Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    25-06-2022 17:37

General

  • Target

    8196488884068411be672639c7ae161a22a82c347c0b7c4048e0a4ad131e4f07.exe

  • Size

    4.2MB

  • MD5

    9f5faf58d19a9f2e2cb26d5b1ad90629

  • SHA1

    732c8478d1b29abc2e72bd1b40f58dacfa2c52a9

  • SHA256

    8196488884068411be672639c7ae161a22a82c347c0b7c4048e0a4ad131e4f07

  • SHA512

    630292dc568e15de8332caf0dcd3b54e411f113489d260e3d584881e15085e5f2a4a210cf862a4f13576d36adb26184a593f12cdf14e7caf782b8d26e3a74aeb

Malware Config

Signatures

  • Detect Neshta Payload 7 IoCs
  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 8 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Loads dropped DLL 16 IoCs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8196488884068411be672639c7ae161a22a82c347c0b7c4048e0a4ad131e4f07.exe
    "C:\Users\Admin\AppData\Local\Temp\8196488884068411be672639c7ae161a22a82c347c0b7c4048e0a4ad131e4f07.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\AppData\Local\Temp\._cache_8196488884068411be672639c7ae161a22a82c347c0b7c4048e0a4ad131e4f07.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_8196488884068411be672639c7ae161a22a82c347c0b7c4048e0a4ad131e4f07.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1608
      • \??\c:\users\admin\appdata\local\temp\._cache_8196488884068411be672639c7ae161a22a82c347c0b7c4048e0a4ad131e4f07.exe 
        c:\users\admin\appdata\local\temp\._cache_8196488884068411be672639c7ae161a22a82c347c0b7c4048e0a4ad131e4f07.exe 
        3⤵
        • Executes dropped EXE
        PID:2024
      • C:\Users\Admin\AppData\Local\icsys.icn.exe
        C:\Users\Admin\AppData\Local\icsys.icn.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:672
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Modifies Installed Components in the registry
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1772
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Windows directory
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1336
            • \??\c:\windows\system\svchost.exe
              c:\windows\system\svchost.exe
              6⤵
              • Modifies WinLogon for persistence
              • Modifies visiblity of hidden/system files in Explorer
              • Executes dropped EXE
              • Modifies Installed Components in the registry
              • Loads dropped DLL
              • Adds Run key to start application
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1028
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe PR
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1832
              • C:\Windows\SysWOW64\at.exe
                at 17:42 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                7⤵
                  PID:1016
                • C:\Windows\SysWOW64\at.exe
                  at 17:43 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                  7⤵
                    PID:1780
                  • C:\Windows\SysWOW64\at.exe
                    at 17:44 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                    7⤵
                      PID:800
          • C:\ProgramData\Synaptics\Synaptics.exe
            "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
            2⤵
            • Executes dropped EXE
            PID:1680

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Winlogon Helper DLL

        1
        T1004

        Hidden Files and Directories

        1
        T1158

        Registry Run Keys / Startup Folder

        2
        T1060

        Defense Evasion

        Modify Registry

        4
        T1112

        Hidden Files and Directories

        1
        T1158

        Discovery

        System Information Discovery

        1
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Synaptics\Synaptics.exe
          Filesize

          753KB

          MD5

          59a151e96949a72cd3c839b75a1be6a8

          SHA1

          31e2a7ca7fe8f64abc50004dc52f8f95c3f14552

          SHA256

          03ac93e409b49034b52a6443c9243561a4ed9cbca301224b4bdb44a986937412

          SHA512

          ff792a9c6f966b49edbd9d9deebcef1fad26a16ec52f691c1a179ca31d6d912cc674370ac0d05069bd16ac371868321646783a03f0f027f1775f72a674f9e153

        • C:\Users\Admin\AppData\Local\Temp\._cache_8196488884068411be672639c7ae161a22a82c347c0b7c4048e0a4ad131e4f07.exe
          Filesize

          3.5MB

          MD5

          ab6e7862b000d4aba17a3e0b3116c2d9

          SHA1

          3bd93081765173ad0491b833dfafd9e4c25e26c7

          SHA256

          7ad30698761cc3fb75759e5c54b5a2a911cc0c69815983e35f22cbe409f01aaa

          SHA512

          800f24f82e85ec2e78ac8c0955c37acba75e2a33e48ba9334f6d57814bdf78c856dc32ddac917b6d17ff0f5536ec93f27ad73d2c42692b66fcfdbe465156451f

        • C:\Users\Admin\AppData\Local\Temp\._cache_8196488884068411be672639c7ae161a22a82c347c0b7c4048e0a4ad131e4f07.exe 
          Filesize

