Analysis

  • max time kernel
    156s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2022 18:00

General

  • Target

    PO-EP3141802303 -42804009_83276378283989393872376532893293009783763.exe

  • Size

    819KB

  • MD5

    15f464f9989137160b14e74ef4550985

  • SHA1

    29b389e7bdb84ebf310f5524a78147b39ebb7224

  • SHA256

    7c9e88afcdeebca3c1f07c6a2c571d2fd51260c6dba7fdf0d2d10999ba23836d

  • SHA512

    620df1296308bf6b53be891787a7d4d9983ce22b7b305c49445e4cd88aad9e3633c8b5b359a07a6a2757e56959576d0fdabf671a75968310f8b7ef1848379f1b

  • SSDEEP

    12288:XAMrP3fXxRw2VaduraNqUi5gPmZ3Zf2dqHhuztgXdAhVXQr/20jZ6C0WVZTqow96:QgPXxRwmhfUlmLf2G0sdAPQjjNcMG96

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 14 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PO-EP3141802303 -42804009_83276378283989393872376532893293009783763.exe
    "C:\Users\Admin\AppData\Local\Temp\PO-EP3141802303 -42804009_83276378283989393872376532893293009783763.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4912
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe 0x6B6570CB -bxor 677
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1820
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe 0x656C3197 -bxor 677
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:436
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe 0x3A3A41D7 -bxor 677
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2620
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe 0x656176C0 -bxor 677
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1504
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe 0x46696EC0 -bxor 677
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2120
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe 0x41286F85 -bxor 677
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3600
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe 0x72342289 -bxor 677
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2576
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe 0x20692295 -bxor 677
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3508
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe 0x78383295 -bxor 677
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3228
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe 0x30303295 -bxor 677
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3040
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe 0x302C22CC -bxor 677
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4016
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe 0x20302E85 -bxor 677
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1464
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe 0x70203289 -bxor 677
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3384
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe 0x20692291 -bxor 677
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4632

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    1KB

    MD5

    33b19d75aa77114216dbc23f43b195e3

    SHA1

    36a6c3975e619e0c5232aa4f5b7dc1fec9525535

    SHA256

    b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2

    SHA512

    676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    11KB

    MD5

    cb422fdb34149cebe26252967532a299

    SHA1

    20d623aa3fb1571ca93d2b78425f238eff034c57

    SHA256

    8b28e8f2c468a85021810f0eb9a3b5cf0e17d60694ebc388fd0a9078d1e56bae

    SHA512

    6adae1cdcc98b7759f969596f8e650988a8f8801fb641d48c061a06f77fce50b8fcef5a6558f3cacda948eccd80f0eec68eac77b27c17b55cbb39742503eb6a0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    11KB

    MD5

    51b78cf035d15d5e2e98e11b45019ad9

    SHA1

    fc59ae49f9c1d72de23518653c87d29a773c003a

    SHA256

    060a7013c51c46e958921705be9e59b89aed68d88f3103cb0936e049bc4020f5

    SHA512

    95de05367b75382d5d0ea4cae256f28e11d7435d077b8170d1fd6ac16093b0c67cd7cde242147899422cf950bf57e695a5d1da08b27297478586cfa9966c8d84

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    11KB

    MD5

    78512eca68d463fc421799ba65ab5938

    SHA1

    59322bddd88fe97dc4599cb524e2529679d6fd33

    SHA256

    34951e50cf369c5a354eca676cfe040d8e74b3ae6a44cb3d8be6dc91f6fdfe90

    SHA512

    d92286c7f7091fe2fb6fba7bc8abf7c56649cb96c9a7265ffcae68d754ed44af35e2a4f8c553ee2fa8ed532a95daa1a9cc51dd5ae6ecc335c62269f9f004ab3f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    11KB

    MD5

    9564d008a4316becf84503f9c09fb48d

    SHA1

    02a5ca3279044bf9eec837aa47446ac0fecd3f0e

    SHA256

    4eed702fa6a96dfe33533268240bf66e134a6af8f1bb0a7619db5754919a9f77

    SHA512

    ef840c16ac85a363ac29fdcafbc5b6691257ec0402fb19da0921f6b82ce0eeec3469fb83fae608e98b7f01278017de3363fef2c4631e4adb53eb269caedc554a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    11KB

    MD5

    6623e01a1f93a1e0fd775fc14c4024c0

    SHA1

    ed87b61f1ec14f11f8171587548ef80b8d28dcda

    SHA256

    e216d3252aa7b07cad849d8ebda505a07980e8711218794453bfd76e62dfc2ca

    SHA512

    d1a6f27a60ce89ff5000ddebd24f24c109aa3dd223523b5552e298bfb14e14f9e85cfd59dc73091e1f801709563bd08fc778eb24083745908f76c4d782fd7d29

