Analysis
-
max time kernel
163s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 03:38
Static task
static1
Behavioral task
behavioral1
Sample
a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe
Resource
win10v2004-20220414-en
General
-
Target
a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe
-
Size
599KB
-
MD5
08862211cb28cc9f8cb03041644ddfa4
-
SHA1
6a72a8315147fdaf9eefbd60c83833de060f1aba
-
SHA256
a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20
-
SHA512
063bd36a79d2bdb2a95963bf3ce03591b779220682095e5edad469a11bf1bd4599d0533161a062eaa8bff10a0266c1da53c4637e32d61c5d8aa97a5a5381c03e
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exea436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exea436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exedescription ioc process File opened for modification \??\physicaldrive0 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exea436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exea436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exepid process 4388 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe 4388 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe 4388 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe 4388 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe 3872 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe 3872 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe 3872 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe 3872 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe 1644 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe 1644 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe 1644 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe 1644 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
Processes:
a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exea436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exea436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exea436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exepid process 988 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe 988 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe 988 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe 988 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe 4388 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe 4388 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe 4388 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe 4388 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe 3872 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe 3872 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe 3872 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe 3872 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe 1644 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe 1644 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe 1644 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe 1644 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exea436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exenet.exenet.exenet.exea436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exenet.exenet.exenet.exea436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exenet.exenet.exenet.exedescription pid process target process PID 988 wrote to memory of 4388 988 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe PID 988 wrote to memory of 4388 988 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe PID 988 wrote to memory of 4388 988 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe PID 4388 wrote to memory of 4176 4388 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe net.exe PID 4388 wrote to memory of 4176 4388 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe net.exe PID 4388 wrote to memory of 4176 4388 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe net.exe PID 4388 wrote to memory of 4144 4388 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe net.exe PID 4388 wrote to memory of 4144 4388 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe net.exe PID 4388 wrote to memory of 4144 4388 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe net.exe PID 4388 wrote to memory of 4812 4388 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe net.exe PID 4388 wrote to memory of 4812 4388 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe net.exe PID 4388 wrote to memory of 4812 4388 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe