Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 19:18
Static task
static1
Behavioral task
behavioral1
Sample
DOC_DELI.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
DOC_DELI.exe
Resource
win10v2004-20220414-en
General
-
Target
DOC_DELI.exe
-
Size
976KB
-
MD5
e48a6f316e081f116c1b9c812f35694d
-
SHA1
b8c3e97deebce1cfaa821e8ef822754b7c0fdec0
-
SHA256
adbaaaedf5553fca319364ec9f2685b546fdc135352e96654c692b12e7cd40ed
-
SHA512
b6dbc3ec04fffe634dde9d990e9035e1f7c9a79c59a1ebb4a9bade12fa70f01ba732ae276d02662ba671bf716d3450c75c922ebdf8821c7ac3c35f4a7010cfba
Malware Config
Extracted
warzonerat
76.8.53.133:1198
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.crestftb.com - Port:
587 - Username:
ikmero@crestftb.com - Password:
BRIAN22@1234567891011 - Email To:
snakelogger@crestftb.com
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2228-150-0x00000000006E0000-0x0000000000706000-memory.dmp family_snakekeylogger C:\Users\Admin\AppData\Local\Temp\nerronewsn.exe family_snakekeylogger C:\Users\Admin\AppData\Local\Temp\nerronewsn.exe family_snakekeylogger -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Executes dropped EXE 5 IoCs
Processes:
all crypto stealer.exenerronewsn.exewarpoison.exewindowsupdater.exe.exepid process 3152 all crypto stealer.exe 2228 nerronewsn.exe 4148 warpoison.exe 2752 windowsupdater.exe 2192 .exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
DOC_DELI.exeall crypto stealer.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation DOC_DELI.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation all crypto stealer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
all crypto stealer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Sector = "C:\\Users\\Admin\\AppData\\Roaming\\.exe" all crypto stealer.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 50 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
DOC_DELI.exedescription pid process target process PID 1368 set thread context of 3920 1368 DOC_DELI.exe DOC_DELI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
all crypto stealer.exe.exepid process 3152 all crypto stealer.exe 2192 .exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
DOC_DELI.exenerronewsn.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 1368 DOC_DELI.exe 1368 DOC_DELI.exe 1368 DOC_DELI.exe 1368 DOC_DELI.exe 1368 DOC_DELI.exe 1368 DOC_DELI.exe 1368 DOC_DELI.exe 1368 DOC_DELI.exe 1368 DOC_DELI.exe 2228 nerronewsn.exe 4764 powershell.exe 4764 powershell.exe 564 powershell.exe 564 powershell.exe 1468 powershell.exe 1468 powershell.exe 400 powershell.exe 400 powershell.exe 4784 powershell.exe 4784 powershell.exe 5104 powershell.exe 5104 powershell.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
DOC_DELI.exenerronewsn.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1368 DOC_DELI.exe Token: SeDebugPrivilege 2228 nerronewsn.exe Token: SeDebugPrivilege 4764 powershell.exe Token: SeDebugPrivilege 564 powershell.exe Token: SeDebugPrivilege 1468 powershell.exe Token: SeDebugPrivilege 400 powershell.exe Token: SeDebugPrivilege 4784 powershell.exe Token: SeDebugPrivilege 5104 powershell.exe -
Suspicious use of WriteProcessMemory 55 IoCs
Processes:
