Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    18-05-2024 23:05

General

  • Target

    1d3535cc01b2cc54b808a55e945707a0_NeikiAnalytics.exe

  • Size

    596KB

  • MD5

    1d3535cc01b2cc54b808a55e945707a0

  • SHA1

    a9a563b8ee37f17c847248bb207b28086d9f4628

  • SHA256

    f5faa2b827aaae846580fe313cfc3562fcf04dbf26320c7190247621c7e10f19

  • SHA512

    4c344a2abc7ace17a3fced1e3fcf09ac959b47d8bc1a5bf4280d46c3dccd015254a42ce722f93bbbe28f9866696db685df6209b4e863fa9e02772753eeb2ebbc

  • SSDEEP

    12288:15/Sm4/r42toIX4IaZo2BOtdMKX8MbICwAvV6LwfAnxMlpxxWmBNIg9SWvAK:70/rX8IJ2BwNQcfAnxgDzBx

Malware Config

Extracted

Family

redline

Botnet

Vic

C2

beshomandotestbesnd.run.place:1111

Extracted

Family

xworm

C2

127.0.0.1:7000

beshomandotestbesnd.run.place:7000

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    taskmgr.exe

  • telegram

    https://api.telegram.org/bot2128988424:AAEkYnwvOQA95riqRZwlqBxg4GV-odRNOyo/sendMessage?chat_id=966649672

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect Xworm Payload 4 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 6 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • .NET Reactor proctector 35 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d3535cc01b2cc54b808a55e945707a0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\1d3535cc01b2cc54b808a55e945707a0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\ProgramData\system.exe
      "C:\ProgramData\system.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1448
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\system.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2580
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'system.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2180
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\taskmgr.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1408
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'taskmgr.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:772
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "taskmgr" /tr "C:\ProgramData\taskmgr.exe"
        3⤵
        • Creates scheduled task(s)
        PID:1176
    • C:\ProgramData\build.exe
      "C:\ProgramData\build.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1596
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {E06C42AA-EEB0-46B7-ACD1-08BCF95562C9} S-1-5-21-2721934792-624042501-2768869379-1000:BISMIZHX\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\ProgramData\taskmgr.exe
      C:\ProgramData\taskmgr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:852
    • C:\ProgramData\taskmgr.exe
      C:\ProgramData\taskmgr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\build.exe
    Filesize

    95KB

    MD5

    16280875fdcf55ab4c8f1dff6dabc72e

    SHA1

    39880e6fbb258f4f4fa5c79337ec893acae55fb7

    SHA256

    91455ac8837ff1fdba7067cd3e7f790c1649ae70164ccbdf0483eae831a7253a

    SHA512

    53ba4e5e88a8f19ba3faa2f1244501c2d62827a9178ec0fdc995582e03e7d8e39f2dfd7bde11285781a65a021d4f4aab48b94be66a8a1cebbd47ab0cb819202e

  • C:\ProgramData\system.exe
    Filesize

    75KB

    MD5

    70b9f8ef4c4ce24fe372b292aebcd138

    SHA1

    5fd7ce9318727b27db0dd50effbb632686d53f8c

    SHA256

    15af516d88e83cfc8d3deebe7aeb9ccaebc558fc93544ef31b612113fcce907b

    SHA512

    b4658ccb665aa9f43cc049a51c477a0b314c5c13d254d648e34f9feca9feb06021bbf271857f73998e31cc7f877fa5457fbe7420beb58f3563fbfbe121a4cbad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    a446ac12ba523086f5cbb3a3b9a41b05

    SHA1

    6e87c261fc7a6998905dd19e4ee2d9ad506a10e8

    SHA256

    bca6dc8e4443cc83f9fc28dd74bde69186fe6e1b50971e75fa094c9ca1cc872a

    SHA512

    85a83815e8701278ea035fa93c6f2b99da0992d93c4ccdbc9a16acf3e6880575c753b66d3f0f91dc58a9834655c5a19e806c53ec3e40e73c8ac7b40757eef673

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    a750133d79254dba35dd7c0c8d293577

    SHA1

    1fde938d32a487e65fd744c8fac34a5b979640ea

    SHA256

    f02a09cf320f1b69ced1720c62b671f7f6a7673884129a6e1e8b0364bb34ebc3

    SHA512

    5a44978fea3de5758b22013fdd98c502484123c02434c5927b1d5822e1f2720d2999f92f8e93f72d5259d253aa441be1eccce5a9456229fb4644c2fd4656740e

  • C:\Users\Admin\AppData\Local\Temp\Cab3BBB.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar3CBB.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\tmp42AC.tmp
    Filesize