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    11KB

    MD5

    1ec390ee2f7d9c81a837da22fc447d5a

    SHA1

    89d4ca6e77aa9a9015e798d3033de57dded3f5a8

    SHA256

    2ce3be210887562ca3f099ff3a6fe85508f119ba6ed38ef4f31e8e602b325e22

    SHA512

    7dfab714477f1e30e9d3ee9d5d9f543c8ae4f8893f8d6cafd523bb56818e15c7635fc1b847dad1822080a4ff40eecdd31e3db16fdb822d078be0f9a22fba7f11

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    11KB

    MD5

    18e32d2a6142a57dfc7ab58efd9f6523

    SHA1

    2f5f108340e4f34b76ff88764f45c87ffba8ed70

    SHA256

    eead0880eea07c1efdabda8d317ea63b68b684cb12439ca087694e5369e2c334

    SHA512

    ef03d1151e5e669b7e7c2885bb33bb620b91f34d4f06ed5fa00ccca82493fe49eb609aba55c6f30dbafe8e1b1a5b28e51dfce25475fe2553273c96e84ed0c013

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    11KB

    MD5

    64ef4759aec7e839d9f0f08abde65317

    SHA1

    c88b59f1629b34341e830d6f1e0d62a55a7e5720

    SHA256

    98dc46abfc66a8366d06cc9ea71c30b564fe89b0b8ffb6ba9a14e0013551d095

    SHA512

    56b8d1a29a912bcb1e25c2aa3bef4e8efc22403cebc48fbbe1f1083f29191125f3c3d04e539cdf2ea6ebaf60bb7bed217a2cc45a51a16c7b5d93ca4d0b89e996

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    11KB

    MD5

    84aa12bb7f9a1c145de810a683dce1d4

    SHA1

    0f671a6f7b4c95e94ad2ff1c1b0b588cc420987f

    SHA256

    d23899bce128bf2c018ca3b2efb7329175e19790c99dd21b1395969bdaa7c232

    SHA512

    c3450fcd875ce5edb07a7737aa2151c43633c3debd6adff346b50a135df95be6b025b81d81907f2118cdbec49c574b5268a82511f200a886d6417fc1b3398f39

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    11KB

    MD5

    38d1bf4388d332c99bb994cd8215e66c

    SHA1

    a887c85180fd4b8d2215397b59f76be712d64a9e

    SHA256

    b56b49d319a03bfd166fabb2e77b54bc44c7c140745034012fa1de4f8001136e

    SHA512

    157c957b00825afd52d33e7dc5999dd5f121c194629633578cedc07cc4d0221ca86720254339f2f158bd0f9b8d3cc5f378c15766799b11c2ffadcfc39426151c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    11KB

    MD5

    7d3d11b9f9bf162b813080d89c0e2e66

    SHA1

    c9bc055d919b025da9b596a1770049ccf88006c9

    SHA256

    9a23a9d070b8f593f8e157032fd4a2d8286804003a3c38e0f9c1543a94ac074e

    SHA512

    a7af7988267e35ab79074900d52cb5ae20b6a244fa010a68884ea82474a1d042fa0af817725917b10f17acfd8c809cb38c087bc95e85ed735898130679813dfa

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    11KB

    MD5

    979d7e17bd3df29c28c8798b6ba2814b

    SHA1

    a693a3707152e78e0e1216540b14dd8b00323fa5

    SHA256

    8b35b52947aae8fc76c9a654f42ded8d4c9d9f207fdb803cfd847063dbf7d675

    SHA512

    9dca25f9e95b4404f41805472f0277e0fdb680a96f9df6b9e2d4c5c3c5b6a76881c35710d110e49051578f9027a711a8e650db1ce3fc68c108cb32075c7c557f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    11KB

    MD5

    10c30a16d268ef86125941470ff59e77

    SHA1

    bdbed835079c0f6fce500c9a31369df3dc74f9ce

    SHA256

    48bac5db269c6b7e98fe68d5368f9ccf4fa02e6309fd7e14a50fd79633bf16f4

    SHA512

    0d5216a80592966eb7e6eaeff26ae1eef18037fd3af26cf8417cfe3b88cd442f70ad0f8cc2a12ad651f681ee9a86d1f966088857aecd08de74c0aaf9cced2dad

  • C:\Users\Admin\AppData\Local\Temp\nsi34BD.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    0a6f707fa22c3f3e5d1abb54b0894ad6