net.exe PID 4176 wrote to memory of 4656 4176 net.exe net1.exe PID 4176 wrote to memory of 4656 4176 net.exe net1.exe PID 4176 wrote to memory of 4656 4176 net.exe net1.exe PID 4144 wrote to memory of 5016 4144 net.exe net1.exe PID 4144 wrote to memory of 5016 4144 net.exe net1.exe PID 4144 wrote to memory of 5016 4144 net.exe net1.exe PID 4812 wrote to memory of 1384 4812 net.exe net1.exe PID 4812 wrote to memory of 1384 4812 net.exe net1.exe PID 4812 wrote to memory of 1384 4812 net.exe net1.exe PID 4388 wrote to memory of 3872 4388 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe PID 4388 wrote to memory of 3872 4388 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe PID 4388 wrote to memory of 3872 4388 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe PID 3872 wrote to memory of 4780 3872 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe net.exe PID 3872 wrote to memory of 4780 3872 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe net.exe PID 3872 wrote to memory of 4780 3872 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe net.exe PID 3872 wrote to memory of 4744 3872 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe net.exe PID 3872 wrote to memory of 4744 3872 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe net.exe PID 3872 wrote to memory of 4744 3872 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe net.exe PID 3872 wrote to memory of 3752 3872 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe net.exe PID 3872 wrote to memory of 3752 3872 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe net.exe PID 3872 wrote to memory of 3752 3872 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe net.exe PID 4744 wrote to memory of 2808 4744 net.exe net1.exe PID 4744 wrote to memory of 2808 4744 net.exe net1.exe PID 4744 wrote to memory of 2808 4744 net.exe net1.exe PID 4780 wrote to memory of 2308 4780 net.exe net1.exe PID 4780 wrote to memory of 2308 4780 net.exe net1.exe PID 4780 wrote to memory of 2308 4780 net.exe net1.exe PID 3752 wrote to memory of 2724 3752 net.exe net1.exe PID 3752 wrote to memory of 2724 3752 net.exe net1.exe PID 3752 wrote to memory of 2724 3752 net.exe net1.exe PID 3872 wrote to memory of 1644 3872 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe PID 3872 wrote to memory of 1644 3872 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe PID 3872 wrote to memory of 1644 3872 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe PID 1644 wrote to memory of 4732 1644 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe net.exe PID 1644 wrote to memory of 4732 1644 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe net.exe PID 1644 wrote to memory of 4732 1644 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe net.exe PID 1644 wrote to memory of 3488 1644 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe net.exe PID 1644 wrote to memory of 3488 1644 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe net.exe PID 1644 wrote to memory of 3488 1644 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe net.exe PID 1644 wrote to memory of 4972 1644 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe net.exe PID 1644 wrote to memory of 4972 1644 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe net.exe PID 1644 wrote to memory of 4972 1644 a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe net.exe PID 4732 wrote to memory of 1056 4732 net.exe net1.exe PID 4732 wrote to memory of 1056 4732 net.exe net1.exe PID 4732 wrote to memory of 1056 4732 net.exe net1.exe PID 3488 wrote to memory of 4924 3488 net.exe net1.exe PID 3488 wrote to memory of 4924 3488 net.exe net1.exe PID 3488 wrote to memory of 4924 3488 net.exe net1.exe PID 4972 wrote to memory of 780 4972 net.exe net1.exe PID 4972 wrote to memory of 780 4972 net.exe net1.exe PID 4972 wrote to memory of 780 4972 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe"C:\Users\Admin\AppData\Local\Temp\a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe"C:\Users\Admin\AppData\Local\Temp\a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe"2⤵
- Checks computer location settings
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exenet.exe localgroup administrators qq2239823310/add3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators qq2239823310/add4⤵
-
C:\Windows\SysWOW64\net.exenet.exe user qq2239823310 /add3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user qq2239823310 /add4⤵
