Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2022 18:46

General

  • Target

    5cd9f9e3744daa7ecd4479f483124cc269e827c8acc96271e1f1ea2023afa520.exe

  • Size

    2.3MB

  • MD5

    f9a70b66ff579dc6e00109eb5d48055e

  • SHA1

    4337646a6b0d12f8732e5b20003cc999852e3f62

  • SHA256

    5cd9f9e3744daa7ecd4479f483124cc269e827c8acc96271e1f1ea2023afa520

  • SHA512

    782086b98f6c3c296716fa4178170302c56a2fff512e34e9efc724d1eb1108fa7e58e7c1e30425de91aae718c966819e5aa716e4cedad4778d5bf2d6dffec306

  • SSDEEP

    49152:RLfmMc8EjGCbKeaoK94jmPBLeL7gBfi/4gXkc/hbHorCUm0fV:RLfm382GCbKeWyjUBLL2dT/xoWUf

Malware Config

Signatures

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Sets file to hidden 1 TTPs 1 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 28 IoCs
  • Modifies data under HKEY_USERS 10 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5cd9f9e3744daa7ecd4479f483124cc269e827c8acc96271e1f1ea2023afa520.exe
    "C:\Users\Admin\AppData\Local\Temp\5cd9f9e3744daa7ecd4479f483124cc269e827c8acc96271e1f1ea2023afa520.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4376
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\install.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5080
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im anvir.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:5068
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rutserv.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1864
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rfusclient.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4832
      • C:\Windows\SysWOW64\attrib.exe
        attrib +s +h +r "C:\Users\Admin\WindowsUpdate"
        3⤵
        • Sets file to hidden
        • Views/modifies file attributes
        PID:2888
      • C:\Users\Admin\WindowsUpdate\svnhost.exe
        "C:\Users\Admin\WindowsUpdate\svnhost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2408
        • C:\Users\Admin\WindowsUpdate\svnhost.exe
          C:\Users\Admin\WindowsUpdate\svnhost.exe -second
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3488
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rundll32.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2092
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rundll32.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:224
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rundll32.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3296
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rundll32.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4676
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rundll32.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3036
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rundll32.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3552
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rundll32.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3844
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rundll32.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1420
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rundll32.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4592
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rundll32.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1932
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rundll32.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4608
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rundll32.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3820
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rundll32.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3288
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rundll32.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2124
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rundll32.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:904
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rundll32.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2988
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rundll32.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3680
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rundll32.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4552
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rundll32.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4248
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rundll32.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4740
      • C:\Windows\SysWOW64\PING.EXE
        ping -n 1 localhost
        3⤵
        • Runs ping.exe
        PID:4448
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rundll32.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4760
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rundll32.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4564
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rundll32.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:656
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rundll32.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2412
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rundll32.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:876
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon
    1⤵
    • Suspicious use of NtCreateUserProcessOtherParentProcess
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:312

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

2
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Hidden Files and Directories

2
T1158

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RIPCServer.dll
    Filesize

    144KB

    MD5

    794b9c46edf14e255d2e5e40b351ed70

    SHA1

    5e80a8ed318b1c6b7faa0c0ab25a0d2a1db146d8

    SHA256

    d7612a721e42438071bf9adeda3a8d098f7e5e6952aa5a692df88035238f5284

    SHA512

    b0dc026f404bc7700fa5c3b7ca2aade91f9c9dd4dc3a6955d8a93c129995163710f73d4e4cd6825abf4531acd3b53f6358dc56d2b84f7965646a2c1f9893105f

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RWLN.dll
    Filesize

    957KB

    MD5

    5a01089e2ead26a443bd91293f0bbf3c

    SHA1

    5ae736caec70187e328b8ea0c02991830e426527

    SHA256

    d08b94fa5b9794f8217a52236b0a510bec753f4b99a31be6718aea42bd877e54

    SHA512

    843cc40efd1a3087c6af9d0f079202cf2a6bf6adaa1c3593b62af863d70d53bc0809186ff3f01b21232c4e056f6307e12ccb7423b3c3751db509150b426d4413

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\config.dll
    Filesize

    3KB

    MD5

    be6fc300c2d1383b492e4146bf4a8ade

    SHA1

    955f5f5ddac35bb2043e1a1b7f705ca06c053291

    SHA256

    14e9fa14ea51d41ad033a4083c0b6d8e1c36631857d9b754dd97353e72b1c734

    SHA512

    208a93ab1b5c102f05bad973753a8efa0ea93b0e3110838ff4a3de4a5bff2b2ce3fc759d6a9d2a8a17857b61f840a0911de31ad950de03d4dbdf3e47809621fe