DOC_DELI.exeDOC_DELI.exeall crypto stealer.exewarpoison.execmd.exewindowsupdater.exe.exedescription pid process target process PID 1368 wrote to memory of 4108 1368 DOC_DELI.exe DOC_DELI.exe PID 1368 wrote to memory of 4108 1368 DOC_DELI.exe DOC_DELI.exe PID 1368 wrote to memory of 4108 1368 DOC_DELI.exe DOC_DELI.exe PID 1368 wrote to memory of 3920 1368 DOC_DELI.exe DOC_DELI.exe PID 1368 wrote to memory of 3920 1368 DOC_DELI.exe DOC_DELI.exe PID 1368 wrote to memory of 3920 1368 DOC_DELI.exe DOC_DELI.exe PID 1368 wrote to memory of 3920 1368 DOC_DELI.exe DOC_DELI.exe PID 1368 wrote to memory of 3920 1368 DOC_DELI.exe DOC_DELI.exe PID 1368 wrote to memory of 3920 1368 DOC_DELI.exe DOC_DELI.exe PID 1368 wrote to memory of 3920 1368 DOC_DELI.exe DOC_DELI.exe PID 1368 wrote to memory of 3920 1368 DOC_DELI.exe DOC_DELI.exe PID 3920 wrote to memory of 3152 3920 DOC_DELI.exe all crypto stealer.exe PID 3920 wrote to memory of 3152 3920 DOC_DELI.exe all crypto stealer.exe PID 3920 wrote to memory of 3152 3920 DOC_DELI.exe all crypto stealer.exe PID 3920 wrote to memory of 2228 3920 DOC_DELI.exe nerronewsn.exe PID 3920 wrote to memory of 2228 3920 DOC_DELI.exe nerronewsn.exe PID 3920 wrote to memory of 2228 3920 DOC_DELI.exe nerronewsn.exe PID 3920 wrote to memory of 4148 3920 DOC_DELI.exe warpoison.exe PID 3920 wrote to memory of 4148 3920 DOC_DELI.exe warpoison.exe PID 3920 wrote to memory of 4148 3920 DOC_DELI.exe warpoison.exe PID 3152 wrote to memory of 4764 3152 all crypto stealer.exe powershell.exe PID 3152 wrote to memory of 4764 3152 all crypto stealer.exe powershell.exe PID 3152 wrote to memory of 4764 3152 all crypto stealer.exe powershell.exe PID 4148 wrote to memory of 564 4148 warpoison.exe powershell.exe PID 4148 wrote to memory of 564 4148 warpoison.exe powershell.exe PID 4148 wrote to memory of 564 4148 warpoison.exe powershell.exe PID 4148 wrote to memory of 1688 4148 warpoison.exe cmd.exe PID 4148 wrote to memory of 1688 4148 warpoison.exe cmd.exe PID 4148 wrote to memory of 1688 4148 warpoison.exe cmd.exe PID 4148 wrote to memory of 2752 4148 warpoison.exe windowsupdater.exe PID 4148 wrote to memory of 2752 4148 warpoison.exe windowsupdater.exe PID 4148 wrote to memory of 2752 4148 warpoison.exe windowsupdater.exe PID 1688 wrote to memory of 5052 1688 cmd.exe reg.exe PID 1688 wrote to memory of 5052 1688 cmd.exe reg.exe PID 1688 wrote to memory of 5052 1688 cmd.exe reg.exe PID 3152 wrote to memory of 1468 3152 all crypto stealer.exe powershell.exe PID 3152 wrote to memory of 1468 3152 all crypto stealer.exe powershell.exe PID 3152 wrote to memory of 1468 3152 all crypto stealer.exe powershell.exe PID 2752 wrote to memory of 400 2752 windowsupdater.exe powershell.exe PID 2752 wrote to memory of 400 2752 windowsupdater.exe powershell.exe PID 2752 wrote to memory of 400 2752 windowsupdater.exe powershell.exe PID 2752 wrote to memory of 1180 2752 windowsupdater.exe cmd.exe PID 2752 wrote to memory of 1180 2752 windowsupdater.exe cmd.exe PID 2752 wrote to memory of 1180 2752 windowsupdater.exe cmd.exe PID 2752 wrote to memory of 1180 2752 windowsupdater.exe cmd.exe PID 2752 wrote to memory of 1180 2752 windowsupdater.exe cmd.exe PID 3152 wrote to memory of 2192 3152 all crypto stealer.exe .exe PID 3152 wrote to memory of 2192 3152 all crypto stealer.exe .exe PID 3152 wrote to memory of 2192 3152 all crypto stealer.exe .exe PID 2192 wrote to memory of 4784 2192 .exe powershell.exe PID 2192 wrote to memory of 4784 2192 .exe powershell.exe PID 2192 wrote to memory of 4784 2192 .exe powershell.exe PID 2192 wrote to memory of 5104 2192 .exe powershell.exe PID 2192 wrote to memory of 5104 2192 .exe powershell.exe PID 2192 wrote to memory of 5104 2192 .exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DOC_DELI.exe"C:\Users\Admin\AppData\Local\Temp\DOC_DELI.