          3.3MB

          MD5

          6629663059f7604c63be9bdfd21d57ef

          SHA1

          7d758d59c06d120d216bcab8a1e6b1592b309d2e

          SHA256

          59b9ac3d974d9c00c81f9e879dfe54bc587e67dc5f012520d83ed1951d08d4fa

          SHA512

          673593f2680c754419c19a4a5dcd7deb210c94a8eb430487e8f689ee7fd2c6682bd29ec78138ad6d191f87abcc6347253ef7f804bae012d5b886bca4f9d3eb5f

        • C:\Users\Admin\AppData\Local\icsys.icn.exe
          Filesize

          206KB

          MD5

          1baa9cf8b8a0ab8e5333d4abb9f65e34

          SHA1

          a9bdb997c5597b9eb7bc5fb134ef39d108d44307

          SHA256

          6955adb22b25d5a0600a4f20c0a815fe7737ef39f29dff5beb66a81ab34d2db9

          SHA512

          8a0241afb02e1a6c7bb81bfb877a438e1b83ef50d851a843ab11ddd42da44c59e2822dc2ce1613f3d8841050f215bd69a06bb2b535aa67b827933311085565d2

        • C:\Users\Admin\AppData\Roaming\mrsys.exe
          Filesize

          206KB

          MD5

          906ca7fe2cf0f0c3c70bd3b350d177ba

          SHA1

          017a9d3048c620d0fc486f5e8d2266d624ba1b87

          SHA256

          2905f940abe61affcb9c4cea5746701fb2072640c4722a6eee3f4047960c4263

          SHA512

          3d53d465cd796e673a11deea4e187281a049b8a795d417b4360290ca3002074269fe76e4418b481ed84ee524fa0d0880bae10c4e84a90cf7d5e7db8bc6418194

        • C:\Windows\system\explorer.exe
          Filesize

          206KB

          MD5

          b83a6606173e384e44df58080e3d4a23

          SHA1

          753592d70133c2f63c1813ea52b0f84e154e30db

          SHA256

          5238a836debed00db39641f4ab2731b08351d320ef2415a945c5d7c2a69a6039

          SHA512

          e56c11e61bca0cef62c387be14f13ef34c3cf01655a1536c0188cb970843ec73e64fab3123f0f016d4bfafe931831aa65401dad6c98127e16483d04f6585afc3

        • C:\Windows\system\spoolsv.exe
          Filesize

          206KB

          MD5

          0f5f9b8407ebb5b9bffb26bb8aef4077

          SHA1

          2a33c98a44afd9e4a8b98bca3bdcb9a246a07122

          SHA256

          dd385fbef2ed07a6d611436edba449601d766a18e23b72cb9c02f3b3e52d2c2a

          SHA512

          bb17f5d3eab447d4a93b9395684cd4e1c6a39f51ee20390aa6aac8cefada1e291f5f015cbf807bc32c748482848ff2765941b6ffaf71046af1cc33b3a0e11f5c

        • C:\Windows\system\spoolsv.exe
          Filesize

          206KB

          MD5

          0f5f9b8407ebb5b9bffb26bb8aef4077

          SHA1

          2a33c98a44afd9e4a8b98bca3bdcb9a246a07122

          SHA256

          dd385fbef2ed07a6d611436edba449601d766a18e23b72cb9c02f3b3e52d2c2a

          SHA512

          bb17f5d3eab447d4a93b9395684cd4e1c6a39f51ee20390aa6aac8cefada1e291f5f015cbf807bc32c748482848ff2765941b6ffaf71046af1cc33b3a0e11f5c

        • C:\Windows\system\svchost.exe
          Filesize

          207KB

          MD5

          3ae3e258d7fff6bdf2374f9a222f7f16

          SHA1

          853640d366277fd53d8f8cebdbb9671ecb7a0d6b

          SHA256

          0f55b07df7c236d79c69aa363f66cdfdac8049912c7b03ef2255d280e880334c

          SHA512

          27e27f5f2c06d44565cfe28eedf3663d58763e0e4bc973271d94099814d0866834067c6644a47a87a38f7a08c869056815bb1d74add40bc7392a8b4c72e3653e

        • \??\c:\users\admin\appdata\local\icsys.icn.exe
          Filesize

          206KB

          MD5

          1baa9cf8b8a0ab8e5333d4abb9f65e34

          SHA1

          a9bdb997c5597b9eb7bc5fb134ef39d108d44307

          SHA256

          6955adb22b25d5a0600a4f20c0a815fe7737ef39f29dff5beb66a81ab34d2db9

          SHA512

          8a0241afb02e1a6c7bb81bfb877a438e1b83ef50d851a843ab11ddd42da44c59e2822dc2ce1613f3d8841050f215bd69a06bb2b535aa67b827933311085565d2

