Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-05-2024 23:05

General

  • Target

    1d3535cc01b2cc54b808a55e945707a0_NeikiAnalytics.exe

  • Size

    596KB

  • MD5

    1d3535cc01b2cc54b808a55e945707a0

  • SHA1

    a9a563b8ee37f17c847248bb207b28086d9f4628

  • SHA256

    f5faa2b827aaae846580fe313cfc3562fcf04dbf26320c7190247621c7e10f19

  • SHA512

    4c344a2abc7ace17a3fced1e3fcf09ac959b47d8bc1a5bf4280d46c3dccd015254a42ce722f93bbbe28f9866696db685df6209b4e863fa9e02772753eeb2ebbc

  • SSDEEP

    12288:15/Sm4/r42toIX4IaZo2BOtdMKX8MbICwAvV6LwfAnxMlpxxWmBNIg9SWvAK:70/rX8IJ2BwNQcfAnxgDzBx

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:7000

beshomandotestbesnd.run.place:7000

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    taskmgr.exe

  • telegram

    https://api.telegram.org/bot2128988424:AAEkYnwvOQA95riqRZwlqBxg4GV-odRNOyo/sendMessage?chat_id=966649672

Extracted

Family

redline

Botnet

Vic

C2

beshomandotestbesnd.run.place:1111

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect Xworm Payload 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 3 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • .NET Reactor proctector 35 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d3535cc01b2cc54b808a55e945707a0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\1d3535cc01b2cc54b808a55e945707a0_NeikiAnalytics.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4940
    • C:\ProgramData\system.exe
      "C:\ProgramData\system.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3744
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\system.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:860
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'system.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3820
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\taskmgr.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3584
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'taskmgr.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2472
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "taskmgr" /tr "C:\ProgramData\taskmgr.exe"
        3⤵
        • Creates scheduled task(s)
        PID:2428
    • C:\ProgramData\build.exe
      "C:\ProgramData\build.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1628
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4940 -s 1312
      2⤵
      • Program crash
      PID:724
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4940 -ip 4940
    1⤵
      PID:4416
    • C:\ProgramData\taskmgr.exe
      C:\ProgramData\taskmgr.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1912
    • C:\ProgramData\taskmgr.exe
      C:\ProgramData\taskmgr.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3120
    • C:\ProgramData\taskmgr.exe
      C:\ProgramData\taskmgr.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3828

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\build.exe

      Filesize

      95KB

      MD5

      16280875fdcf55ab4c8f1dff6dabc72e

      SHA1

      39880e6fbb258f4f4fa5c79337ec893acae55fb7

      SHA256

      91455ac8837ff1fdba7067cd3e7f790c1649ae70164ccbdf0483eae831a7253a

      SHA512

      53ba4e5e88a8f19ba3faa2f1244501c2d62827a9178ec0fdc995582e03e7d8e39f2dfd7bde11285781a65a021d4f4aab48b94be66a8a1cebbd47ab0cb819202e

    • C:\ProgramData\system.exe

      Filesize

      75KB

      MD5

      70b9f8ef4c4ce24fe372b292aebcd138

      SHA1

      5fd7ce9318727b27db0dd50effbb632686d53f8c

      SHA256

      15af516d88e83cfc8d3deebe7aeb9ccaebc558fc93544ef31b612113fcce907b

      SHA512

      b4658ccb665aa9f43cc049a51c477a0b314c5c13d254d648e34f9feca9feb06021bbf271857f73998e31cc7f877fa5457fbe7420beb58f3563fbfbe121a4cbad

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      d85ba6ff808d9e5444a4b369f5bc2730

      SHA1

      31aa9d96590fff6981b315e0b391b575e4c0804a

      SHA256

      84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

      SHA512

      8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\taskmgr.exe.log

      Filesize

      654B

      MD5

      2ff39f6c7249774be85fd60a8f9a245e

      SHA1

      684ff36b31aedc1e587c8496c02722c6698c1c4e

      SHA256

      e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

      SHA512

      1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      77d622bb1a5b250869a3238b9bc1402b

      SHA1

      d47f4003c2554b9dfc4c16f22460b331886b191b

      SHA256

      f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

      SHA512

      d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      bb812b3e31d6bcd9430e1859693c9856