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\DOC_DELI.exe"C:\Users\Admin\AppData\Local\Temp\DOC_DELI.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\DOC_DELI.exe"C:\Users\Admin\AppData\Local\Temp\DOC_DELI.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\all crypto stealer.exe"C:\Users\Admin\AppData\Local\Temp\all crypto stealer.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" [bool](([System.Security.Principal.WindowsIdentity]::GetCurrent()).groups -match 'S-1-5-32-544')4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\.exe"C:\Users\Admin\AppData\Roaming\.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" [bool](([System.Security.Principal.WindowsIdentity]::GetCurrent()).groups -match 'S-1-5-32-544')5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\nerronewsn.exe"C:\Users\Admin\AppData\Local\Temp\nerronewsn.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\warpoison.exe"C:\Users\Admin\AppData\Local\Temp\warpoison.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /f /v Load /t REG_SZ /d "C:\ProgramData\windowsupdater.exe"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /f /v Load /t REG_SZ /d "C:\ProgramData\windowsupdater.exe"5⤵
-
C:\ProgramData\windowsupdater.exe"C:\ProgramData\windowsupdater.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"5⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\windowsupdater.exeFilesize
152KB
MD537551bca5a31bf04580585fb78bb460a
SHA1d6020915fb1061775a6e36c5d5f22e1e974af70e
SHA2564ed3c116cd9e875131f14d9dfef6dc345192d0b245615536da1cfabc893e3275
SHA5123e386f42005ac5308b9963bb4505280e3afcd8ec1e24a0c52a4eb836e553a8ebe32e2d57b643bf1044b4e0405879b9a4e026522c9f4415fbad75d059f3a10af9
-
C:\ProgramData\windowsupdater.exeFilesize
152KB
MD537551bca5a31bf04580585fb78bb460a
SHA1d6020915fb1061775a6e36c5d5f22e1e974af70e
SHA2564ed3c116cd9e875131f14d9dfef6dc345192d0b245615536da1cfabc893e3275
SHA5123e386f42005ac5308b9963bb4505280e3afcd8ec1e24a0c52a4eb836e553a8ebe32e2d57b643bf1044b4e0405879b9a4e026522c9f4415fbad75d059f3a10af9
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DOC_DELI.exe.logFilesize
1KB
MD5e08f822522c617a40840c62e4b0fb45e
SHA1ae516dca4da5234be6676d3f234c19ec55725be7
SHA256bd9d5e9f7fe6fcff17d873555d4077d15f7d6cdda1183e7f7d278b735ffe1fd7
SHA512894a7fb7bbc18ac6ba13378f58a7db80ad00d6080be9a66b01cae8e23e41d9d2d4cd53c1e20669356b73590c8a3ebfda4bdda3258f81240db56c4a81b7313fe4
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
1KB
MD528854213fdaa59751b2b4cfe772289cc
SHA1fa7058052780f4b856dc2d56b88163ed55deb6ab
SHA2567c65fe71d47e0de69a15b95d1ee4b433c07a1d6f00f37dd32aee3666bb84a915
SHA5121e2c928242bdef287b1e8afe8c37427cfd3b7a83c37d4e00e45bcbaa38c9b0bf96f869a062c9bc6bb58ecd36e687a69b21d5b07803e6615a9b632922c1c5ace4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
12KB
MD56a1efada499dd8da980a50102c0520b0
SHA120ea98c6efa3c9a951032768c36239b2a181fd8e
SHA256fff50712ebb3eb2a094b2cae6a167064a06ad0fef6099d80c9c15d933356ac38
SHA5123fdf286d2aa074752542b709037109500632448a11ed6fa0e9fcd46b5cda6f17fad76c8d46dde88a5c3986a0190755b5f7cccf1e4eb52912c183d2293b13668b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD5e8dcb9c32cd90181220df6e4e631becf
SHA1082507584e2838f07aca1c7aca7d5bf29b80c157
SHA25615090d46ba64d0f40fed3ede39b1f66269fef3f449924498f7434018343c2373
