e50ccd58af19753d929
SHA1eab9457321f34d4dcf7d4a0ac83edc9131bf7c57
SHA25645f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72
SHA5128711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751MD5
9d147215f2df893fd0944e95316d1a4b
SHA1825c7b234842a50bfbd9a6527741a59217338ccf
SHA25698275871a91d373a72a9c75fb4f76b76889d688f59eebad132709d3f9942fe58
SHA51240b2222d8e3fdc447bd030591c3fc1666783df8c3cdea92e9671b4dfa7523f35ee010e72d31c3ba4b009c6ab6ffba4251ab5bb46b622e604fd02370eb8039d97
-
C:\Users\Admin\AppData\Local\Temp\UGVVLJ~1.DLLMD5
bacce6ed0bab72761fa4e784e93a4365
SHA12d70de082c81fd35d711843a0e754be978f0e76e
SHA25675591b9b3b4936cacc0a92dab7ba9a7ed24c0952691684483f119c116d66c0a7
SHA5126c72b1753029f0fafb0971f5e66da5e41ec99da02e3f186730dc1b3d497423b0d92674d52da7f9755b9c1db3a31f284392bf0c97497edbd4a3cf02710288323a
-
C:\Users\Admin\AppData\Local\Temp\cagdoybtci.vbsMD5
15d3fc522e4abdd8826e8c4a7d227dc6
SHA1d96edba11924115087225a00aca8b9f16cfc9b0c
SHA25642bb99525f3df7a8cf3efd458da4bc8323826a304a807161d0eb5ce60ef6d877
SHA512ea4039f563a86ef76fc56bd2028898fde313d3a0f6206e1f6d5080667b35d4ad0cd959fe45224317afb32854a6e5ed75adda1906e237390586f5e338f4c71946
-
C:\Users\Admin\AppData\Local\Temp\faring\dehkan.exeMD5
8d013018cbd8e2de770f984633ad3dc2
SHA1c435e2fddeb819dca3fbbac84dfbffdc9f134b40
SHA256bd5ed485d3189ff442bea4067aedf80ee9264f701f57ee0c3db346df334fcbb3
SHA512c7f21a018c569c6cc29b7c128e6c9ef500a3e6383fff14921335d265f5174e34374ae7aef964fd3979384d32991c69b422bcb748183d07aab41b41abc2228c15
-
C:\Users\Admin\AppData\Local\Temp\faring\dehkan.exeMD5
8d013018cbd8e2de770f984633ad3dc2
SHA1c435e2fddeb819dca3fbbac84dfbffdc9f134b40
SHA256bd5ed485d3189ff442bea4067aedf80ee9264f701f57ee0c3db346df334fcbb3
SHA512c7f21a018c569c6cc29b7c128e6c9ef500a3e6383fff14921335d265f5174e34374ae7aef964fd3979384d32991c69b422bcb748183d07aab41b41abc2228c15
-
C:\Users\Admin\AppData\Local\Temp\faring\dipodevp.exeMD5
60a8d5c07264b9058c28548dc18feafe
SHA1e60f40321f2f194e2f2d2d860e11f2c6959e30b3
SHA256528049ab9e8f2ce40419e1ded49dcfd676d65b4b744dbe2490cf1254bfe236ba
SHA512e2ae2e8c00bf3c3d26fa26c0d0c35afd5375edbf90a442fb51f3f5b5bbd9e8c01bc158a19d512430d0be411295dc4489995e42b6af3f19baea1d90b1e6a38903
-
C:\Users\Admin\AppData\Local\Temp\faring\dipodevp.exeMD5
60a8d5c07264b9058c28548dc18feafe
SHA1e60f40321f2f194e2f2d2d860e11f2c6959e30b3
SHA256528049ab9e8f2ce40419e1ded49dcfd676d65b4b744dbe2490cf1254bfe236ba
SHA512e2ae2e8c00bf3c3d26fa26c0d0c35afd5375edbf90a442fb51f3f5b5bbd9e8c01bc158a19d512430d0be411295dc4489995e42b6af3f19baea1d90b1e6a38903
-
C:\Users\Admin\AppData\Local\Temp\jvnpuom.vbsMD5
960caad0d3321b49d7658f4c458a598d
SHA174f6e57d810d01f6046cf9e1700b43debf85ec73
SHA25632d3eaef3af6a0e9fa926ddfc0694df412acefd9505321c4691a8b35247671f5
SHA5120cf3dbdbe0cb4b362766b31bfe0187ebbccae765880117e7949bb0b3f453b413008baa26df09cdf15b67b8b04a264a8c62ff35ed6fc1c3da27603b90ff1faff5
-
C:\Users\Admin\AppData\Local\Temp\ugvvljoyxs.exeMD5
e30439253fcddef70e664b75590161ef
SHA1422108f8b3c20d467f7d3f311e622b4c5f3ed6df
SHA25698365896cc37bbd213f8e0f4b1d0d98581e7243c84d802eb4966abf276e2945a
SHA5120005908ec2d4ae95cbd52c5185832c9f76bc2c75b677549b920e0329860d47be08dd4750160be261a6e3cfd7f52c206f358610fd862937fb062e8a285cf13d32
-
C:\Users\Admin\AppData\Local\Temp\ugvvljoyxs.exeMD5
e30439253fcddef70e664b75590161ef
SHA1422108f8b3c20d467f7d3f311e622b4c5f3ed6df
SHA25698365896cc37bbd213f8e0f4b1d0d98581e7243c84d802eb4966abf276e2945a