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\install.bat
    Filesize

    1KB

    MD5

    724cf69b934c5ea48919692c043d1f7c

    SHA1

    a6e77bdfb330e2581f2e95b2f90f880d5dee4d3d

    SHA256

    0a55e2f6d351225ca543d119d17b47325e55fdba5c513d3849a8ab082a6a73ba

    SHA512

    f433a0ad04518879233eebbf8d1261ce0d17568dd72e5dcc8fad1e648faf61fe189407f995a262e0978726c93a13a4fa1bd7d519d139472fb70bdefecd2577da

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\null
    Filesize

    259B

    MD5

    8d3dc727102c82fe89b1f1110b8f11c1

    SHA1

    91ecc153b914da7d7c09d71b7a588876111c003c

    SHA256

    61b96cc711441f6e6856d203e7a64cbc138ad16fc6f4a87ad2ff8b0ffc8d7ccd

    SHA512

    5e77a20f72d8082b2386273816f5806ba07cf54b8417b15d46bf337f0d73352aead54510cea0d3abd5cc0b92ee19e253586562b5634c99129c01a6c6f725ecd1

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\settings.ini
    Filesize

    124B

    MD5

    02f6e839a25528052aaabf1eaa3cbc09

    SHA1

    069d528f27099497be7a4e6cf9e8f0bead1a71f5

    SHA256

    6c04d815f37b1b9f5a8664bfaf54ee6772c7b40220528057105194fcea18db41

    SHA512

    cdfb2ab5034df602d2ee728a3be3e22f2363de764ae99a2560e971aac0608c05589e852833c2889ea043b591fa289fd5dad0a27e78be69046e09131a1e85a29f

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\svnhost.exe
    Filesize

    5.7MB

    MD5

    9fe52c81b7688321ca8c481f3098c74d

    SHA1

    8db972be34a9203cbe8540567430dc5759995ef5

    SHA256

    6132c9e667923ce1cabb3293b1f3be77d70fb1681bf2d3fb173a93f89eecdd94

    SHA512

    a90c7b64fed2a5a53c03846e18ab8d6209ced08c77ec858454f93e65b3284d069f0559987fcf567b1c4fa5b0f8bd1812e4bb4c7c8200a7470c8f85d588e96074

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\vp8decoder.dll
    Filesize

    409KB

    MD5

    1525887bc6978c0b54fec544877319e6

    SHA1

    7820fcd66e6fbf717d78a2a4df5b0367923dc431

    SHA256

    a47431090c357c00b27a3327d9d591088bc84b60060751ea6454cb3f1ae23e69

    SHA512

    56cb35ef2d5a52ba5cf4769a6bad4a4bae292bceff1b8aff5125046d43aff7683282a14bc8b626d7dccc250e0ed57b1ae54dd105732573089359444f774d6153

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\vp8encoder.dll
    Filesize

    691KB

    MD5

    c8fd8c4bc131d59606b08920b2fda91c

    SHA1

    df777e7c6c1b3d84a8277e6a669e9a5f7c15896d

    SHA256

    6f5ddf4113e92bf798e9ecf0fc0350ee7cae7c5479ca495e3045bdb313efd240

    SHA512

    2fe25325a94cd0f8af30f96ef03c4e64b1a721f603f792d9da72dcd4a5c92081bb24d90da5394f47e54d9d23e9c7ee845cbf469ea8371c088bda787c54b9369d

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\winmm.dll
    Filesize

    104KB

    MD5

    289a39547b5ad28d27910eeb442a5200

    SHA1

    075c6ccec7731d5d9d4bb015bc627c0059351654

    SHA256

    359832f19484c0dafa3975b9bd933149bdddd6239df1c2abaf24e90961dc5d5f

    SHA512

    f183d9223b4492828665f99d018981cacef0c7ee73918354e192a1ce2e691ced90de9699bf8b8fd327794a30b07c9c6040a4f548694a6e01857c64736ca89f05

  • C:\Users\Admin\WindowsUpdate\RIPCServer.dll
    Filesize

    144KB

    MD5

    794b9c46edf14e255d2e5e40b351ed70

    SHA1

    5e80a8ed318b1c6b7faa0c0ab25a0d2a1db146d8

    SHA256

    d7612a721e42438071bf9adeda3a8d098f7e5e6952aa5a692df88035238f5284

    SHA512

    b0dc026f404bc7700fa5c3b7ca2aade91f9c9dd4dc3a6955d8a93c129995163710f73d4e4cd6825abf4531acd3b53f6358dc56d2b84f7965646a2c1f9893105f