    SHA1

    610cb2c3623199d0d7461fc775297e23cef88c4e

    SHA256

    370e47364561fa501b1300b056fb53fae12b1639fdf5f113275bee03546081c0

    SHA512

    af0c8ca0c892f1b757fbd700061f3d81417dff11d89bdff45e977de81ad51c97862406cf7e230e76cf99497f93f57bf09609740953cd81b0d795465ac2623ea8

  • C:\Users\Admin\AppData\Local\Temp\nsi34BD.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    0a6f707fa22c3f3e5d1abb54b0894ad6

    SHA1

    610cb2c3623199d0d7461fc775297e23cef88c4e

    SHA256

    370e47364561fa501b1300b056fb53fae12b1639fdf5f113275bee03546081c0

    SHA512

    af0c8ca0c892f1b757fbd700061f3d81417dff11d89bdff45e977de81ad51c97862406cf7e230e76cf99497f93f57bf09609740953cd81b0d795465ac2623ea8

  • C:\Users\Admin\AppData\Local\Temp\nsi34BD.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    0a6f707fa22c3f3e5d1abb54b0894ad6

    SHA1

    610cb2c3623199d0d7461fc775297e23cef88c4e

    SHA256

    370e47364561fa501b1300b056fb53fae12b1639fdf5f113275bee03546081c0

    SHA512

    af0c8ca0c892f1b757fbd700061f3d81417dff11d89bdff45e977de81ad51c97862406cf7e230e76cf99497f93f57bf09609740953cd81b0d795465ac2623ea8

  • C:\Users\Admin\AppData\Local\Temp\nsi34BD.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    0a6f707fa22c3f3e5d1abb54b0894ad6

    SHA1

    610cb2c3623199d0d7461fc775297e23cef88c4e

    SHA256

    370e47364561fa501b1300b056fb53fae12b1639fdf5f113275bee03546081c0

    SHA512

    af0c8ca0c892f1b757fbd700061f3d81417dff11d89bdff45e977de81ad51c97862406cf7e230e76cf99497f93f57bf09609740953cd81b0d795465ac2623ea8

  • C:\Users\Admin\AppData\Local\Temp\nsi34BD.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    0a6f707fa22c3f3e5d1abb54b0894ad6

    SHA1

    610cb2c3623199d0d7461fc775297e23cef88c4e

    SHA256

    370e47364561fa501b1300b056fb53fae12b1639fdf5f113275bee03546081c0

    SHA512

    af0c8ca0c892f1b757fbd700061f3d81417dff11d89bdff45e977de81ad51c97862406cf7e230e76cf99497f93f57bf09609740953cd81b0d795465ac2623ea8

  • C:\Users\Admin\AppData\Local\Temp\nsi34BD.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    0a6f707fa22c3f3e5d1abb54b0894ad6

    SHA1

    610cb2c3623199d0d7461fc775297e23cef88c4e

    SHA256

    370e47364561fa501b1300b056fb53fae12b1639fdf5f113275bee03546081c0

    SHA512

    af0c8ca0c892f1b757fbd700061f3d81417dff11d89bdff45e977de81ad51c97862406cf7e230e76cf99497f93f57bf09609740953cd81b0d795465ac2623ea8

  • C:\Users\Admin\AppData\Local\Temp\nsi34BD.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    0a6f707fa22c3f3e5d1abb54b0894ad6

    SHA1

    610cb2c3623199d0d7461fc775297e23cef88c4e

    SHA256

    370e47364561fa501b1300b056fb53fae12b1639fdf5f113275bee03546081c0

    SHA512

    af0c8ca0c892f1b757fbd700061f3d81417dff11d89bdff45e977de81ad51c97862406cf7e230e76cf99497f93f57bf09609740953cd81b0d795465ac2623ea8

  • C:\Users\Admin\AppData\Local\Temp\nsi34BD.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    0a6f707fa22c3f3e5d1abb54b0894ad6

    SHA1

    610cb2c3623199d0d7461fc775297e23cef88c4e

    SHA256

    370e47364561fa501b1300b056fb53fae12b1639fdf5f113275bee03546081c0

    SHA512

    af0c8ca0c892f1b757fbd700061f3d81417dff11d89bdff45e977de81ad51c97862406cf7e230e76cf99497f93f57bf09609740953cd81b0d795465ac2623ea8

  • C:\Users\Admin\AppData\Local\Temp\nsi34BD.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    0a6f707fa22c3f3e5d1abb54b0894ad6

    SHA1

    610cb2c3623199d0d7461fc775297e23cef88c4e

    SHA256

    370e47364561fa501b1300b056fb53fae12b1639fdf5f113275bee03546081c0

    SHA512

    af0c8ca0c892f1b757fbd700061f3d81417dff11d89bdff45e977de81ad51c97862406cf7e230e76cf99497f93f57bf09609740953cd81b0d795465ac2623ea8