SHA5123501d536484a371b02c11935feb894902d79b3f912295853d51798baef566af59c1880c28db228e0a6c6df0e687166731cd18eafb1acee523fef1745f86958ff
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD504af92aebdc2131b01643078bdf4d856
SHA1fe95792684a6538040b92f9b59d9c6b790f76472
SHA256b3068f3c52c3348df612de990e0e5f966b2add495affaa8ce52c191bbe26f526
SHA51232faf027c98f6055aa724794b247022aadd4dcee77b859717f45594d80a9ff49b5b7734ce6690f69c5b77404fb1b27558c2af7b6056641f4b4efd4b00f79a9c7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD504af92aebdc2131b01643078bdf4d856
SHA1fe95792684a6538040b92f9b59d9c6b790f76472
SHA256b3068f3c52c3348df612de990e0e5f966b2add495affaa8ce52c191bbe26f526
SHA51232faf027c98f6055aa724794b247022aadd4dcee77b859717f45594d80a9ff49b5b7734ce6690f69c5b77404fb1b27558c2af7b6056641f4b4efd4b00f79a9c7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
12KB
MD5ba3bf09d4e615715b3c5cd983a6403d8
SHA1bc86a29e8af774a4149d92953a73c48591f0fca8
SHA256ee542f3fe08ce4c81f89d3bd2a6e5a2db15b0698872c6f2b31ee73d9340636f2
SHA5125c34a473b7a7243a530a10ca3c516d70a428dc00cb3cc02c824b0cddec673f3b5dd08e370db60c0a4fa8f021daa61cb68c9a53242c8b245b25294435f52ab478
-
C:\Users\Admin\AppData\Local\Temp\all crypto stealer.exeFilesize
18KB
MD550da867177fb32fc3c1a5c27afd24d21
SHA1f7cb78d20dcd982f7e2c4c3a6761e1587c82560c
SHA2561655025121085518a3dd9259d54c15107db597ea36c97433ed0609e87894df73
SHA51229f30f7ca3dedea8f34e9ce3f9303d09eaec5aac6ef1ca0de89c5705790045e448854fa82f2ce15684f321552d2a4061f4c3cb373d73cc22b3345ad5dcc62356
-
C:\Users\Admin\AppData\Local\Temp\all crypto stealer.exeFilesize
18KB
MD550da867177fb32fc3c1a5c27afd24d21
SHA1f7cb78d20dcd982f7e2c4c3a6761e1587c82560c
SHA2561655025121085518a3dd9259d54c15107db597ea36c97433ed0609e87894df73
SHA51229f30f7ca3dedea8f34e9ce3f9303d09eaec5aac6ef1ca0de89c5705790045e448854fa82f2ce15684f321552d2a4061f4c3cb373d73cc22b3345ad5dcc62356
-
C:\Users\Admin\AppData\Local\Temp\nerronewsn.exeFilesize
127KB
MD5755b1262aa6b3a6b267b41580c7e8972
SHA1b2f0f7293cf7162895df2976eecfc1084eeba2fc
SHA256d185986cb9b369a5f5d641c80d09adc878771b33ab020879629fb570c2cd7cec
SHA512d6fa491a7e4ad296532bbff04af9afd61e6a7edcceba7f45f3e9e132678cb644737f392f4a62337211e3a6c3b66ecd5c6d84c6ad251125d76b5766da9a510c42
-
C:\Users\Admin\AppData\Local\Temp\nerronewsn.exeFilesize
127KB
MD5755b1262aa6b3a6b267b41580c7e8972
SHA1b2f0f7293cf7162895df2976eecfc1084eeba2fc
SHA256d185986cb9b369a5f5d641c80d09adc878771b33ab020879629fb570c2cd7cec
SHA512d6fa491a7e4ad296532bbff04af9afd61e6a7edcceba7f45f3e9e132678cb644737f392f4a62337211e3a6c3b66ecd5c6d84c6ad251125d76b5766da9a510c42
-
C:\Users\Admin\AppData\Local\Temp\warpoison.exeFilesize
152KB
MD537551bca5a31bf04580585fb78bb460a
SHA1d6020915fb1061775a6e36c5d5f22e1e974af70e
SHA2564ed3c116cd9e875131f14d9dfef6dc345192d0b245615536da1cfabc893e3275
SHA5123e386f42005ac5308b9963bb4505280e3afcd8ec1e24a0c52a4eb836e553a8ebe32e2d57b643bf1044b4e0405879b9a4e026522c9f4415fbad75d059f3a10af9
-
C:\Users\Admin\AppData\Local\Temp\warpoison.exeFilesize
152KB
MD537551bca5a31bf04580585fb78bb460a
SHA1d6020915fb1061775a6e36c5d5f22e1e974af70e
SHA2564ed3c116cd9e875131f14d9dfef6dc345192d0b245615536da1cfabc893e3275
SHA5123e386f42005ac5308b9963bb4505280e3afcd8ec1e24a0c52a4eb836e553a8ebe32e2d57b643bf1044b4e0405879b9a4e026522c9f4415fbad75d059f3a10af9
-
C:\Users\Admin\AppData\Roaming\.exeFilesize
38.7MB
MD5a6d70b31418be484a2e60eb0ca55daf1
SHA19a2a7aeb781aa4850765d417bdd1934dfb553530
SHA256c986f9c4772042a18274d7063c02467bf9b5763a3f3de4abe018bf6f2b826574