      SHA1

      2e2fd106bd4c2cfb827a2db22cdfc12d9a2aebe1

      SHA256

      36d73bca447ed277c72b5af7fe1e4f8d076e857fa82a7dd00e485138b9da673b

      SHA512

      8bb6f11f4a69f6b1b0a2ff36f45c646cb726933a613e7c4d4b7c20e6c042616047beb4057675687d9f96e564c141b1a4b6f50fe793ec163393d57124a06319f4

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      10890cda4b6eab618e926c4118ab0647

      SHA1

      1e1d63b73a0e6c7575f458b3c7917a9ce5ba776d

      SHA256

      00f8a035324d39bd62e6dee5e1b480069015471c487ebee4479e6990ea9ddb14

      SHA512

      a2ee84006c24a36f25e0bca0772430d64e3791f233da916aecdeae6712763e77d55bbbd00dc8f6b2b3887f3c26ab3980b96c5f46cc823e81e28abbbc5fc78221

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bctbvyb4.lou.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\tmp296C.tmp

      Filesize

      436KB

      MD5

      2d14d6aba850e354deec9d855aba3dc1

      SHA1

      624d3ded21d95bf53b2f8d34b329b83bf598d50c

      SHA256

      f7c51faecddd71229e7627cf59ee4fe95d5a8b5af7cc5549993563ee4bbd0f86

      SHA512

      a5e5e9b6838a9c27834b45df4488465339bd7c1b54c0679f0298c61b8fc795a6ed4db646256067655d08384a9bad5696ca00242c1a7e86df9195bed792599f53

    • C:\Users\Admin\AppData\Local\Temp\tmp297D.tmp

      Filesize

      343KB

      MD5

      34f8433a58ef780424ca7d7c199c2f24

      SHA1

      7d957c139562f1e03e937b4544240290cb7d0d73

      SHA256

      346f8454a2cb3c489577ad19383af6384332647b922b47e65cd3705472e1121e

      SHA512

      05e2ded99682e410a18fd025ebd4e0c28614f94bfd854728642660e9c8b1587268a66cd1a449df60f64deaff6837fc45f89514da98324d8fba2b468472f5a397

    • C:\Users\Admin\AppData\Local\Temp\tmp297E.tmp

      Filesize

      11KB

      MD5

      a33e5b189842c5867f46566bdbf7a095

      SHA1

      e1c06359f6a76da90d19e8fd95e79c832edb3196

      SHA256

      5abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454

      SHA512

      f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b

    • C:\Users\Admin\AppData\Local\Temp\tmp297F.tmp

      Filesize

      11KB

      MD5

      4a8fbd593a733fc669169d614021185b

      SHA1

      166e66575715d4c52bcb471c09bdbc5a9bb2f615

      SHA256

      714cd32f8edacb3befbfc4b17db5b6eb05c2c8936e3bae14ea25a6050d88ae42

      SHA512

      6b2ebbbc34cd821fd9b3d7711d9cdadd8736412227e191883e5df19068f8118b7c80248eb61cc0a2f785a4153871a6003d79de934254b2c74c33b284c507a33b

    • C:\Users\Admin\AppData\Local\Temp\tmp2980.tmp

      Filesize

      738KB

      MD5

      21aaf1019a43cf21a5136558a61a617b

      SHA1

      aac516f30c7f949a276157465efe434e4fdafc8f

      SHA256

      b68122127148e562538439dba65109bdd2241620c1b8b60f6a939847b6e6c21b

      SHA512

      fb67dcaa068ee2cd56944b8a094bb2af9644bee7e71dd0079f460c045bd9827c1f86448103679960d30702bb05d2fb73aa141e8fa8161c93d5d76109c1b03296

    • C:\Users\Admin\AppData\Local\Temp\tmp29B0.tmp

      Filesize

      11KB

      MD5

      bfbc1a403197ac8cfc95638c2da2cf0e

      SHA1

      634658f4dd9747e87fa540f5ba47e218acfc8af2

      SHA256

      272ed278e82c84cf4f80f48ec7989e1fc35f2055d6d05b63c8a31880846597a6

      SHA512

      b8938526fcbf7152805aec130ca553e3ec949cb825430a5d0a25c90ec5eb0863857010484a4b31fdc4bb65a4c92ad7127c812b93114be4569a677f60debe43b1

    • C:\Users\Admin\AppData\Local\Temp\tmp29B1.tmp

      Filesize

      11KB

      MD5

      3b068f508d40eb8258ff0b0592ca1f9c

      SHA1

      59ac025c3256e9c6c86165082974fe791ff9833a

      SHA256

      07db44a8d6c3a512b15f1cb7262a2d7e4b63ced2130bc9228515431699191cc7

      SHA512

      e29624bc8fecb0e2a9d917642375bd97b42502e5f23812195a61a4920cae5b6ed540e74dfcf8432dcceb7de906ad0501cdd68056f9b0ec86a6bb0c1e336bfe32

