Analysis

  • max time kernel
    147s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 15:57

General

  • Target

    b2aefe9be1952a261220d2bab2f125e0_NeikiAnalytics.exe

  • Size

    2.6MB

  • MD5

    b2aefe9be1952a261220d2bab2f125e0

  • SHA1

    36ce75250cf009627554c5dd4294273bbdd50d66

  • SHA256

    adbb33e049bf586a1a9af7b968c9061183018149faa9f4cdfdd8831c543d7e22

  • SHA512

    44a291274b6baee490678cc77f4e96b738d0d7cb0c366731b819eb8df93ccf74ed0537a748cd2057b9ef308cbd4b54d7cb7ec2f2d4bbda34e5d09601def8f0fb

  • SSDEEP

    24576:ObCj2sObHtqQ4QEfCr7w7yvuqqNq8FroaSaPXRackmrM4Biq7MhLv9GImmVfq4e8:ObCjPKNqQEfsw43qtmVfq4r

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.mail.me.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    RICHARD205lord

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses Microsoft Outlook accounts 1 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 25 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • NTFS ADS 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2aefe9be1952a261220d2bab2f125e0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\b2aefe9be1952a261220d2bab2f125e0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe
      C:\ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • NTFS ADS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1748
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
        0
        3⤵
        • Suspicious use of SetThreadContext
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2696
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmp84D9.tmp"
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2460
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmp8586.tmp"
          4⤵
          • Accesses Microsoft Outlook accounts
          • Suspicious use of AdjustPrivilegeToken
          PID:1908
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmp9974.tmp"
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1684
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:2568
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:2192
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:2888
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:2040
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:568
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:1660
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:1776
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:1584
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:1092
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:1064
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:2224
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:1104
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:1524
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:2332
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:2992
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:768
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:3060
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:2548
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:2620
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
        0
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2752
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmpF9E9.tmp"
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2532
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmpFA95.tmp"
          4⤵
          • Accesses Microsoft Outlook accounts
          • Suspicious use of AdjustPrivilegeToken
          PID:2692
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe -f "C:\Users\Admin\AppData\Local\Temp\tmpFAD5.tmp"
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1160
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:1756
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:2968
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:2276
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:1816
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:848
      • C:\Windows\SysWOW64\schtasks.exe
        C:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr119.exe" /tr "C:\ProgramData\winmgr119.exe" /f
        3⤵
        • Creates scheduled task(s)
        PID:1084
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {38ABC047-75C6-4E69-BFFF-987A7178DC76} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\ProgramData\winmgr119.exe
      C:\ProgramData\winmgr119.exe
      2⤵
      • Executes dropped EXE
      • NTFS ADS
      • Suspicious behavior: EnumeratesProcesses
      PID:2268
    • C:\ProgramData\winmgr119.exe
      C:\ProgramData\winmgr119.exe
      2⤵
      • Executes dropped EXE
      • NTFS ADS
      • Suspicious behavior: EnumeratesProcesses
      PID:2700

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\khaxFMfI\009276b996b04917a9a60a951037d8a6
    Filesize

    16B

    MD5

    bebe88b8fb16df12c56561613ae7aaac

    SHA1

    43d8689d8ee6bbb44699a8a795fc5e6a54a7801e

    SHA256

    e5b5d128a970e5fb2f4678e70514fc3264676088b8eec4ee42c405af0014604c

    SHA512

    0dfbfb4e93a8b8e994d9730b4a4e38d7805ea98a88e3fab4d4f2de85defebedff99b01bdc65e469a1c0840a70118af926997326121b16307a6e71a1568a5681c

  • C:\ProgramData\khaxFMfI\189d625f98324bab87032800e1e7f084
    Filesize

    8B

    MD5

    7ddc06b79751d16771da8d2187fde7e8

    SHA1

    8f3b0f63ed364d9f243d0b1de25833fbf3f8616c

    SHA256

    c1d0655e9c55cd3bb98b8560b7fb3d37db4eed3171146a2e8f43c4bd5e7b964a

    SHA512

    67b291e8b71d9ef57976334b8dc099397b55ee7a090cbe29ed6ff7239cb143ea1740517693ef6b37c9d721bb8980539afb90a5d554bed5343496146100572b09

  • C:\ProgramData\khaxFMfI\2c945db753d341ef9b0f02d75d493749
    Filesize

    8B

    MD5

    0719117227d0203e9dcf1983e4183252

    SHA1

    c4bcb506a85ca65dc21191bd7bb9f802165629d1

    SHA256

    8e6c850b5ca91d77ceb0f8af7f2a2c47614377fb0a48813bec4a262196fb423b

    SHA512

    79b500a37ae9f37aab85d7ff0ff6b2bfb4e6d75376b42cb2af9c8f8a8a04869abbe5bfaf81e20200df12ca273b30e5a61519b72cfc24025b7258cd9fe5698b21

  • C:\ProgramData\khaxFMfI\47928f366bbf48c9ad07f8d6a7670eaf
    Filesize

    88B

    MD5

    7c296fd9c4143cd2dea8f3257e743235

    SHA1

    a9041711ed2e96c93e86059cf88e9def128a7434

    SHA256

    763607ae2055ec62a23b88abf45b13c1b44cca2281a25329e4d9bcc625f93559

    SHA512

    c07323808e7393f5d91744a493ffadef30646d170d338c167c816c9965f3872a6d89048d969c76163f70316a73a200d604fd7a2e1718058fbeca6fc063ed2e1e