        • \??\c:\users\admin\appdata\local\temp\._cache_8196488884068411be672639c7ae161a22a82c347c0b7c4048e0a4ad131e4f07.exe
          Filesize

          3.5MB

          MD5

          ab6e7862b000d4aba17a3e0b3116c2d9

          SHA1

          3bd93081765173ad0491b833dfafd9e4c25e26c7

          SHA256

          7ad30698761cc3fb75759e5c54b5a2a911cc0c69815983e35f22cbe409f01aaa

          SHA512

          800f24f82e85ec2e78ac8c0955c37acba75e2a33e48ba9334f6d57814bdf78c856dc32ddac917b6d17ff0f5536ec93f27ad73d2c42692b66fcfdbe465156451f

        • \??\c:\windows\system\explorer.exe
          Filesize

          206KB

          MD5

          b83a6606173e384e44df58080e3d4a23

          SHA1

          753592d70133c2f63c1813ea52b0f84e154e30db

          SHA256

          5238a836debed00db39641f4ab2731b08351d320ef2415a945c5d7c2a69a6039

          SHA512

          e56c11e61bca0cef62c387be14f13ef34c3cf01655a1536c0188cb970843ec73e64fab3123f0f016d4bfafe931831aa65401dad6c98127e16483d04f6585afc3

        • \??\c:\windows\system\spoolsv.exe
          Filesize

          206KB

          MD5

          0f5f9b8407ebb5b9bffb26bb8aef4077

          SHA1

          2a33c98a44afd9e4a8b98bca3bdcb9a246a07122

          SHA256

          dd385fbef2ed07a6d611436edba449601d766a18e23b72cb9c02f3b3e52d2c2a

          SHA512

          bb17f5d3eab447d4a93b9395684cd4e1c6a39f51ee20390aa6aac8cefada1e291f5f015cbf807bc32c748482848ff2765941b6ffaf71046af1cc33b3a0e11f5c

        • \??\c:\windows\system\svchost.exe
          Filesize

          207KB

          MD5

          3ae3e258d7fff6bdf2374f9a222f7f16

          SHA1

          853640d366277fd53d8f8cebdbb9671ecb7a0d6b

          SHA256

          0f55b07df7c236d79c69aa363f66cdfdac8049912c7b03ef2255d280e880334c

          SHA512

          27e27f5f2c06d44565cfe28eedf3663d58763e0e4bc973271d94099814d0866834067c6644a47a87a38f7a08c869056815bb1d74add40bc7392a8b4c72e3653e

        • \ProgramData\Synaptics\Synaptics.exe
          Filesize

          753KB

          MD5

          59a151e96949a72cd3c839b75a1be6a8

          SHA1

          31e2a7ca7fe8f64abc50004dc52f8f95c3f14552

          SHA256

          03ac93e409b49034b52a6443c9243561a4ed9cbca301224b4bdb44a986937412

          SHA512

          ff792a9c6f966b49edbd9d9deebcef1fad26a16ec52f691c1a179ca31d6d912cc674370ac0d05069bd16ac371868321646783a03f0f027f1775f72a674f9e153

        • \ProgramData\Synaptics\Synaptics.exe
          Filesize

          753KB

          MD5

          59a151e96949a72cd3c839b75a1be6a8

          SHA1

          31e2a7ca7fe8f64abc50004dc52f8f95c3f14552

          SHA256

          03ac93e409b49034b52a6443c9243561a4ed9cbca301224b4bdb44a986937412

          SHA512

          ff792a9c6f966b49edbd9d9deebcef1fad26a16ec52f691c1a179ca31d6d912cc674370ac0d05069bd16ac371868321646783a03f0f027f1775f72a674f9e153

        • \Users\Admin\AppData\Local\Temp\._cache_8196488884068411be672639c7ae161a22a82c347c0b7c4048e0a4ad131e4f07.exe
          Filesize

          3.5MB

          MD5

          ab6e7862b000d4aba17a3e0b3116c2d9

          SHA1

          3bd93081765173ad0491b833dfafd9e4c25e26c7

          SHA256

          7ad30698761cc3fb75759e5c54b5a2a911cc0c69815983e35f22cbe409f01aaa

          SHA512

          800f24f82e85ec2e78ac8c0955c37acba75e2a33e48ba9334f6d57814bdf78c856dc32ddac917b6d17ff0f5536ec93f27ad73d2c42692b66fcfdbe465156451f