SHA5120005908ec2d4ae95cbd52c5185832c9f76bc2c75b677549b920e0329860d47be08dd4750160be261a6e3cfd7f52c206f358610fd862937fb062e8a285cf13d32
-
C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exeMD5
8d013018cbd8e2de770f984633ad3dc2
SHA1c435e2fddeb819dca3fbbac84dfbffdc9f134b40
SHA256bd5ed485d3189ff442bea4067aedf80ee9264f701f57ee0c3db346df334fcbb3
SHA512c7f21a018c569c6cc29b7c128e6c9ef500a3e6383fff14921335d265f5174e34374ae7aef964fd3979384d32991c69b422bcb748183d07aab41b41abc2228c15
-
C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exeMD5
8d013018cbd8e2de770f984633ad3dc2
SHA1c435e2fddeb819dca3fbbac84dfbffdc9f134b40
SHA256bd5ed485d3189ff442bea4067aedf80ee9264f701f57ee0c3db346df334fcbb3
SHA512c7f21a018c569c6cc29b7c128e6c9ef500a3e6383fff14921335d265f5174e34374ae7aef964fd3979384d32991c69b422bcb748183d07aab41b41abc2228c15
-
\Users\Admin\AppData\Local\Temp\UGVVLJ~1.DLLMD5
bacce6ed0bab72761fa4e784e93a4365
SHA12d70de082c81fd35d711843a0e754be978f0e76e
SHA25675591b9b3b4936cacc0a92dab7ba9a7ed24c0952691684483f119c116d66c0a7
SHA5126c72b1753029f0fafb0971f5e66da5e41ec99da02e3f186730dc1b3d497423b0d92674d52da7f9755b9c1db3a31f284392bf0c97497edbd4a3cf02710288323a
-
\Users\Admin\AppData\Local\Temp\UGVVLJ~1.DLLMD5
bacce6ed0bab72761fa4e784e93a4365
SHA12d70de082c81fd35d711843a0e754be978f0e76e
SHA25675591b9b3b4936cacc0a92dab7ba9a7ed24c0952691684483f119c116d66c0a7
SHA5126c72b1753029f0fafb0971f5e66da5e41ec99da02e3f186730dc1b3d497423b0d92674d52da7f9755b9c1db3a31f284392bf0c97497edbd4a3cf02710288323a
-
\Users\Admin\AppData\Local\Temp\nsp2845.tmp\UAC.dllMD5
adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
memory/784-135-0x0000000000000000-mapping.dmp
-
memory/1368-125-0x0000000000E10000-0x0000000001564000-memory.dmpFilesize
7.3MB
-
memory/1368-126-0x0000000000E10000-0x0000000001564000-memory.dmpFilesize
7.3MB
-
memory/1368-116-0x0000000000000000-mapping.dmp
-
memory/1368-122-0x0000000000E10000-0x0000000001564000-memory.dmpFilesize
7.3MB
-
memory/1368-123-0x0000000000E10000-0x0000000001564000-memory.dmpFilesize
7.3MB
-
memory/1368-124-0x0000000077810000-0x000000007799E000-memory.dmpFilesize
1.6MB
-
memory/1540-145-0x0000000002286000-0x0000000002415000-memory.dmpFilesize
1.6MB
-
memory/1540-132-0x0000000000000000-mapping.dmp
-
memory/1540-146-0x0000000002420000-0x00000000025C6000-memory.dmpFilesize
1.6MB
-
memory/1540-147-0x0000000000400000-0x000000000064D000-memory.dmpFilesize
2.3MB
-
memory/1560-156-0x0000000000BB0000-0x0000000000E2C000-memory.dmpFilesize
2.5MB
-
memory/1560-152-0x0000000000000000-mapping.dmp
-
memory/1900-143-0x0000000000AB0000-0x0000000001204000-memory.dmpFilesize
7.3MB
-
memory/1900-144-0x0000000077810000-0x000000007799E000-memory.dmpFilesize
1.6MB
-
memory/1900-142-0x0000000000AB0000-0x0000000001204000-memory.dmpFilesize
7.3MB
-
memory/1900-137-0x0000000000000000-mapping.dmp
-
memory/1900-141-0x0000000000AB0000-0x0000000001204000-memory.dmpFilesize
7.3MB
-
memory/1900-140-0x0000000000AB0000-0x0000000001204000-memory.dmpFilesize
7.3MB
-
memory/2712-127-0x0000000001000000-0x00000000016C7000-memory.dmpFilesize
6.8MB
-
memory/2712-128-0x0000000001000000-0x00000000016C7000-memory.dmpFilesize
6.8MB
-
memory/2712-129-0x0000000001000000-0x00000000016C7000-memory.dmpFilesize
6.8MB
-
memory/2712-130-0x0000000001000000-0x00000000016C7000-memory.dmpFilesize
6.8MB
-
memory/2712-119-0x0000000000000000-mapping.dmp
-
memory/2712-131-0x0000000077810000-0x000000007799E000-memory.dmpFilesize
1.6MB
-
memory/3732-148-0x0000000000000000-mapping.dmp