  • C:\ProgramData\winmgr119.exe
    Filesize

    2.6MB

    MD5

    7a39620502a4000b59c9969d1fe9a5cc

    SHA1

    72ebe16feb5b75a8788b5ffe77d78cf8d4a04814

    SHA256

    529e9e9e5cc7dc312ca50de25193def69c82d2291c17a8a052722464371ef14b

    SHA512

    0e4198b74df9ebde2aef5dea6cb7384f7c050f8fbeebbead1f35a0e83c301d9bcfdc35169a9d22a554efcb9fe0245958c52b37061f1bae8bb2d763998458f42e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\TarAB93.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\tmp84D9.tmp
    Filesize

    399B

    MD5

    e4bf4f7accc657622fe419c0d62419ab

    SHA1

    c2856936dd3de05bad0da5ca94d6b521e40ab5a2

    SHA256

    b32fa68b79c5a7ceaa89e8e537efe33a963c499666202611329944bd2c09318e

    SHA512

    85dc223e39a16ddeba53a4b3d6c9eff14d30ec67dfda1e650da2c9057f640edd033a31868915a31caac0d325d240a7f634f62cd52fbd2adc68bd1d9cb6281431

  • C:\Users\Admin\AppData\Local\Temp\tmp8586.tmp
    Filesize

    400B

    MD5

    de4e5ff058882957cf8a3b5f839a031f

    SHA1

    0b3d8279120fb5fa27efbd9eee89695aa040fc24

    SHA256

    ef54f46b9f1e342fc12e035ae94f57c61ea4e8be4e116f0a1c6f86310f400f49

    SHA512

    a6b0d557e9eec4e56630e5ba64495df318f4fd959fffbdcbf77831185b067906917c9117a0ecd6ac817c7860d5d831cce15820d715657d81e2d817d9fab9fb72

  • C:\Users\Admin\AppData\Local\Temp\tmp9974.tmp
    Filesize

    391B

    MD5

    3525ea58bba48993ea0d01b65ea71381

    SHA1

    1b917678fdd969e5ee5916e5899e7c75a979cf4d

    SHA256

    681bcee53cf679ac674e700136f9229b9184fe60ed6410dbd7a33d462ed13ae2

    SHA512

    5aad8dca43ec85882daf50c469bd04dcf0b62affc8bc605b3e289496a2679d4d548fea8bb0aea7080bbfbcdcab9d275fc6797b9c95b64f9f97ecf79583a83986

  • \ProgramData\jhdfkldfhndfkjdfnbfklfnf.exe
    Filesize

    2.6MB

    MD5

    a943b75f49a63a1b19e145e8b5a0d634

    SHA1

    e7b139747d1a29d781911ca7265f37680ea91d33

    SHA256

    f2f4787e093a3d903a7e06843165fc6b5f4060796698adfbdf228b1e9a14288e

    SHA512

    1067079eb67d66e17322cbb8d259b080f07cce4f64ab8acc68762905dbba1a7ef1cd3410b65a3b98af6d674bf50921addca933d34da7ac2190ddbc04e3044a2c

  • memory/1160-132-0x0000000000400000-0x000000000043C000-memory.dmp
    Filesize

    240KB

  • memory/1684-45-0x0000000000400000-0x000000000043C000-memory.dmp
    Filesize

    240KB

  • memory/1684-43-0x0000000000400000-0x000000000043C000-memory.dmp
    Filesize

    240KB

  • memory/1684-42-0x0000000000400000-0x000000000043C000-memory.dmp
    Filesize

    240KB

  • memory/1908-34-0x0000000000400000-0x0000000000491000-memory.dmp
    Filesize

    580KB

  • memory/1908-35-0x0000000000400000-0x0000000000491000-memory.dmp
    Filesize

    580KB

  • memory/1908-36-0x0000000000400000-0x0000000000491000-memory.dmp
    Filesize

    580KB

  • memory/1908-38-0x0000000000400000-0x0000000000491000-memory.dmp
    Filesize

    580KB

  • memory/2460-24-0x0000000000400000-0x000000000048E000-memory.dmp
    Filesize

    568KB

  • memory/2460-31-0x0000000000400000-0x000000000048E000-memory.dmp
    Filesize

    568KB

  • memory/2460-23-0x0000000000400000-0x000000000048E000-memory.dmp
    Filesize

    568KB

  • memory/2460-22-0x0000000000400000-0x000000000048E000-memory.dmp
    Filesize

    568KB

  • memory/2532-117-0x0000000000400000-0x000000000048E000-memory.dmp
    Filesize

    568KB

  • memory/2692-125-0x0000000000400000-0x0000000000491000-memory.dmp
    Filesize

    580KB

  • memory/2692-123-0x0000000000400000-0x0000000000491000-memory.dmp
    Filesize

    580KB

  • memory/2696-17-0x0000000000110000-0x00000000001DA000-memory.dmp
    Filesize

    808KB

  • memory/2696-13-0x0000000000110000-0x00000000001DA000-memory.dmp
    Filesize

    808KB

  • memory/2696-15-0x0000000000110000-0x00000000001DA000-memory.dmp
    Filesize

    808KB

  • memory/2696-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
    Filesize

    4KB

  • memory/2696-85-0x0000000073CD2000-0x0000000073CD4000-memory.dmp
    Filesize

    8KB

  • memory/2696-18-0x0000000073CD2000-0x0000000073CD4000-memory.dmp
    Filesize

    8KB

  • memory/2696-10-0x0000000000110000-0x00000000001DA000-memory.dmp
    Filesize

    808KB

  • memory/2752-102-0x0000000000170000-0x000000000023A000-memory.dmp
    Filesize

    808KB

  • memory/2752-104-0x0000000000170000-0x000000000023A000-memory.dmp
    Filesize

    808KB

  • memory/2752-103-0x0000000000170000-0x000000000023A000-memory.dmp
    Filesize

    808KB

  • memory/2752-101-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
    Filesize

    4KB