Analysis
-
max time kernel
162s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2022 14:40
Static task
static1
Behavioral task
behavioral1
Sample
NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe
Resource
win7-20220812-en
General
-
Target
NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe
-
Size
1022KB
-
MD5
bb240dcac9cb0b5082636d9d98f79459
-
SHA1
2965a18059dc4f5f69d9e48023637ea6984ac595
-
SHA256
aae20c0fbcbb6a459929a9ebf3a27bb72064df5123db3d8a78b4087c0a0648fc
-
SHA512
daa42a06b4cbece9e56590f5b0b47f15fd1518ca44b08e1783fcec5d9ae112ba076e1bad6ee3be199577abc77fd3ac263c1e3327a99a471644b1b44b9403b2e0
-
SSDEEP
24576:+RUr+UZtr4OVMbDmWZyycNj5bj6vpFAtQy4A:BXt9IiykMvpIX
Malware Config
Extracted
asyncrat
0.5.7B
BOYS
asyncat.duckdns.org:6565
AsyncMutex_6SI8OkPnk
-
delay
5
-
install
true
-
install_file
APE.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3232-145-0x0000000000400000-0x000000000043C000-memory.dmp asyncrat -
Executes dropped EXE 3 IoCs
Processes:
APE.exeAPE.exeAPE.exepid process 2544 APE.exe 3592 APE.exe 1500 APE.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
NEW PURCHASE ORDER EXP0028433 SCAN DOC.exeAPE.exeNEW PURCHASE ORDER EXP0028433 SCAN DOC.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation APE.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
NEW PURCHASE ORDER EXP0028433 SCAN DOC.exeAPE.exedescription pid process target process PID 2052 set thread context of 3232 2052 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe PID 2544 set thread context of 1500 2544 APE.exe APE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 1212 schtasks.exe 4544 schtasks.exe 4840 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 808 timeout.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
Processes:
NEW PURCHASE ORDER EXP0028433 SCAN DOC.exepowershell.exepowershell.exeNEW PURCHASE ORDER EXP0028433 SCAN DOC.exeAPE.exepowershell.exepowershell.exepid process 2052 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe 2052 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe 3496 powershell.exe 4060 powershell.exe 4060 powershell.exe 3496 powershell.exe 3232 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe 3232 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe 3232 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe 3232 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe 3232 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe 3232 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe 3232 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe 3232 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe 3232 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe 3232 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe 3232 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe 3232 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe 3232 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe 3232 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe 3232 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe 3232 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe 3232 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe 3232 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe 3232 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe 3232 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe 3232 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe 3232 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe 3232 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe 2544 APE.exe 4424 powershell.exe 2896 powershell.exe 2544 APE.exe 2544 APE.exe 2544 APE.exe 4424 powershell.exe 2896 powershell.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
NEW PURCHASE ORDER EXP0028433 SCAN DOC.exepowershell.exepowershell.exeNEW PURCHASE ORDER EXP0028433 SCAN DOC.exeAPE.exepowershell.exepowershell.exeAPE.exedescription pid process Token: SeDebugPrivilege 2052 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe Token: SeDebugPrivilege 4060 powershell.exe Token: SeDebugPrivilege 3496 powershell.exe Token: SeDebugPrivilege 3232 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe Token: SeDebugPrivilege 2544 APE.exe Token: SeDebugPrivilege 4424 powershell.exe Token: SeDebugPrivilege 2896 powershell.exe Token: SeDebugPrivilege 1500 APE.exe -