SHA5121cfeded32c8463e47f0e9681d322761a8d75b2722dd218108e3f2e047e866badd4371af7da532bf83bf958a1d52f71a12e268774e082393b569c234e79f39796
-
C:\Users\Admin\AppData\Roaming\.exeFilesize
38.7MB
MD5a6d70b31418be484a2e60eb0ca55daf1
SHA19a2a7aeb781aa4850765d417bdd1934dfb553530
SHA256c986f9c4772042a18274d7063c02467bf9b5763a3f3de4abe018bf6f2b826574
SHA5121cfeded32c8463e47f0e9681d322761a8d75b2722dd218108e3f2e047e866badd4371af7da532bf83bf958a1d52f71a12e268774e082393b569c234e79f39796
-
memory/400-173-0x0000000000000000-mapping.dmp
-
memory/400-177-0x0000000071D70000-0x0000000071DBC000-memory.dmpFilesize
304KB
-
memory/564-179-0x0000000007FE0000-0x0000000007FFA000-memory.dmpFilesize
104KB
-
memory/564-157-0x0000000000000000-mapping.dmp
-
memory/564-166-0x0000000007BB0000-0x0000000007BE2000-memory.dmpFilesize
200KB
-
memory/564-180-0x0000000007FD0000-0x0000000007FD8000-memory.dmpFilesize
32KB
-
memory/564-167-0x0000000071D70000-0x0000000071DBC000-memory.dmpFilesize
304KB
-
memory/564-168-0x0000000006F50000-0x0000000006F6E000-memory.dmpFilesize
120KB
-
memory/564-170-0x0000000008320000-0x000000000899A000-memory.dmpFilesize
6.5MB
-
memory/1180-174-0x0000000000000000-mapping.dmp
-
memory/1180-176-0x00000000008A0000-0x00000000008A1000-memory.dmpFilesize
4KB
-
memory/1368-131-0x0000000005630000-0x0000000005BD4000-memory.dmpFilesize
5.6MB
-
memory/1368-133-0x0000000004FF0000-0x0000000004FFA000-memory.dmpFilesize
40KB
-
memory/1368-132-0x0000000005080000-0x0000000005112000-memory.dmpFilesize
584KB
-
memory/1368-130-0x0000000000550000-0x000000000064A000-memory.dmpFilesize
1000KB
-
memory/1368-135-0x0000000000FE0000-0x0000000001046000-memory.dmpFilesize
408KB
-
memory/1368-134-0x00000000077F0000-0x000000000788C000-memory.dmpFilesize
624KB
-
memory/1468-178-0x00000000078B0000-0x00000000078BE000-memory.dmpFilesize
56KB
-
memory/1468-171-0x0000000007680000-0x000000000769A000-memory.dmpFilesize
104KB
-
memory/1468-163-0x0000000000000000-mapping.dmp
-
memory/1468-175-0x0000000007950000-0x00000000079E6000-memory.dmpFilesize
600KB
-
memory/1468-169-0x0000000071D70000-0x0000000071DBC000-memory.dmpFilesize
304KB
-
memory/1468-172-0x00000000076E0000-0x00000000076EA000-memory.dmpFilesize
40KB
-
memory/1688-158-0x0000000000000000-mapping.dmp
-
memory/2192-183-0x0000000000000000-mapping.dmp
-
memory/2228-143-0x0000000000000000-mapping.dmp
-
memory/2228-150-0x00000000006E0000-0x0000000000706000-memory.dmpFilesize
152KB
-
memory/2752-159-0x0000000000000000-mapping.dmp
-
memory/3152-144-0x0000000000010000-0x000000000001A000-memory.dmpFilesize
40KB
-
memory/3152-140-0x0000000000000000-mapping.dmp
-
memory/3920-137-0x0000000000000000-mapping.dmp
-
memory/3920-138-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/4108-136-0x0000000000000000-mapping.dmp
-
memory/4148-147-0x0000000000000000-mapping.dmp
-
memory/4764-156-0x0000000005BA0000-0x0000000005BBE000-memory.dmpFilesize
120KB
-
memory/4764-152-0x0000000002290000-0x00000000022C6000-memory.dmpFilesize
216KB
-
memory/4764-153-0x0000000004DC0000-0x00000000053E8000-memory.dmpFilesize
6.2MB
-
memory/4764-154-0x0000000004CF0000-0x0000000004D12000-memory.dmpFilesize
136KB
-
memory/4764-155-0x00000000054E0000-0x0000000005546000-memory.dmpFilesize
408KB
-
memory/4764-151-0x0000000000000000-mapping.dmp
-
memory/4784-186-0x0000000000000000-mapping.dmp
-
memory/5052-162-0x0000000000000000-mapping.dmp
-
memory/5104-188-0x0000000000000000-mapping.dmp
-
memory/5104-190-0x0000000071D70000-0x0000000071DBC000-memory.dmpFilesize
304KB