        • \Users\Admin\AppData\Local\Temp\._cache_8196488884068411be672639c7ae161a22a82c347c0b7c4048e0a4ad131e4f07.exe
          Filesize

          3.5MB

          MD5

          ab6e7862b000d4aba17a3e0b3116c2d9

          SHA1

          3bd93081765173ad0491b833dfafd9e4c25e26c7

          SHA256

          7ad30698761cc3fb75759e5c54b5a2a911cc0c69815983e35f22cbe409f01aaa

          SHA512

          800f24f82e85ec2e78ac8c0955c37acba75e2a33e48ba9334f6d57814bdf78c856dc32ddac917b6d17ff0f5536ec93f27ad73d2c42692b66fcfdbe465156451f

        • \Users\Admin\AppData\Local\Temp\._cache_8196488884068411be672639c7ae161a22a82c347c0b7c4048e0a4ad131e4f07.exe 
          Filesize

          3.3MB

          MD5

          6629663059f7604c63be9bdfd21d57ef

          SHA1

          7d758d59c06d120d216bcab8a1e6b1592b309d2e

          SHA256

          59b9ac3d974d9c00c81f9e879dfe54bc587e67dc5f012520d83ed1951d08d4fa

          SHA512

          673593f2680c754419c19a4a5dcd7deb210c94a8eb430487e8f689ee7fd2c6682bd29ec78138ad6d191f87abcc6347253ef7f804bae012d5b886bca4f9d3eb5f

        • \Users\Admin\AppData\Local\Temp\._cache_8196488884068411be672639c7ae161a22a82c347c0b7c4048e0a4ad131e4f07.exe 
          Filesize

          3.3MB

          MD5

          6629663059f7604c63be9bdfd21d57ef

          SHA1

          7d758d59c06d120d216bcab8a1e6b1592b309d2e

          SHA256

          59b9ac3d974d9c00c81f9e879dfe54bc587e67dc5f012520d83ed1951d08d4fa

          SHA512

          673593f2680c754419c19a4a5dcd7deb210c94a8eb430487e8f689ee7fd2c6682bd29ec78138ad6d191f87abcc6347253ef7f804bae012d5b886bca4f9d3eb5f

        • \Users\Admin\AppData\Local\icsys.icn.exe
          Filesize

          206KB

          MD5

          1baa9cf8b8a0ab8e5333d4abb9f65e34

          SHA1

          a9bdb997c5597b9eb7bc5fb134ef39d108d44307

          SHA256

          6955adb22b25d5a0600a4f20c0a815fe7737ef39f29dff5beb66a81ab34d2db9

          SHA512

          8a0241afb02e1a6c7bb81bfb877a438e1b83ef50d851a843ab11ddd42da44c59e2822dc2ce1613f3d8841050f215bd69a06bb2b535aa67b827933311085565d2

        • \Users\Admin\AppData\Local\icsys.icn.exe
          Filesize

          206KB

          MD5

          1baa9cf8b8a0ab8e5333d4abb9f65e34

          SHA1

          a9bdb997c5597b9eb7bc5fb134ef39d108d44307

          SHA256

          6955adb22b25d5a0600a4f20c0a815fe7737ef39f29dff5beb66a81ab34d2db9

          SHA512

          8a0241afb02e1a6c7bb81bfb877a438e1b83ef50d851a843ab11ddd42da44c59e2822dc2ce1613f3d8841050f215bd69a06bb2b535aa67b827933311085565d2

        • \Windows\system\explorer.exe
          Filesize

          206KB

          MD5

          b83a6606173e384e44df58080e3d4a23

          SHA1

          753592d70133c2f63c1813ea52b0f84e154e30db

          SHA256

          5238a836debed00db39641f4ab2731b08351d320ef2415a945c5d7c2a69a6039

          SHA512

          e56c11e61bca0cef62c387be14f13ef34c3cf01655a1536c0188cb970843ec73e64fab3123f0f016d4bfafe931831aa65401dad6c98127e16483d04f6585afc3

        • \Windows\system\explorer.exe
          Filesize

          206KB

          MD5

          b83a6606173e384e44df58080e3d4a23

          SHA1

          753592d70133c2f63c1813ea52b0f84e154e30db

          SHA256

          5238a836debed00db39641f4ab2731b08351d320ef2415a945c5d7c2a69a6039

          SHA512

          e56c11e61bca0cef62c387be14f13ef34c3cf01655a1536c0188cb970843ec73e64fab3123f0f016d4bfafe931831aa65401dad6c98127e16483d04f6585afc3

