Analysis

  • max time kernel
    117s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-10-2022 07:33

General

  • Target

    73f075adda1fe81dea4022f4e06fb64a.exe

  • Size

    538KB

  • MD5

    73f075adda1fe81dea4022f4e06fb64a

  • SHA1

    ca241492da03a4d86fd43a5a076e22ac6949505c

  • SHA256

    77cb17ef2f4f282f39838e7430bf040c3356e59ae8f13cbd4e670712e9f44a4e

  • SHA512

    c3e5b5efd9c7842320657a09770f5f0d75b5143cffbafd179a7fd70bf8d48a8246cee948462d190f9d032599a2f6d5947d9ed694732b2dcb68d5429c4843d010

  • SSDEEP

    12288:JaX8kSXZJS+FTH9+3HI6iR8WnDRzMy6NVD8TS6SJuiRxkorXl:TpfFTdEri9sjS1a5tzl

Score
10/10

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Async RAT payload 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 56 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73f075adda1fe81dea4022f4e06fb64a.exe
    "C:\Users\Admin\AppData\Local\Temp\73f075adda1fe81dea4022f4e06fb64a.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2824
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAeAB1ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHUAcwBiACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGgAYgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGQAdABkACMAPgA="
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5080
    • C:\Users\Admin\AppData\Local\Temp\Wzhtwkrl.exe
      "C:\Users\Admin\AppData\Local\Temp\Wzhtwkrl.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3260
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA7ACAAUwBlAHQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3024
    • C:\Users\Admin\AppData\Local\Temp\PhoenixClientbaluci.exe
      "C:\Users\Admin\AppData\Local\Temp\PhoenixClientbaluci.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2388
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c powershell -Command Add-MpPreference -ExclusionPath '%APPDATA%' & powershell -Command Add-MpPreference -ExclusionPath '%TMP%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%'
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:616
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4308
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1060
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4504
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4328
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "System" /tr '"C:\Users\Admin\AppData\Roaming\System\System.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1212
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "System" /tr '"C:\Users\Admin\AppData\Roaming\System\System.exe"'
          4⤵
          • Creates scheduled task(s)
          PID:3672
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpDE4F.tmp.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3752
        • C:\Windows\system32\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:3668
        • C:\Users\Admin\AppData\Roaming\System\System.exe
          "C:\Users\Admin\AppData\Roaming\System\System.exe"
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1960
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c powershell -Command Add-MpPreference -ExclusionPath '%APPDATA%' & powershell -Command Add-MpPreference -ExclusionPath '%TMP%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%'
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2196
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1340
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2316
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4716
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1668
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" (Get-ItemProperty -Path 'HKLM:\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0*' -Name HardwareInformation.qwMemorySize -ErrorAction SilentlyContinue).'HardwareInformation.qwMemorySize'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1968
  • C:\Users\Admin\AppData\Roaming\Wzhtwkrl.exe
    C:\Users\Admin\AppData\Roaming\Wzhtwkrl.exe
    1⤵
    • Executes dropped EXE
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1328

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
    Filesize

    2KB

    MD5

    d85ba6ff808d9e5444a4b369f5bc2730

    SHA1

    31aa9d96590fff6981b315e0b391b575e4c0804a

    SHA256

    84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

    SHA512

    8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    d28a889fd956d5cb3accfbaf1143eb6f

    SHA1

    157ba54b365341f8ff06707d996b3635da8446f7

    SHA256

    21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

    SHA512

    0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    96d012dd35ee43a23db987854cc9f3eb

    SHA1

    68fb6c90ec116b5464c1a1e7764fd17dc043bf5b

    SHA256

    7e35c3ce2380410d8c23b9475a5b9f0f9a9f43002638a41219e4e8023afd0ef2

    SHA512

    c487d1a9eb7b2290cdbfce6d81df3836d22877efc6fa6aa5357c59ae70f3b577ae7094e69bb589d207f7657c2110a65b669880922c56817c055e5addad0daee7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    d8cb3e9459807e35f02130fad3f9860d