Suspicious use of WriteProcessMemory 52 IoCs
Processes:
NEW PURCHASE ORDER EXP0028433 SCAN DOC.exeNEW PURCHASE ORDER EXP0028433 SCAN DOC.execmd.execmd.exeAPE.exedescription pid process target process PID 2052 wrote to memory of 3496 2052 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe powershell.exe PID 2052 wrote to memory of 3496 2052 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe powershell.exe PID 2052 wrote to memory of 3496 2052 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe powershell.exe PID 2052 wrote to memory of 4060 2052 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe powershell.exe PID 2052 wrote to memory of 4060 2052 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe powershell.exe PID 2052 wrote to memory of 4060 2052 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe powershell.exe PID 2052 wrote to memory of 4544 2052 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe schtasks.exe PID 2052 wrote to memory of 4544 2052 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe schtasks.exe PID 2052 wrote to memory of 4544 2052 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe schtasks.exe PID 2052 wrote to memory of 3232 2052 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe PID 2052 wrote to memory of 3232 2052 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe PID 2052 wrote to memory of 3232 2052 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe PID 2052 wrote to memory of 3232 2052 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe PID 2052 wrote to memory of 3232 2052 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe PID 2052 wrote to memory of 3232 2052 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe PID 2052 wrote to memory of 3232 2052 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe PID 2052 wrote to memory of 3232 2052 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe PID 3232 wrote to memory of 2272 3232 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe cmd.exe PID 3232 wrote to memory of 2272 3232 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe cmd.exe PID 3232 wrote to memory of 2272 3232 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe cmd.exe PID 3232 wrote to memory of 520 3232 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe cmd.exe PID 3232 wrote to memory of 520 3232 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe cmd.exe PID 3232 wrote to memory of 520 3232 NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe cmd.exe PID 2272 wrote to memory of 4840 2272 cmd.exe schtasks.exe PID 2272 wrote to memory of 4840 2272 cmd.exe schtasks.exe PID 2272 wrote to memory of 4840 2272 cmd.exe schtasks.exe PID 520 wrote to memory of 808 520 cmd.exe timeout.exe PID 520 wrote to memory of 808 520 cmd.exe timeout.exe PID 520 wrote to memory of 808 520 cmd.exe timeout.exe PID 520 wrote to memory of 2544 520 cmd.exe APE.exe PID 520 wrote to memory of 2544 520 cmd.exe APE.exe PID 520 wrote to memory of 2544 520 cmd.exe APE.exe PID 2544 wrote to memory of 4424 2544 APE.exe powershell.exe PID 2544 wrote to memory of 4424 2544 APE.exe powershell.exe PID 2544 wrote to memory of 4424 2544 APE.exe powershell.exe PID 2544 wrote to memory of 2896 2544 APE.exe powershell.exe PID 2544 wrote to memory of 2896 2544 APE.exe powershell.exe PID 2544 wrote to memory of 2896 2544 APE.exe powershell.exe PID 2544 wrote to memory of 1212 2544 APE.exe schtasks.exe PID 2544 wrote to memory of 1212 2544 APE.exe schtasks.exe PID 2544 wrote to memory of 1212 2544 APE.exe schtasks.exe PID 2544 wrote to memory of 3592 2544 APE.exe APE.exe PID 2544 wrote to memory of 3592 2544 APE.exe APE.exe PID 2544 wrote to memory of 3592 2544 APE.exe APE.exe PID 2544 wrote to memory of 1500 2544 APE.exe APE.exe PID 2544 wrote to memory of 1500 2544 APE.exe APE.exe PID 2544 wrote to memory of 1500 2544 APE.exe APE.exe PID 2544 wrote to memory of 1500 2544 APE.exe APE.exe PID 2544 wrote to memory of 1500 2544 APE.exe APE.exe PID 2544 wrote to memory of 1500 2544 APE.exe APE.exe PID 2544 wrote to memory of 1500 2544 APE.exe APE.exe PID 2544 wrote to memory of 1500 2544 APE.exe APE.