-
C:\Windows\SysWOW64\net.exenet.exe user Admin3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user Admin4⤵
-
C:\Users\Admin\AppData\Local\Temp\a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe"C:\Users\Admin\AppData\Local\Temp\a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exenet.exe user Admin4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user Admin5⤵
-
C:\Windows\SysWOW64\net.exenet.exe user qq2239823310 /add4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user qq2239823310 /add5⤵
-
C:\Windows\SysWOW64\net.exenet.exe localgroup administrators qq2239823310/add4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators qq2239823310/add5⤵
-
C:\Users\Admin\AppData\Local\Temp\a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe"C:\Users\Admin\AppData\Local\Temp\a436f01d3d5abb2d63d9ec5463c0c083546b939036e71163d2aba510958f8f20.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exenet.exe user Admin5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user Admin6⤵
-
C:\Windows\SysWOW64\net.exenet.exe user qq2239823310 /add5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user qq2239823310 /add6⤵
-
C:\Windows\SysWOW64\net.exenet.exe localgroup administrators qq2239823310/add5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators qq2239823310/add6⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1.iniFilesize
10B
MD5568f3f4163773733e3e36e8a29cf0029
SHA1ba0c7b47b8fc337926db519c567d9ccfa58a843c
SHA256410fee16714cf6db0624a3a9a4e73de4bc18cae5ca7e5d9acf0e9e44aa4133e2
SHA512a344b1ee712fff920cc4d29959c59b091b138a5e6d8695d1d6bbbc82e188e25a86d97bfbb1c63c235eaffd14af2eefe88c3123d95b6c1e807a5da30733cf59ba
-
C:\Users\Admin\AppData\Local\Temp\1.iniFilesize
10B
MD5568f3f4163773733e3e36e8a29cf0029
SHA1ba0c7b47b8fc337926db519c567d9ccfa58a843c
SHA256410fee16714cf6db0624a3a9a4e73de4bc18cae5ca7e5d9acf0e9e44aa4133e2
SHA512a344b1ee712fff920cc4d29959c59b091b138a5e6d8695d1d6bbbc82e188e25a86d97bfbb1c63c235eaffd14af2eefe88c3123d95b6c1e807a5da30733cf59ba
-
C:\Users\Admin\AppData\Local\Temp\1.iniFilesize
10B
MD5568f3f4163773733e3e36e8a29cf0029
SHA1ba0c7b47b8fc337926db519c567d9ccfa58a843c
SHA256410fee16714cf6db0624a3a9a4e73de4bc18cae5ca7e5d9acf0e9e44aa4133e2
SHA512a344b1ee712fff920cc4d29959c59b091b138a5e6d8695d1d6bbbc82e188e25a86d97bfbb1c63c235eaffd14af2eefe88c3123d95b6c1e807a5da30733cf59ba
-
C:\Users\Admin\AppData\Local\Temp\ExtraDll.dllFilesize
199KB
MD52bda137da275d8e4b98c32b5a7725334
SHA14c39e68338f286d791cb054af5a16b80fb102af9
SHA25650015d445f3156f3ddde43da651b15a310f6d85a23ee5bdf95c908130ac035b4
SHA512ef68c17b18cfabea6ae454bbf066e57c0181d9250f4d4e5b88c2492ec32a1e7173ecdcc678ed120e1ef58f552ec19d14ace75c15c0c3605031b8144a4bba0c45
-
C:\Users\Admin\AppData\Local\Temp\ExtraDll.dllFilesize
199KB
MD52bda137da275d8e4b98c32b5a7725334
SHA14c39e68338f286d791cb054af5a16b80fb102af9
SHA25650015d445f3156f3ddde43da651b15a310f6d85a23ee5bdf95c908130ac035b4
SHA512ef68c17b18cfabea6ae454bbf066e57c0181d9250f4d4e5b88c2492ec32a1e7173ecdcc678ed120e1ef58f552ec19d14ace75c15c0c3605031b8144a4bba0c45
-
C:\Users\Admin\AppData\Local\Temp\ExtraDll.dllFilesize
199KB
MD52bda137da275d8e4b98c32b5a7725334
SHA14c39e68338f286d791cb054af5a16b80fb102af9
SHA25650015d445f3156f3ddde43da651b15a310f6d85a23ee5bdf95c908130ac035b4
SHA512ef68c17b18cfabea6ae454bbf066e57c0181d9250f4d4e5b88c2492ec32a1e7173ecdcc678ed120e1ef58f552ec19d14ace75c15c0c3605031b8144a4bba0c45
-
memory/780-156-0x0000000000000000-mapping.dmp
-
memory/1056-154-0x0000000000000000-mapping.dmp
-
memory/1384-138-0x0000000000000000-mapping.dmp
-
memory/1644-148-0x0000000000000000-mapping.dmp
-
memory/2308-146-0x0000000000000000-mapping.dmp
-
memory/2724-147-0x0000000000000000-mapping.dmp
-
memory/2808-145-0x0000000000000000-mapping.dmp
-
memory/3488-152-0x0000000000000000-mapping.dmp
-
memory/3752-144-0x0000000000000000-mapping.dmp
-
memory/3872-139-0x0000000000000000-mapping.dmp
-
memory/4144-134-0x0000000000000000-mapping.dmp
-
memory/4176-133-0x0000000000000000-mapping.dmp
-
memory/4388-130-0x0000000000000000-mapping.dmp
-
memory/4656-136-0x0000000000000000-mapping.dmp
-
memory/4732-151-0x0000000000000000-mapping.dmp
-
memory/4744-143-0x0000000000000000-mapping.dmp
-
memory/4780-142-0x0000000000000000-mapping.dmp
-
memory/4812-135-0x0000000000000000-mapping.dmp
-
memory/4924-155-0x0000000000000000-mapping.dmp
-
memory/4972-153-0x0000000000000000-mapping.dmp
-
memory/5016-137-0x0000000000000000-mapping.dmp