  • C:\Users\Admin\WindowsUpdate\RWLN.dll
    Filesize

    957KB

    MD5

    5a01089e2ead26a443bd91293f0bbf3c

    SHA1

    5ae736caec70187e328b8ea0c02991830e426527

    SHA256

    d08b94fa5b9794f8217a52236b0a510bec753f4b99a31be6718aea42bd877e54

    SHA512

    843cc40efd1a3087c6af9d0f079202cf2a6bf6adaa1c3593b62af863d70d53bc0809186ff3f01b21232c4e056f6307e12ccb7423b3c3751db509150b426d4413

  • C:\Users\Admin\WindowsUpdate\config.dll
    Filesize

    3KB

    MD5

    be6fc300c2d1383b492e4146bf4a8ade

    SHA1

    955f5f5ddac35bb2043e1a1b7f705ca06c053291

    SHA256

    14e9fa14ea51d41ad033a4083c0b6d8e1c36631857d9b754dd97353e72b1c734

    SHA512

    208a93ab1b5c102f05bad973753a8efa0ea93b0e3110838ff4a3de4a5bff2b2ce3fc759d6a9d2a8a17857b61f840a0911de31ad950de03d4dbdf3e47809621fe

  • C:\Users\Admin\WindowsUpdate\settings.ini
    Filesize

    124B

    MD5

    02f6e839a25528052aaabf1eaa3cbc09

    SHA1

    069d528f27099497be7a4e6cf9e8f0bead1a71f5

    SHA256

    6c04d815f37b1b9f5a8664bfaf54ee6772c7b40220528057105194fcea18db41

    SHA512

    cdfb2ab5034df602d2ee728a3be3e22f2363de764ae99a2560e971aac0608c05589e852833c2889ea043b591fa289fd5dad0a27e78be69046e09131a1e85a29f

  • C:\Users\Admin\WindowsUpdate\svnhost.exe
    Filesize

    5.7MB

    MD5

    9fe52c81b7688321ca8c481f3098c74d

    SHA1

    8db972be34a9203cbe8540567430dc5759995ef5

    SHA256

    6132c9e667923ce1cabb3293b1f3be77d70fb1681bf2d3fb173a93f89eecdd94

    SHA512

    a90c7b64fed2a5a53c03846e18ab8d6209ced08c77ec858454f93e65b3284d069f0559987fcf567b1c4fa5b0f8bd1812e4bb4c7c8200a7470c8f85d588e96074

  • C:\Users\Admin\WindowsUpdate\svnhost.exe
    Filesize

    5.7MB

    MD5

    9fe52c81b7688321ca8c481f3098c74d

    SHA1

    8db972be34a9203cbe8540567430dc5759995ef5

    SHA256

    6132c9e667923ce1cabb3293b1f3be77d70fb1681bf2d3fb173a93f89eecdd94

    SHA512

    a90c7b64fed2a5a53c03846e18ab8d6209ced08c77ec858454f93e65b3284d069f0559987fcf567b1c4fa5b0f8bd1812e4bb4c7c8200a7470c8f85d588e96074

  • C:\Users\Admin\WindowsUpdate\svnhost.exe
    Filesize

    5.7MB

    MD5

    9fe52c81b7688321ca8c481f3098c74d

    SHA1

    8db972be34a9203cbe8540567430dc5759995ef5

    SHA256

    6132c9e667923ce1cabb3293b1f3be77d70fb1681bf2d3fb173a93f89eecdd94

    SHA512

    a90c7b64fed2a5a53c03846e18ab8d6209ced08c77ec858454f93e65b3284d069f0559987fcf567b1c4fa5b0f8bd1812e4bb4c7c8200a7470c8f85d588e96074

  • C:\Users\Admin\WindowsUpdate\vp8decoder.dll
    Filesize

    409KB

    MD5

    1525887bc6978c0b54fec544877319e6

    SHA1

    7820fcd66e6fbf717d78a2a4df5b0367923dc431

    SHA256

    a47431090c357c00b27a3327d9d591088bc84b60060751ea6454cb3f1ae23e69

    SHA512

    56cb35ef2d5a52ba5cf4769a6bad4a4bae292bceff1b8aff5125046d43aff7683282a14bc8b626d7dccc250e0ed57b1ae54dd105732573089359444f774d6153