    46KB

    MD5

    02d2c46697e3714e49f46b680b9a6b83

    SHA1

    84f98b56d49f01e9b6b76a4e21accf64fd319140

    SHA256

    522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

    SHA512

    60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

  • C:\Users\Admin\AppData\Local\Temp\tmp42C1.tmp
    Filesize

    92KB

    MD5

    18e04095708297d6889a6962f81e8d8f

    SHA1

    9a25645db1da0217092c06579599b04982192124

    SHA256

    4ed16c019fe50bb4ab1c9dcedf0e52f93454b5dbaf18615d60761e7927b69fb7

    SHA512

    45ec57bddeeb8bca05babcf8da83bf9db630819b23076a1cf79f2e54b3e88e14cd7db650332554026ab5e8634061dd699f322bcba6683765063e67ac47ea1caf

  • C:\Users\Admin\AppData\Local\Temp\tmpB284.tmp
    Filesize

    96KB

    MD5

    d367ddfda80fdcf578726bc3b0bc3e3c

    SHA1

    23fcd5e4e0e5e296bee7e5224a8404ecd92cf671

    SHA256

    0b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0

    SHA512

    40e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77

  • C:\Users\Admin\AppData\Local\Temp\tmpB69B.tmp
    Filesize

    958KB

    MD5

    14d1aa6ede65544d3d2631768643b8c1

    SHA1

    b492b5d9f785d4237911b3180b7eb78b95b90d34

    SHA256

    2d4931d0c8474ba3a93c6542b3c95e4a23ddcd07751a870c892e1088a823ba9e

    SHA512

    f3ae79743e1d8ed199b6923f1657239436c2431868df87a126772452473883d3bc71fd3427e918c543408e6a76f1f9a6e6ae0821643b9662a91c9de8014df998

  • C:\Users\Admin\AppData\Local\Temp\tmpB69C.tmp
    Filesize

    11KB

    MD5

    a33e5b189842c5867f46566bdbf7a095

    SHA1

    e1c06359f6a76da90d19e8fd95e79c832edb3196

    SHA256

    5abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454

    SHA512

    f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b

  • C:\Users\Admin\AppData\Local\Temp\tmpB69D.tmp
    Filesize

    11KB

    MD5

    4a8fbd593a733fc669169d614021185b

    SHA1

    166e66575715d4c52bcb471c09bdbc5a9bb2f615

    SHA256

    714cd32f8edacb3befbfc4b17db5b6eb05c2c8936e3bae14ea25a6050d88ae42

    SHA512

    6b2ebbbc34cd821fd9b3d7711d9cdadd8736412227e191883e5df19068f8118b7c80248eb61cc0a2f785a4153871a6003d79de934254b2c74c33b284c507a33b

  • C:\Users\Admin\AppData\Local\Temp\tmpB69E.tmp
    Filesize

    11KB

    MD5

    bfbc1a403197ac8cfc95638c2da2cf0e

    SHA1

    634658f4dd9747e87fa540f5ba47e218acfc8af2

    SHA256

    272ed278e82c84cf4f80f48ec7989e1fc35f2055d6d05b63c8a31880846597a6

    SHA512

    b8938526fcbf7152805aec130ca553e3ec949cb825430a5d0a25c90ec5eb0863857010484a4b31fdc4bb65a4c92ad7127c812b93114be4569a677f60debe43b1

  • C:\Users\Admin\AppData\Local\Temp\tmpB69F.tmp
    Filesize

    11KB

    MD5

    3b068f508d40eb8258ff0b0592ca1f9c

    SHA1

    59ac025c3256e9c6c86165082974fe791ff9833a

    SHA256

    07db44a8d6c3a512b15f1cb7262a2d7e4b63ced2130bc9228515431699191cc7

    SHA512

    e29624bc8fecb0e2a9d917642375bd97b42502e5f23812195a61a4920cae5b6ed540e74dfcf8432dcceb7de906ad0501cdd68056f9b0ec86a6bb0c1e336bfe32

  • C:\Users\Admin\AppData\Local\Temp\tmpB6A0.tmp
    Filesize

    11KB

    MD5

    87cbab2a743fb7e0625cc332c9aac537

    SHA1

    50f858caa7f4ac3a93cf141a5d15b4edeb447ee7

    SHA256

    57e3b0d22fa619da90237d8bcf8f922b142c9f6abf47efc5a1f5b208c4d3f023

    SHA512

    6b678f0dd0030806effe6825fd52a6a30b951e0c3dcf91dfd7a713d387aa8b39ec24368e9623c463360acba5e929e268f75ce996526c5d4485894b8ac6b2e0fa

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\S8ZJ806P8ME7ST1LN6SE.temp
    Filesize

    7KB

    MD5

    990a6999dda20cd62dfd8412e644124e

    SHA1

    2e5c8b4548ac0dc33e156bcccfbba817e0bd8665

    SHA256

    36519e5d34dff8c4e1c1ae471a4cf55af710abc55accf72747daf8855915d6fa

    SHA512

    d5588b3035ae4cae70e1ec6d49ec2573cb80850a987e0eacdb8f053c77f63b76e7c36acfa11e81f70ad453d43a1ee15c899519e8f5c9a3b425e0d5e3c745a8bf