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe"C:\Users\Admin\AppData\Local\Temp\NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\DcIkTNXwIeBW.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DcIkTNXwIeBW" /XML "C:\Users\Admin\AppData\Local\Temp\tmp81E2.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe"C:\Users\Admin\AppData\Local\Temp\NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "APE" /tr '"C:\Users\Admin\AppData\Roaming\APE.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "APE" /tr '"C:\Users\Admin\AppData\Roaming\APE.exe"'4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA548.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\APE.exe"C:\Users\Admin\AppData\Roaming\APE.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\APE.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\DcIkTNXwIeBW.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DcIkTNXwIeBW" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6F3F.tmp"5⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\APE.exe"C:\Users\Admin\AppData\Roaming\APE.exe"5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\APE.exe"C:\Users\Admin\AppData\Roaming\APE.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\NEW PURCHASE ORDER EXP0028433 SCAN DOC.exe.logFilesize
1KB
MD5e08f822522c617a40840c62e4b0fb45e
SHA1ae516dca4da5234be6676d3f234c19ec55725be7
SHA256bd9d5e9f7fe6fcff17d873555d4077d15f7d6cdda1183e7f7d278b735ffe1fd7
SHA512894a7fb7bbc18ac6ba13378f58a7db80ad00d6080be9a66b01cae8e23e41d9d2d4cd53c1e20669356b73590c8a3ebfda4bdda3258f81240db56c4a81b7313fe4
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD527dcbdfd847016c6c4cea035281a4941
SHA13df23590e972cc07effedec9d969c4ce381d8fa5
SHA256ae16506840d6ae1f9fc8699e0339a937a1be507ff94ecd62edc2802ef9b44295
SHA51292db5111960564107754cc0ecd409aa95d902e32a9e414e10a7b0d69ea0646f6c6383a9bfdc5060d7ba9ce711df3f3213ae7178089a9e0131d9e96de48addc00
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD527dcbdfd847016c6c4cea035281a4941
SHA13df23590e972cc07effedec9d969c4ce381d8fa5
SHA256ae16506840d6ae1f9fc8699e0339a937a1be507ff94ecd62edc2802ef9b44295
SHA51292db5111960564107754cc0ecd409aa95d902e32a9e414e10a7b0d69ea0646f6c6383a9bfdc5060d7ba9ce711df3f3213ae7178089a9e0131d9e96de48addc00
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD5b52930110578f73ee109b022f7ca7668
SHA11ccb940a56c96d29b0fad2759de17bc844ad685a
SHA256f71cd8f8ec5e41290fe4bf163b8eafb1e66c6ce45d42a77ca8f8fb90a458b7d2
SHA51226f730298619a4a7e280d5a2380994af65ea77a9417dac7d2760d8129f912b60aec9a24903d2ddf74c005a8af8fc10a6236f84637b1ee73134683288321106be
-
C:\Users\Admin\AppData\Local\Temp\tmp6F3F.tmpFilesize
1KB
MD574dcbbef9ccb35e230066062ee84d47d
SHA192df754c582397d2762d6bfd62d542ebbaa2155c
SHA2561f863f052c79d86f04ac2b1a41d1ea625d70ecad2ae484a6c233111b0c613854
SHA5128ac1ab7ebab2bf423eada799e016889d7fee8bb347accb82493f376e18b1af086d9c16604077089090a231e37448a2a114779150eb6c9af18c71e10ef299281a
-
C:\Users\Admin\AppData\Local\Temp\tmp81E2.tmpFilesize
1KB
MD574dcbbef9ccb35e230066062ee84d47d
SHA192df754c582397d2762d6bfd62d542ebbaa2155c
SHA2561f863f052c79d86f04ac2b1a41d1ea625d70ecad2ae484a6c233111b0c613854
SHA5128ac1ab7ebab2bf423eada799e016889d7fee8bb347accb82493f376e18b1af086d9c16604077089090a231e37448a2a114779150eb6c9af18c71e10ef299281a
-
C:\Users\Admin\AppData\Local\Temp\tmpA548.tmp.batFilesize
147B
MD5fded06dec648592be0d035d2e91b1d52
SHA17df8dd54e936b109cc9315af56426221355e18c3
SHA2560a1198149a4520ab67fb9eb3e1b108260d7547f33c981456242820fa825f8d81
SHA512ec2401fa4c4a61c25ba65827effccfc3c48541cccc7298906612042202f06b87e917b95825edde4c3cf5be49e0eb706b518ceccc48e6a41d928bb40c6c8c0572
-