    • C:\Users\Admin\AppData\Local\Temp\tmp29C2.tmp

      Filesize

      11KB

      MD5

      87cbab2a743fb7e0625cc332c9aac537

      SHA1

      50f858caa7f4ac3a93cf141a5d15b4edeb447ee7

      SHA256

      57e3b0d22fa619da90237d8bcf8f922b142c9f6abf47efc5a1f5b208c4d3f023

      SHA512

      6b678f0dd0030806effe6825fd52a6a30b951e0c3dcf91dfd7a713d387aa8b39ec24368e9623c463360acba5e929e268f75ce996526c5d4485894b8ac6b2e0fa

    • C:\Users\Admin\AppData\Local\Temp\tmp7F62.tmp

      Filesize

      46KB

      MD5

      8f5942354d3809f865f9767eddf51314

      SHA1

      20be11c0d42fc0cef53931ea9152b55082d1a11e

      SHA256

      776ecf8411b1b0167bea724409ac9d3f8479973df223ecc6e60e3302b3b2b8ea

      SHA512

      fde8dfae8a862cf106b0cb55e02d73e4e4c0527c744c20886681245c8160287f722612a6de9d0046ed1156b1771229c8950b9ac036b39c988d75aa20b7bac218

    • C:\Users\Admin\AppData\Local\Temp\tmp7F78.tmp

      Filesize

      100KB

      MD5

      7e58c37fd1d2f60791d5f890d3635279

      SHA1

      5b7b963802b7f877d83fe5be180091b678b56a02

      SHA256

      df01ff75a8b48de6e0244b43f74b09ab7ebe99167e5da84739761e0d99fb9fc7

      SHA512

      a3ec0c65b2781340862eddd6a9154fb0e243a54e88121f0711c5648971374b6f7a87d8b2a6177b4f1ae0d78fb05cf0ee034d3242920301e2ee9fcd883a21b85e