    SHA1

    5af7f32cb8a30e850892b15e9164030a041f4bd6

    SHA256

    2b139c74072ccbdaa17b950f32a6dbc934dfb7af9973d97c9b0d9c498012ba68

    SHA512

    045239ba31367fbdd59e883f74eafc05724e23bd6e8f0c1e7171ea2496a497eb9e0cfcb57285bb81c4d569daadba43d6ef64c626ca48f1e2a59e8d97f0cc9184

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    f41f42c322498af0591f396c59dd4304

    SHA1

    e1e5aa68d73d48bc5e743a34f6c0fa8960ff7514

    SHA256

    d8bd9a4a363ff2ac2dc887759ec6ba4215a4ce0925a8fb9c531573458ee4a31c

    SHA512

    2328a1b402b4fb0de9c451fb630eab58549129d3bcfb70b9834cfbd16065ebaadec006b309ea17ac182d34c53e01705cbc9e0196eb0cbd62600c866e79a1844f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    dfbdf22506805546c7b41166c3bee737

    SHA1

    98406ff84a30122c31e1724820848b418710b705

    SHA256

    5d2b1d66991eb959a32586fc7f26f4e68f6919c0c060cabf6ff3b622e4a9db7b

    SHA512

    f2049d2da6ca963f21656559c49f4d71a239e5ad9e64355cd70c5ae1de1893a1ebb5ff88947c8110d01493d1c4d1b2fd6b44de83bb7ad69f98397928b811c167

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    1KB

    MD5

    3a14d51c4fa33a74752c5ce3278bf31f

    SHA1

    fe3f3e9d8a292ef7e4ca499c1e2312ad0625af5f

    SHA256

    2b29bd3da1415e5d5c46bd00ce3613c771a937c94bb90b535877f482cddf7d48

    SHA512

    1683ae50abe5272664a9fedf2e73bd4a10c238d2f42adb706cbb8308eac52b465d066791e250772c8b3bea084eace7845457c47ed5098423562cb349f61cbb08

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    59d97011e091004eaffb9816aa0b9abd

    SHA1

    1602a56b01dd4b7c577ca27d3117e4bcc1aa657b

    SHA256

    18f381e0db020a763b8c515c346ef58679ab9c403267eacfef5359e272f7e71d

    SHA512

    d9ca49c1a17580981e2c1a50d73c0eecaa7a62f8514741512172e395af2a3d80aeb0f71c58bc7f52c18246d57ba67af09b6bff4776877d6cc6f0245c30e092d6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    44c5a91e282eef94914a4b4bc1e182d4

    SHA1

    68c8f28bcb16c25554fae2be4bd35af67d5c61ce

    SHA256

    09ca0d98d30d86cdb915600b0e348dd4ea8fdd8c97a5318cd952c1882d068568

    SHA512

    caefd6fe88de53c1bd0d91a9e70b4e2f728120712c183747d450b3610d76c3742b942d6822ea49c2744f7bef9928b19b6d0ebf317671b1f0a2b44824fcf44fc3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    5cfe303e798d1cc6c1dab341e7265c15

    SHA1

    cd2834e05191a24e28a100f3f8114d5a7708dc7c

    SHA256

    c4d16552769ca1762f6867bce85589c645ac3dc490b650083d74f853f898cfab

    SHA512

    ef151bbe0033a2caf2d40aff74855a3f42c8171e05a11c8ce93c7039d9430482c43fe93d9164ee94839aff253cad774dbf619dde9a8af38773ca66d59ac3400e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    e3161f4edbc9b963debe22e29658050b

    SHA1

    45dbf88dadafe5dd1cfee1e987c8a219d3208cdb

    SHA256

    1359d6daeaed2f254b162914203c891b23139cc236a3bf75c2dfcbe26265c84a

    SHA512

    006ffb8f37d1f77f8ee79b22ffa413819f565d62773c632b70985759572121c6ab4743139d16d885f8c0ff9d0e0b136686741728b3e142ee54aea3bb733dffb2