C:\Users\Admin\AppData\Roaming\APE.exeFilesize
1022KB
MD5bb240dcac9cb0b5082636d9d98f79459
SHA12965a18059dc4f5f69d9e48023637ea6984ac595
SHA256aae20c0fbcbb6a459929a9ebf3a27bb72064df5123db3d8a78b4087c0a0648fc
SHA512daa42a06b4cbece9e56590f5b0b47f15fd1518ca44b08e1783fcec5d9ae112ba076e1bad6ee3be199577abc77fd3ac263c1e3327a99a471644b1b44b9403b2e0
-
C:\Users\Admin\AppData\Roaming\APE.exeFilesize
1022KB
MD5bb240dcac9cb0b5082636d9d98f79459
SHA12965a18059dc4f5f69d9e48023637ea6984ac595
SHA256aae20c0fbcbb6a459929a9ebf3a27bb72064df5123db3d8a78b4087c0a0648fc
SHA512daa42a06b4cbece9e56590f5b0b47f15fd1518ca44b08e1783fcec5d9ae112ba076e1bad6ee3be199577abc77fd3ac263c1e3327a99a471644b1b44b9403b2e0
-
C:\Users\Admin\AppData\Roaming\APE.exeFilesize
1022KB
MD5bb240dcac9cb0b5082636d9d98f79459
SHA12965a18059dc4f5f69d9e48023637ea6984ac595
SHA256aae20c0fbcbb6a459929a9ebf3a27bb72064df5123db3d8a78b4087c0a0648fc
SHA512daa42a06b4cbece9e56590f5b0b47f15fd1518ca44b08e1783fcec5d9ae112ba076e1bad6ee3be199577abc77fd3ac263c1e3327a99a471644b1b44b9403b2e0
-
C:\Users\Admin\AppData\Roaming\APE.exeFilesize
1022KB
MD5bb240dcac9cb0b5082636d9d98f79459
SHA12965a18059dc4f5f69d9e48023637ea6984ac595
SHA256aae20c0fbcbb6a459929a9ebf3a27bb72064df5123db3d8a78b4087c0a0648fc
SHA512daa42a06b4cbece9e56590f5b0b47f15fd1518ca44b08e1783fcec5d9ae112ba076e1bad6ee3be199577abc77fd3ac263c1e3327a99a471644b1b44b9403b2e0
-
memory/520-157-0x0000000000000000-mapping.dmp
-
memory/808-161-0x0000000000000000-mapping.dmp
-
memory/1212-173-0x0000000000000000-mapping.dmp
-
memory/1500-177-0x0000000000000000-mapping.dmp
-
memory/2052-135-0x0000000004EA0000-0x0000000004EAA000-memory.dmpFilesize
40KB
-
memory/2052-134-0x0000000004D00000-0x0000000004D92000-memory.dmpFilesize
584KB
-
memory/2052-137-0x000000000B160000-0x000000000B1C6000-memory.dmpFilesize
408KB
-
memory/2052-132-0x00000000003A0000-0x00000000004A4000-memory.dmpFilesize
1.0MB
-
memory/2052-136-0x000000000AE50000-0x000000000AEEC000-memory.dmpFilesize
624KB
-
memory/2052-133-0x00000000051F0000-0x0000000005794000-memory.dmpFilesize
5.6MB
-
memory/2272-155-0x0000000000000000-mapping.dmp
-
memory/2544-163-0x0000000000000000-mapping.dmp
-
memory/2896-172-0x0000000000000000-mapping.dmp
-
memory/2896-182-0x000000006F6D0000-0x000000006F71C000-memory.dmpFilesize
304KB
-
memory/3232-145-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3232-144-0x0000000000000000-mapping.dmp
-
memory/3496-148-0x00000000068B0000-0x00000000068CE000-memory.dmpFilesize
120KB
-
memory/3496-156-0x00000000079A0000-0x00000000079AA000-memory.dmpFilesize
40KB
-
memory/3496-154-0x0000000007930000-0x000000000794A000-memory.dmpFilesize
104KB
-
memory/3496-162-0x0000000007DD0000-0x0000000007E66000-memory.dmpFilesize
600KB
-
memory/3496-138-0x0000000000000000-mapping.dmp
-
memory/3496-141-0x0000000002E80000-0x0000000002EB6000-memory.dmpFilesize
216KB
-
memory/3496-152-0x0000000074E60000-0x0000000074EAC000-memory.dmpFilesize
304KB
-
memory/3496-167-0x0000000007E90000-0x0000000007EAA000-memory.dmpFilesize
104KB
-
memory/3496-149-0x0000000006E30000-0x0000000006E62000-memory.dmpFilesize
200KB
-
memory/3496-146-0x00000000058E0000-0x0000000005902000-memory.dmpFilesize
136KB
-
memory/3592-175-0x0000000000000000-mapping.dmp
-
memory/4060-143-0x0000000005690000-0x0000000005CB8000-memory.dmpFilesize
6.2MB
-
memory/4060-150-0x0000000074E60000-0x0000000074EAC000-memory.dmpFilesize
304KB
-
memory/4060-147-0x0000000005540000-0x00000000055A6000-memory.dmpFilesize
408KB
-
memory/4060-168-0x0000000007BB0000-0x0000000007BB8000-memory.dmpFilesize
32KB
-
memory/4060-166-0x0000000007AC0000-0x0000000007ACE000-memory.dmpFilesize
56KB
-
memory/4060-151-0x0000000006B20000-0x0000000006B3E000-memory.dmpFilesize
120KB
-
memory/4060-139-0x0000000000000000-mapping.dmp
-
memory/4060-153-0x0000000007ED0000-0x000000000854A000-memory.dmpFilesize
6.5MB
-
memory/4424-171-0x0000000000000000-mapping.dmp
-
memory/4424-181-0x000000006F6D0000-0x000000006F71C000-memory.dmpFilesize
304KB
-
memory/4544-140-0x0000000000000000-mapping.dmp
-
memory/4840-159-0x0000000000000000-mapping.dmp