        • \Windows\system\spoolsv.exe
          Filesize

          206KB

          MD5

          0f5f9b8407ebb5b9bffb26bb8aef4077

          SHA1

          2a33c98a44afd9e4a8b98bca3bdcb9a246a07122

          SHA256

          dd385fbef2ed07a6d611436edba449601d766a18e23b72cb9c02f3b3e52d2c2a

          SHA512

          bb17f5d3eab447d4a93b9395684cd4e1c6a39f51ee20390aa6aac8cefada1e291f5f015cbf807bc32c748482848ff2765941b6ffaf71046af1cc33b3a0e11f5c

        • \Windows\system\spoolsv.exe
          Filesize

          206KB

          MD5

          0f5f9b8407ebb5b9bffb26bb8aef4077

          SHA1

          2a33c98a44afd9e4a8b98bca3bdcb9a246a07122

          SHA256

          dd385fbef2ed07a6d611436edba449601d766a18e23b72cb9c02f3b3e52d2c2a

          SHA512

          bb17f5d3eab447d4a93b9395684cd4e1c6a39f51ee20390aa6aac8cefada1e291f5f015cbf807bc32c748482848ff2765941b6ffaf71046af1cc33b3a0e11f5c

        • \Windows\system\spoolsv.exe
          Filesize

          206KB

          MD5

          0f5f9b8407ebb5b9bffb26bb8aef4077

          SHA1

          2a33c98a44afd9e4a8b98bca3bdcb9a246a07122

          SHA256

          dd385fbef2ed07a6d611436edba449601d766a18e23b72cb9c02f3b3e52d2c2a

          SHA512

          bb17f5d3eab447d4a93b9395684cd4e1c6a39f51ee20390aa6aac8cefada1e291f5f015cbf807bc32c748482848ff2765941b6ffaf71046af1cc33b3a0e11f5c

        • \Windows\system\spoolsv.exe
          Filesize

          206KB

          MD5

          0f5f9b8407ebb5b9bffb26bb8aef4077

          SHA1

          2a33c98a44afd9e4a8b98bca3bdcb9a246a07122

          SHA256

          dd385fbef2ed07a6d611436edba449601d766a18e23b72cb9c02f3b3e52d2c2a

          SHA512

          bb17f5d3eab447d4a93b9395684cd4e1c6a39f51ee20390aa6aac8cefada1e291f5f015cbf807bc32c748482848ff2765941b6ffaf71046af1cc33b3a0e11f5c

        • \Windows\system\svchost.exe
          Filesize

          207KB

          MD5

          3ae3e258d7fff6bdf2374f9a222f7f16

          SHA1

          853640d366277fd53d8f8cebdbb9671ecb7a0d6b

          SHA256

          0f55b07df7c236d79c69aa363f66cdfdac8049912c7b03ef2255d280e880334c

          SHA512

          27e27f5f2c06d44565cfe28eedf3663d58763e0e4bc973271d94099814d0866834067c6644a47a87a38f7a08c869056815bb1d74add40bc7392a8b4c72e3653e

        • \Windows\system\svchost.exe
          Filesize

          207KB

          MD5

          3ae3e258d7fff6bdf2374f9a222f7f16

          SHA1

          853640d366277fd53d8f8cebdbb9671ecb7a0d6b

          SHA256

          0f55b07df7c236d79c69aa363f66cdfdac8049912c7b03ef2255d280e880334c

          SHA512

          27e27f5f2c06d44565cfe28eedf3663d58763e0e4bc973271d94099814d0866834067c6644a47a87a38f7a08c869056815bb1d74add40bc7392a8b4c72e3653e

        • memory/672-76-0x0000000000000000-mapping.dmp
        • memory/800-122-0x0000000000000000-mapping.dmp
        • memory/1016-117-0x0000000000000000-mapping.dmp
        • memory/1028-103-0x0000000000000000-mapping.dmp
        • memory/1336-94-0x0000000000000000-mapping.dmp
        • memory/1608-57-0x0000000000000000-mapping.dmp
        • memory/1680-66-0x0000000000000000-mapping.dmp
        • memory/1772-85-0x0000000000000000-mapping.dmp
        • memory/1780-120-0x0000000000000000-mapping.dmp
        • memory/1832-112-0x0000000000000000-mapping.dmp
        • memory/1992-54-0x0000000074E91000-0x0000000074E93000-memory.dmp
          Filesize

          8KB

        • memory/2024-71-0x0000000000000000-mapping.dmp