  • C:\Users\Admin\AppData\Local\Temp\PhoenixClientbaluci.exe
    Filesize

    62KB

    MD5

    d6dda9cb85261b5fdc12eb22c5d3e6da

    SHA1

    4dc5ed6cd82eb87dbd0dfca4729871ea16aa143b

    SHA256

    8f50935534bb6cee9b68b515e68dbfb465068ca07def048299b01d42f63550b4

    SHA512

    7948f58de435c125b3dd7eff9e83e6bb1966603efba081a4b93ef4b3fc93c01e0d20175f35520fe479fb6b411d42dcf124dfcfad60d56bf4132acec6c5d2e440

  • C:\Users\Admin\AppData\Local\Temp\PhoenixClientbaluci.exe
    Filesize

    62KB

    MD5

    d6dda9cb85261b5fdc12eb22c5d3e6da

    SHA1

    4dc5ed6cd82eb87dbd0dfca4729871ea16aa143b

    SHA256

    8f50935534bb6cee9b68b515e68dbfb465068ca07def048299b01d42f63550b4

    SHA512

    7948f58de435c125b3dd7eff9e83e6bb1966603efba081a4b93ef4b3fc93c01e0d20175f35520fe479fb6b411d42dcf124dfcfad60d56bf4132acec6c5d2e440

  • C:\Users\Admin\AppData\Local\Temp\Wzhtwkrl.exe
    Filesize

    469KB

    MD5

    12c686d78a0c45f37fd17b743a0609f0

    SHA1

    9febe4209af334f03cae6c16a98abd0b1beafb43

    SHA256

    e96ba96b2e5420983890d82dcb11c75f3ae436559dd9bf8ecda5135a290fc290

    SHA512

    974d87f205d975bcb06f1b201cdc84c05120b74e08f897256ef35a774a3e9d1170ee7ad0d856ef9cbe9600434190c36dbde34177e6b2cf5e5b80595d155adef9

  • C:\Users\Admin\AppData\Local\Temp\Wzhtwkrl.exe
    Filesize

    469KB

    MD5

    12c686d78a0c45f37fd17b743a0609f0

    SHA1

    9febe4209af334f03cae6c16a98abd0b1beafb43

    SHA256

    e96ba96b2e5420983890d82dcb11c75f3ae436559dd9bf8ecda5135a290fc290

    SHA512

    974d87f205d975bcb06f1b201cdc84c05120b74e08f897256ef35a774a3e9d1170ee7ad0d856ef9cbe9600434190c36dbde34177e6b2cf5e5b80595d155adef9

  • C:\Users\Admin\AppData\Local\Temp\tmpDE4F.tmp.bat
    Filesize

    157B

    MD5

    3808bb0003ad223e28d75e6f91ed2fb8

    SHA1

    2d7959aae9994e4207ec9bd430c4a95941302cee

    SHA256

    6e8705656b4117dd4e6938577c5c2a2b63b1809638165a47ceebcea06e934155

    SHA512

    c2487c763afc612d8e2ccb5b226acd3215a779946148915f57a7eb7a9f521db1db30c4685954b05f2abd1c970af3da0a90f9bddd797362fc2a7ed32826658b03

  • C:\Users\Admin\AppData\Roaming\System\System.exe
    Filesize

    62KB

    MD5

    d6dda9cb85261b5fdc12eb22c5d3e6da

    SHA1

    4dc5ed6cd82eb87dbd0dfca4729871ea16aa143b

    SHA256

    8f50935534bb6cee9b68b515e68dbfb465068ca07def048299b01d42f63550b4

    SHA512

    7948f58de435c125b3dd7eff9e83e6bb1966603efba081a4b93ef4b3fc93c01e0d20175f35520fe479fb6b411d42dcf124dfcfad60d56bf4132acec6c5d2e440

  • C:\Users\Admin\AppData\Roaming\System\System.exe
    Filesize

    62KB

    MD5

    d6dda9cb85261b5fdc12eb22c5d3e6da

    SHA1

    4dc5ed6cd82eb87dbd0dfca4729871ea16aa143b

    SHA256

    8f50935534bb6cee9b68b515e68dbfb465068ca07def048299b01d42f63550b4

    SHA512

    7948f58de435c125b3dd7eff9e83e6bb1966603efba081a4b93ef4b3fc93c01e0d20175f35520fe479fb6b411d42dcf124dfcfad60d56bf4132acec6c5d2e440

