Analysis

  • max time kernel
    151s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 09:05

General

  • Target

    a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f.exe

  • Size

    121KB

  • MD5

    6e99d55e2249e0ec6af52ef986fa0e1d

  • SHA1

    d91a7646204ef1491c756ca59085327eda43c949

  • SHA256

    a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

  • SHA512

    0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

  • SSDEEP

    3072:zWPi626T8Md/8I64gsHaARfVrhz9gz0BcjMJHXHiU:zWPruq6a7azQhHXCU

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 52 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 25 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 25 IoCs
  • Suspicious behavior: RenamesItself 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f.exe
    "C:\Users\Admin\AppData\Local\Temp\a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:4692
    • C:\Windows\SysWOW64\wscript.exe
      "C:\Windows\system32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\lcggwyakq.vbs" //B //Nologo
      2⤵
        PID:2288
    • C:\Windows\system32\wbem\scrcons.exe
      C:\Windows\system32\wbem\scrcons.exe -Embedding
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of WriteProcessMemory
      PID:712
      • C:\Windows\69A4D845.exe
        "C:\Windows\69A4D845.exe"
        2⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious behavior: RenamesItself
        • Suspicious use of WriteProcessMemory
        PID:1688
        • C:\Windows\SysWOW64\wscript.exe
          "C:\Windows\system32\wscript.exe" "C:\Windows\TEMP\iefqenlgxs.vbs" //B //Nologo
          3⤵
          • Modifies data under HKEY_USERS
          PID:2440
      • C:\Windows\20BF1A22.exe
        "C:\Windows\20BF1A22.exe"
        2⤵
        • Executes dropped EXE
        PID:4792
      • C:\Windows\20BF1A22.exe
        "C:\Windows\20BF1A22.exe"
        2⤵
        • Executes dropped EXE
        PID:2184
      • C:\Windows\20BF1A22.exe
        "C:\Windows\20BF1A22.exe"
        2⤵
        • Executes dropped EXE
        PID:4956
      • C:\Windows\20BF1A22.exe
        "C:\Windows\20BF1A22.exe"
        2⤵
        • Executes dropped EXE
        PID:2204
      • C:\Windows\20BF1A22.exe
        "C:\Windows\20BF1A22.exe"
        2⤵
        • Executes dropped EXE
        PID:2808
      • C:\Windows\20BF1A22.exe
        "C:\Windows\20BF1A22.exe"
        2⤵
        • Executes dropped EXE
        PID:4896
      • C:\Windows\20BF1A22.exe
        "C:\Windows\20BF1A22.exe"
        2⤵
        • Executes dropped EXE
        PID:3848
      • C:\Windows\20BF1A22.exe
        "C:\Windows\20BF1A22.exe"
        2⤵
        • Executes dropped EXE
        PID:692
      • C:\Windows\20BF1A22.exe
        "C:\Windows\20BF1A22.exe"
        2⤵
        • Executes dropped EXE
        PID:456
      • C:\Windows\20BF1A22.exe
        "C:\Windows\20BF1A22.exe"
        2⤵
        • Executes dropped EXE
        PID:3272
      • C:\Windows\20BF1A22.exe
        "C:\Windows\20BF1A22.exe"
        2⤵
        • Executes dropped EXE
        PID:404
      • C:\Windows\20BF1A22.exe
        "C:\Windows\20BF1A22.exe"
        2⤵
        • Executes dropped EXE
        PID:1636
      • C:\Windows\20BF1A22.exe
        "C:\Windows\20BF1A22.exe"
        2⤵
        • Executes dropped EXE
        PID:3512
      • C:\Windows\20BF1A22.exe
        "C:\Windows\20BF1A22.exe"
        2⤵
        • Executes dropped EXE
        PID:3640
      • C:\Windows\20BF1A22.exe
        "C:\Windows\20BF1A22.exe"
        2⤵
        • Executes dropped EXE
        PID:428
      • C:\Windows\20BF1A22.exe
        "C:\Windows\20BF1A22.exe"
        2⤵
        • Executes dropped EXE
        PID:1284
      • C:\Windows\20BF1A22.exe
        "C:\Windows\20BF1A22.exe"
        2⤵
        • Executes dropped EXE
        PID:3408
      • C:\Windows\20BF1A22.exe
        "C:\Windows\20BF1A22.exe"
        2⤵
        • Executes dropped EXE
        PID:4196
      • C:\Windows\20BF1A22.exe
        "C:\Windows\20BF1A22.exe"
        2⤵
        • Executes dropped EXE
        PID:3936
      • C:\Windows\20BF1A22.exe
        "C:\Windows\20BF1A22.exe"
        2⤵
        • Executes dropped EXE
        PID:4204
      • C:\Windows\20BF1A22.exe
        "C:\Windows\20BF1A22.exe"
        2⤵
        • Executes dropped EXE
        PID:2192
      • C:\Windows\20BF1A22.exe
        "C:\Windows\20BF1A22.exe"
        2⤵
        • Executes dropped EXE
        PID:2168
      • C:\Windows\20BF1A22.exe
        "C:\Windows\20BF1A22.exe"
        2⤵
        • Executes dropped EXE
        PID:5012
      • C:\Windows\20BF1A22.exe
        "C:\Windows\20BF1A22.exe"
        2⤵
        • Executes dropped EXE
        PID:4180