  • C:\Users\Admin\WindowsUpdate\vp8encoder.dll
    Filesize

    691KB

    MD5

    c8fd8c4bc131d59606b08920b2fda91c

    SHA1

    df777e7c6c1b3d84a8277e6a669e9a5f7c15896d

    SHA256

    6f5ddf4113e92bf798e9ecf0fc0350ee7cae7c5479ca495e3045bdb313efd240

    SHA512

    2fe25325a94cd0f8af30f96ef03c4e64b1a721f603f792d9da72dcd4a5c92081bb24d90da5394f47e54d9d23e9c7ee845cbf469ea8371c088bda787c54b9369d

  • C:\Users\Admin\WindowsUpdate\winmm.dll
    Filesize

    104KB

    MD5

    289a39547b5ad28d27910eeb442a5200

    SHA1

    075c6ccec7731d5d9d4bb015bc627c0059351654

    SHA256

    359832f19484c0dafa3975b9bd933149bdddd6239df1c2abaf24e90961dc5d5f

    SHA512

    f183d9223b4492828665f99d018981cacef0c7ee73918354e192a1ce2e691ced90de9699bf8b8fd327794a30b07c9c6040a4f548694a6e01857c64736ca89f05

  • C:\Users\Admin\WindowsUpdate\winmm.dll
    Filesize

    104KB

    MD5

    289a39547b5ad28d27910eeb442a5200

    SHA1

    075c6ccec7731d5d9d4bb015bc627c0059351654

    SHA256

    359832f19484c0dafa3975b9bd933149bdddd6239df1c2abaf24e90961dc5d5f

    SHA512

    f183d9223b4492828665f99d018981cacef0c7ee73918354e192a1ce2e691ced90de9699bf8b8fd327794a30b07c9c6040a4f548694a6e01857c64736ca89f05

  • C:\Users\Admin\WindowsUpdate\winmm.dll
    Filesize

    104KB

    MD5

    289a39547b5ad28d27910eeb442a5200

    SHA1

    075c6ccec7731d5d9d4bb015bc627c0059351654

    SHA256

    359832f19484c0dafa3975b9bd933149bdddd6239df1c2abaf24e90961dc5d5f

    SHA512

    f183d9223b4492828665f99d018981cacef0c7ee73918354e192a1ce2e691ced90de9699bf8b8fd327794a30b07c9c6040a4f548694a6e01857c64736ca89f05

  • memory/224-168-0x0000000000000000-mapping.dmp
  • memory/656-226-0x0000000000000000-mapping.dmp
  • memory/876-228-0x0000000000000000-mapping.dmp
  • memory/904-217-0x0000000000000000-mapping.dmp
  • memory/1420-210-0x0000000000000000-mapping.dmp
  • memory/1864-135-0x0000000000000000-mapping.dmp
  • memory/1932-212-0x0000000000000000-mapping.dmp
  • memory/2092-151-0x0000000000000000-mapping.dmp
  • memory/2124-216-0x0000000000000000-mapping.dmp
  • memory/2408-146-0x0000000000000000-mapping.dmp
  • memory/2412-227-0x0000000000000000-mapping.dmp
  • memory/2888-137-0x0000000000000000-mapping.dmp
  • memory/2988-218-0x0000000000000000-mapping.dmp
  • memory/3036-202-0x0000000000000000-mapping.dmp
  • memory/3288-215-0x0000000000000000-mapping.dmp
  • memory/3296-169-0x0000000000000000-mapping.dmp
  • memory/3488-171-0x0000000000000000-mapping.dmp
  • memory/3552-203-0x0000000000000000-mapping.dmp
  • memory/3680-219-0x0000000000000000-mapping.dmp
  • memory/3820-214-0x0000000000000000-mapping.dmp
  • memory/3844-209-0x0000000000000000-mapping.dmp
  • memory/4248-221-0x0000000000000000-mapping.dmp
  • memory/4448-223-0x0000000000000000-mapping.dmp
  • memory/4552-220-0x0000000000000000-mapping.dmp
  • memory/4564-225-0x0000000000000000-mapping.dmp
  • memory/4592-211-0x0000000000000000-mapping.dmp
  • memory/4608-213-0x0000000000000000-mapping.dmp
  • memory/4676-170-0x0000000000000000-mapping.dmp
  • memory/4740-222-0x0000000000000000-mapping.dmp
  • memory/4760-224-0x0000000000000000-mapping.dmp
  • memory/4832-136-0x0000000000000000-mapping.dmp
  • memory/5068-134-0x0000000000000000-mapping.dmp
  • memory/5080-132-0x0000000000000000-mapping.dmp