  • memory/852-352-0x0000000000270000-0x000000000028A000-memory.dmp
    Filesize

    104KB

  • memory/1448-136-0x000007FEF5573000-0x000007FEF5574000-memory.dmp
    Filesize

    4KB

  • memory/1448-137-0x0000000000FB0000-0x0000000000FCA000-memory.dmp
    Filesize

    104KB

  • memory/1448-341-0x0000000000F90000-0x0000000000FAC000-memory.dmp
    Filesize

    112KB

  • memory/1448-340-0x000000001DEE0000-0x000000001E1C2000-memory.dmp
    Filesize

    2.9MB

  • memory/1448-343-0x000000001A750000-0x000000001A758000-memory.dmp
    Filesize

    32KB

  • memory/1448-339-0x0000000000F80000-0x0000000000F8E000-memory.dmp
    Filesize

    56KB

  • memory/1448-338-0x0000000000F50000-0x0000000000F6E000-memory.dmp
    Filesize

    120KB

  • memory/1448-336-0x000007FEF5573000-0x000007FEF5574000-memory.dmp
    Filesize

    4KB

  • memory/1448-342-0x000000001B2B0000-0x000000001B2F8000-memory.dmp
    Filesize

    288KB

  • memory/1448-139-0x000000001B1F0000-0x000000001B270000-memory.dmp
    Filesize

    512KB

  • memory/1448-347-0x000000001A760000-0x000000001A776000-memory.dmp
    Filesize

    88KB

  • memory/1448-346-0x000000001B750000-0x000000001B79A000-memory.dmp
    Filesize

    296KB

  • memory/1448-345-0x000000001B710000-0x000000001B744000-memory.dmp
    Filesize

    208KB

  • memory/1448-344-0x000000001B530000-0x000000001B5D6000-memory.dmp
    Filesize

    664KB

  • memory/1448-348-0x000000001B1F0000-0x000000001B270000-memory.dmp
    Filesize

    512KB

  • memory/1596-335-0x00000000740FE000-0x00000000740FF000-memory.dmp
    Filesize

    4KB

  • memory/1596-134-0x00000000000C0000-0x00000000000DE000-memory.dmp
    Filesize

    120KB

  • memory/1596-135-0x00000000740FE000-0x00000000740FF000-memory.dmp
    Filesize

    4KB

  • memory/1596-138-0x00000000049F0000-0x0000000004A30000-memory.dmp
    Filesize

    256KB

  • memory/1596-337-0x00000000049F0000-0x0000000004A30000-memory.dmp
    Filesize

    256KB

  • memory/2180-151-0x000000001B670000-0x000000001B952000-memory.dmp
    Filesize

    2.9MB

  • memory/2180-152-0x0000000001C80000-0x0000000001C88000-memory.dmp
    Filesize

    32KB

  • memory/2580-145-0x0000000001D10000-0x0000000001D18000-memory.dmp
    Filesize

    32KB

  • memory/2580-144-0x000000001B740000-0x000000001BA22000-memory.dmp
    Filesize

    2.9MB

  • memory/2808-475-0x0000000000290000-0x00000000002AA000-memory.dmp
    Filesize

    104KB

  • memory/2912-12-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-54-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-14-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-28-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-10-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-7-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-30-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-36-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-16-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-32-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-18-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-46-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-38-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-40-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-43-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-44-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-49-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-50-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-52-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-3-0x0000000000400000-0x000000000048B000-memory.dmp
    Filesize

    556KB

  • memory/2912-58-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-34-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-56-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-60-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-130-0x0000000000400000-0x000000000048B000-memory.dmp
    Filesize

    556KB

  • memory/2912-132-0x0000000000400000-0x00000000004DF000-memory.dmp
    Filesize

    892KB

  • memory/2912-22-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-24-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-131-0x0000000000250000-0x0000000000350000-memory.dmp
    Filesize

    1024KB

  • memory/2912-62-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-64-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-66-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-68-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-70-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-20-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-8-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB

  • memory/2912-6-0x0000000002150000-0x00000000021B4000-memory.dmp
    Filesize

    400KB

  • memory/2912-1-0x0000000000250000-0x0000000000350000-memory.dmp
    Filesize

    1024KB

  • memory/2912-5-0x0000000002260000-0x00000000022C6000-memory.dmp
    Filesize

    408KB

  • memory/2912-2-0x00000000004E0000-0x0000000000568000-memory.dmp
    Filesize

    544KB

  • memory/2912-4-0x0000000000400000-0x00000000004DF000-memory.dmp
    Filesize

    892KB

  • memory/2912-26-0x0000000002150000-0x00000000021AF000-memory.dmp
    Filesize

    380KB