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\lcggwyakq.vbs

      Filesize

      1KB

      MD5

      a12d54fcf25c3ec6a40ac00b79a9c01e

      SHA1

      e77e708c1c0fb5e10f5671d70a02c17bd5735327

      SHA256

      d1bac148e9bb8600880c90495e7d389fe0f8c1e7536e4ce21aae114e709b2a1d

      SHA512

      d159c4b4f1e72f03abbba5edf78d63fcf39e1343cfce826f1647f391db86eb2a628cc64faf5e1b0580aa3b0e432df6776642444bd940df8a005f14ec54aa4461

    • C:\Windows\20BF1A22.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\20BF1A22.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\20BF1A22.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\20BF1A22.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\20BF1A22.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\20BF1A22.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\20BF1A22.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\20BF1A22.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\20BF1A22.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\20BF1A22.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\20BF1A22.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\20BF1A22.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\20BF1A22.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\20BF1A22.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\20BF1A22.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\20BF1A22.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\20BF1A22.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\20BF1A22.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\20BF1A22.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\20BF1A22.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\20BF1A22.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\20BF1A22.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\20BF1A22.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\20BF1A22.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\69A4D845.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\TEMP\iefqenlgxs.vbs

      Filesize

      1KB

      MD5

      62f8f8c39a207e5b1031d98e629890a8

      SHA1

      11bdd3e05a71dc923e0c0ca8ba8ba33c72135e50

      SHA256

      372b28d15056d9f906ecc4e9cce1e797fb52d750fcf66a8f7dcbcb62844d8fe0

      SHA512

      f162c9c533af8d5b99172937262da82672db0224d81e0a7ad5c9612e57183fd4b9cd9d79b351b78d9e18d0a4b008547dccd26f94e7a693e50ed01490812775e4

    • memory/404-171-0x0000000000000000-mapping.dmp

    • memory/404-173-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/428-185-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/428-183-0x0000000000000000-mapping.dmp

    • memory/456-165-0x0000000000000000-mapping.dmp

    • memory/456-167-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/692-162-0x0000000000000000-mapping.dmp

    • memory/692-164-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1284-188-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1284-186-0x0000000000000000-mapping.dmp

    • memory/1636-174-0x0000000000000000-mapping.dmp

    • memory/1636-176-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1688-135-0x0000000000000000-mapping.dmp

    • memory/1688-137-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/2168-206-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/2168-204-0x0000000000000000-mapping.dmp

    • memory/2184-146-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/2184-144-0x0000000000000000-mapping.dmp

    • memory/2192-201-0x0000000000000000-mapping.dmp

    • memory/2192-203-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/2204-152-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/2204-150-0x0000000000000000-mapping.dmp

    • memory/2288-133-0x0000000000000000-mapping.dmp

    • memory/2440-138-0x0000000000000000-mapping.dmp

    • memory/2808-155-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/2808-153-0x0000000000000000-mapping.dmp

    • memory/3272-170-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/3272-168-0x0000000000000000-mapping.dmp

    • memory/3408-189-0x0000000000000000-mapping.dmp

    • memory/3408-191-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/3512-179-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/3512-177-0x0000000000000000-mapping.dmp

    • memory/3640-180-0x0000000000000000-mapping.dmp

    • memory/3640-182-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/3848-161-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/3848-159-0x0000000000000000-mapping.dmp

    • memory/3936-197-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/3936-195-0x0000000000000000-mapping.dmp

    • memory/4180-212-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/4180-210-0x0000000000000000-mapping.dmp

    • memory/4196-192-0x0000000000000000-mapping.dmp

    • memory/4196-194-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/4204-198-0x0000000000000000-mapping.dmp

    • memory/4204-200-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/4692-132-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/4792-142-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/4792-140-0x0000000000000000-mapping.dmp

    • memory/4792-143-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/4896-158-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/4896-156-0x0000000000000000-mapping.dmp

    • memory/4956-147-0x0000000000000000-mapping.dmp

    • memory/4956-149-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/5012-209-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/5012-207-0x0000000000000000-mapping.dmp