  • C:\Users\Admin\AppData\Roaming\Wzhtwkrl.exe
    Filesize

    469KB

    MD5

    12c686d78a0c45f37fd17b743a0609f0

    SHA1

    9febe4209af334f03cae6c16a98abd0b1beafb43

    SHA256

    e96ba96b2e5420983890d82dcb11c75f3ae436559dd9bf8ecda5135a290fc290

    SHA512

    974d87f205d975bcb06f1b201cdc84c05120b74e08f897256ef35a774a3e9d1170ee7ad0d856ef9cbe9600434190c36dbde34177e6b2cf5e5b80595d155adef9

  • C:\Users\Admin\AppData\Roaming\Wzhtwkrl.exe
    Filesize

    469KB

    MD5

    12c686d78a0c45f37fd17b743a0609f0

    SHA1

    9febe4209af334f03cae6c16a98abd0b1beafb43

    SHA256

    e96ba96b2e5420983890d82dcb11c75f3ae436559dd9bf8ecda5135a290fc290

    SHA512

    974d87f205d975bcb06f1b201cdc84c05120b74e08f897256ef35a774a3e9d1170ee7ad0d856ef9cbe9600434190c36dbde34177e6b2cf5e5b80595d155adef9

  • memory/616-148-0x0000000000000000-mapping.dmp
  • memory/1060-153-0x0000000000000000-mapping.dmp
  • memory/1060-155-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/1060-156-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/1212-167-0x0000000000000000-mapping.dmp
  • memory/1328-179-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/1328-199-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/1340-189-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/1340-188-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/1340-186-0x0000000000000000-mapping.dmp
  • memory/1668-202-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/1668-201-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/1668-198-0x0000000000000000-mapping.dmp
  • memory/1960-184-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/1960-180-0x0000000000000000-mapping.dmp
  • memory/1960-203-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/1968-204-0x0000000000000000-mapping.dmp
  • memory/1968-206-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/1968-207-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/2196-185-0x0000000000000000-mapping.dmp
  • memory/2316-191-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/2316-190-0x0000000000000000-mapping.dmp
  • memory/2316-193-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/2388-137-0x0000000000000000-mapping.dmp
  • memory/2388-166-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/2388-147-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/2388-142-0x0000000000FA0000-0x0000000000FB4000-memory.dmp
    Filesize

    80KB

  • memory/2388-169-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/2824-132-0x0000000000F50000-0x0000000000FDC000-memory.dmp
    Filesize

    560KB

  • memory/2824-164-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/2824-143-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/3024-175-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/3024-183-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/3024-173-0x0000000000000000-mapping.dmp
  • memory/3260-134-0x0000000000000000-mapping.dmp
  • memory/3260-165-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/3260-178-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/3260-145-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/3260-138-0x0000000000D80000-0x0000000000DF8000-memory.dmp
    Filesize

    480KB

  • memory/3668-171-0x0000000000000000-mapping.dmp
  • memory/3672-172-0x0000000000000000-mapping.dmp
  • memory/3752-168-0x0000000000000000-mapping.dmp
  • memory/4308-152-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/4308-149-0x0000000000000000-mapping.dmp
  • memory/4328-163-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/4328-160-0x0000000000000000-mapping.dmp
  • memory/4328-162-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/4504-157-0x0000000000000000-mapping.dmp
  • memory/4504-159-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/4716-197-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/4716-195-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/4716-194-0x0000000000000000-mapping.dmp
  • memory/5080-141-0x0000022828C20000-0x0000022828C42000-memory.dmp
    Filesize

    136KB

  • memory/5080-146-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB

  • memory/5080-133-0x0000000000000000-mapping.dmp
  • memory/5080-144-0x00007FF948800000-0x00007FF9492C1000-memory.dmp
    Filesize

    10.8MB