  • C:\Users\Admin\AppData\Local\Temp\nsi34BD.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    0a6f707fa22c3f3e5d1abb54b0894ad6

    SHA1

    610cb2c3623199d0d7461fc775297e23cef88c4e

    SHA256

    370e47364561fa501b1300b056fb53fae12b1639fdf5f113275bee03546081c0

    SHA512

    af0c8ca0c892f1b757fbd700061f3d81417dff11d89bdff45e977de81ad51c97862406cf7e230e76cf99497f93f57bf09609740953cd81b0d795465ac2623ea8

  • C:\Users\Admin\AppData\Local\Temp\nsi34BD.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    0a6f707fa22c3f3e5d1abb54b0894ad6

    SHA1

    610cb2c3623199d0d7461fc775297e23cef88c4e

    SHA256

    370e47364561fa501b1300b056fb53fae12b1639fdf5f113275bee03546081c0

    SHA512

    af0c8ca0c892f1b757fbd700061f3d81417dff11d89bdff45e977de81ad51c97862406cf7e230e76cf99497f93f57bf09609740953cd81b0d795465ac2623ea8

  • C:\Users\Admin\AppData\Local\Temp\nsi34BD.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    0a6f707fa22c3f3e5d1abb54b0894ad6

    SHA1

    610cb2c3623199d0d7461fc775297e23cef88c4e

    SHA256

    370e47364561fa501b1300b056fb53fae12b1639fdf5f113275bee03546081c0

    SHA512

    af0c8ca0c892f1b757fbd700061f3d81417dff11d89bdff45e977de81ad51c97862406cf7e230e76cf99497f93f57bf09609740953cd81b0d795465ac2623ea8

  • C:\Users\Admin\AppData\Local\Temp\nsi34BD.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    0a6f707fa22c3f3e5d1abb54b0894ad6

    SHA1

    610cb2c3623199d0d7461fc775297e23cef88c4e

    SHA256

    370e47364561fa501b1300b056fb53fae12b1639fdf5f113275bee03546081c0

    SHA512

    af0c8ca0c892f1b757fbd700061f3d81417dff11d89bdff45e977de81ad51c97862406cf7e230e76cf99497f93f57bf09609740953cd81b0d795465ac2623ea8

  • C:\Users\Admin\AppData\Local\Temp\nsi34BD.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    0a6f707fa22c3f3e5d1abb54b0894ad6

    SHA1

    610cb2c3623199d0d7461fc775297e23cef88c4e

    SHA256

    370e47364561fa501b1300b056fb53fae12b1639fdf5f113275bee03546081c0

    SHA512

    af0c8ca0c892f1b757fbd700061f3d81417dff11d89bdff45e977de81ad51c97862406cf7e230e76cf99497f93f57bf09609740953cd81b0d795465ac2623ea8

  • memory/436-141-0x0000000000000000-mapping.dmp

  • memory/1464-172-0x0000000000000000-mapping.dmp

  • memory/1504-148-0x0000000000000000-mapping.dmp

  • memory/1820-138-0x00000000058D0000-0x0000000005936000-memory.dmp

    Filesize

    408KB

  • memory/1820-133-0x0000000000000000-mapping.dmp

  • memory/1820-136-0x0000000004F10000-0x0000000004F32000-memory.dmp

    Filesize

    136KB

  • memory/1820-137-0x0000000005860000-0x00000000058C6000-memory.dmp

    Filesize

    408KB

  • memory/1820-139-0x0000000005EA0000-0x0000000005EBE000-memory.dmp

    Filesize

    120KB

  • memory/1820-135-0x0000000005140000-0x0000000005768000-memory.dmp

    Filesize

    6.2MB

  • memory/1820-134-0x00000000025B0000-0x00000000025E6000-memory.dmp

    Filesize

    216KB

  • memory/2120-151-0x0000000000000000-mapping.dmp

  • memory/2576-157-0x0000000000000000-mapping.dmp

  • memory/2620-145-0x0000000000000000-mapping.dmp

  • memory/3040-166-0x0000000000000000-mapping.dmp

  • memory/3228-163-0x0000000000000000-mapping.dmp

  • memory/3384-175-0x0000000000000000-mapping.dmp

  • memory/3508-160-0x0000000000000000-mapping.dmp

  • memory/3600-154-0x0000000000000000-mapping.dmp

  • memory/4016-169-0x0000000000000000-mapping.dmp

  • memory/4632-178-0x0000000000000000-mapping.dmp