    • C:\Users\Admin\AppData\Local\Temp\tmp7FC2.tmp

      Filesize

      48KB

      MD5

      349e6eb110e34a08924d92f6b334801d

      SHA1

      bdfb289daff51890cc71697b6322aa4b35ec9169

      SHA256

      c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

      SHA512

      2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

    • C:\Users\Admin\AppData\Local\Temp\tmp7FC7.tmp

      Filesize

      20KB

      MD5

      49693267e0adbcd119f9f5e02adf3a80

      SHA1

      3ba3d7f89b8ad195ca82c92737e960e1f2b349df

      SHA256

      d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

      SHA512

      b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

    • C:\Users\Admin\AppData\Local\Temp\tmp7FDE.tmp

      Filesize

      116KB

      MD5

      f70aa3fa04f0536280f872ad17973c3d

      SHA1

      50a7b889329a92de1b272d0ecf5fce87395d3123

      SHA256

      8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

      SHA512

      30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

    • C:\Users\Admin\AppData\Local\Temp\tmp8009.tmp

      Filesize

      96KB

      MD5

      d367ddfda80fdcf578726bc3b0bc3e3c

      SHA1

      23fcd5e4e0e5e296bee7e5224a8404ecd92cf671

      SHA256

      0b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0

      SHA512

      40e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77

    • memory/860-156-0x0000013C2C130000-0x0000013C2C152000-memory.dmp

      Filesize

      136KB

    • memory/1628-418-0x0000000006580000-0x00000000065F6000-memory.dmp

      Filesize

      472KB

    • memory/1628-152-0x0000000004D80000-0x0000000004E8A000-memory.dmp

      Filesize

      1.0MB

    • memory/1628-656-0x0000000074700000-0x0000000074EB0000-memory.dmp

      Filesize

      7.7MB

    • memory/1628-151-0x0000000074700000-0x0000000074EB0000-memory.dmp

      Filesize

      7.7MB

    • memory/1628-422-0x0000000074700000-0x0000000074EB0000-memory.dmp

      Filesize

      7.7MB

    • memory/1628-421-0x000000007470E000-0x000000007470F000-memory.dmp

      Filesize

      4KB

    • memory/1628-419-0x0000000006690000-0x00000000066AE000-memory.dmp

      Filesize

      120KB

    • memory/1628-363-0x0000000006370000-0x00000000063D6000-memory.dmp

      Filesize

      408KB

    • memory/1628-143-0x00000000001F0000-0x000000000020E000-memory.dmp

      Filesize

      120KB

    • memory/1628-145-0x0000000004A80000-0x0000000004A92000-memory.dmp

      Filesize

      72KB

    • memory/1628-208-0x00000000062D0000-0x0000000006362000-memory.dmp

      Filesize

      584KB

    • memory/1628-207-0x0000000006760000-0x0000000006C8C000-memory.dmp

      Filesize

      5.2MB

    • memory/1628-206-0x0000000006060000-0x0000000006222000-memory.dmp

      Filesize

      1.8MB

    • memory/1628-146-0x0000000004AE0000-0x0000000004B1C000-memory.dmp

      Filesize

      240KB

    • memory/1628-144-0x0000000005040000-0x0000000005658000-memory.dmp

      Filesize

      6.1MB

    • memory/1628-147-0x0000000004B20000-0x0000000004B6C000-memory.dmp

      Filesize

      304KB

    • memory/1628-150-0x000000007470E000-0x000000007470F000-memory.dmp

      Filesize

      4KB

    • memory/3744-427-0x000000001E170000-0x000000001E18E000-memory.dmp

      Filesize

      120KB

    • memory/3744-155-0x00000000017B0000-0x00000000017C0000-memory.dmp

      Filesize

      64KB

    • memory/3744-443-0x000000001E390000-0x000000001E3AE000-memory.dmp

      Filesize

      120KB

    • memory/3744-442-0x000000001E6F0000-0x000000001E766000-memory.dmp

      Filesize

      472KB

    • memory/3744-441-0x000000001F110000-0x000000001F638000-memory.dmp

      Filesize

      5.2MB

    • memory/3744-440-0x000000001E8C0000-0x000000001EA82000-memory.dmp

      Filesize

      1.8MB

    • memory/3744-430-0x000000001BD10000-0x000000001BD1E000-memory.dmp

      Filesize

      56KB

    • memory/3744-429-0x000000001E210000-0x000000001E24C000-memory.dmp

      Filesize

      240KB

    • memory/3744-428-0x000000001E1B0000-0x000000001E1C2000-memory.dmp

      Filesize

      72KB

    • memory/3744-425-0x00000000017B0000-0x00000000017C0000-memory.dmp

      Filesize

      64KB

    • memory/3744-420-0x00007FFA45323000-0x00007FFA45325000-memory.dmp

      Filesize

      8KB

    • memory/3744-140-0x0000000000F80000-0x0000000000F9A000-memory.dmp

      Filesize

      104KB

    • memory/3744-149-0x00007FFA45323000-0x00007FFA45325000-memory.dmp

      Filesize

      8KB

    • memory/4940-27-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-63-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-25-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-148-0x0000000000400000-0x00000000004DF000-memory.dmp

      Filesize

      892KB

    • memory/4940-43-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-29-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-31-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-33-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-35-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-39-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-47-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-49-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-51-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-53-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-45-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-118-0x00000000053C0000-0x000000000545C000-memory.dmp

      Filesize

      624KB

    • memory/4940-71-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-61-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-57-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-1-0x00000000005A0000-0x00000000006A0000-memory.dmp

      Filesize

      1024KB

    • memory/4940-59-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-154-0x0000000000400000-0x000000000048B000-memory.dmp

      Filesize

      556KB

    • memory/4940-55-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-65-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-8-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-67-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-9-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-11-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-13-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-17-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-19-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-21-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-23-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-41-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-15-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-37-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB

    • memory/4940-7-0x0000000002830000-0x0000000002894000-memory.dmp

      Filesize

      400KB

    • memory/4940-6-0x0000000004E10000-0x00000000053B4000-memory.dmp

      Filesize

      5.6MB

    • memory/4940-5-0x0000000002630000-0x0000000002696000-memory.dmp

      Filesize

      408KB

    • memory/4940-4-0x0000000000400000-0x00000000004DF000-memory.dmp

      Filesize

      892KB

    • memory/4940-2-0x0000000002110000-0x0000000002198000-memory.dmp

      Filesize

      544KB

    • memory/4940-3-0x0000000000400000-0x000000000048B000-memory.dmp

      Filesize

      556KB

    • memory/4940-69-0x0000000002830000-0x000000000288F000-memory.dmp

      Filesize

      380KB